Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model

Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

We consider the problem of constant-round secure two-party computation in the presence of active (malicious) adversaries. We present the first protocol that has only a constant multiplicative communication overhead compared to Yao’s protocol for passive adversaries, and can be implemented in the plain model by only making a black-box use of (parallel) oblivious transfer and a pseudo-random generator. This improves over the polylogarithmic overhead of the previous best protocol. A similar result could previously be obtained only in an amortized setting, using preprocessing, or by assuming bit-oblivious-transfer as an ideal primitive that has a constant cost. We present two variants of this result, one which is aimed at minimizing the number of oblivious transfers and another which is aimed at optimizing concrete efficiency. Our protocols are based on a novel combination of previous techniques together with a new efficient protocol to certify that pairs of strings transmitted via oblivious transfer satisfy a global relation. Settling for “security with correlated abort”, the concrete communication complexity of the second variant of our protocol can beat the best previous protocols with the same kind of security even for realistic values of the circuit size and the security parameter. This variant is particularly attractive in the offline–online setting, where the online cost is dominated by a single evaluation of an authenticated garbled circuit, and can also be made non-interactive using the Fiat–Shamir heuristic.

Original languageEnglish
Article number26
JournalJournal of Cryptology
Volume36
Issue number3
DOIs
StatePublished - Jul 2023

Keywords

  • Constant-round protocols
  • Garbled circuits
  • Low-complexity cryptography
  • Secure two-party computation

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model'. Together they form a unique fingerprint.

Cite this