International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model

Authors:
Carmit Hazay
Yuval Ishai
Muthuramakrishnan Venkitasubramaniam
Download:
DOI: 10.1007/s00145-023-09465-3
Search ePrint
Search Google
Abstract: We consider the problem of constant-round secure two-party computation in the presence of active (malicious) adversaries. We present the first protocol that has only a constant multiplicative communication overhead compared to Yao’s protocol for passive adversaries, and can be implemented in the plain model by only making a black-box use of (parallel) oblivious transfer and a pseudo-random generator. This improves over the polylogarithmic overhead of the previous best protocol. A similar result could previously be obtained only in an amortized setting, using preprocessing, or by assuming bit-oblivious-transfer as an ideal primitive that has a constant cost. We present two variants of this result, one which is aimed at minimizing the number of oblivious transfers and another which is aimed at optimizing concrete efficiency. Our protocols are based on a novel combination of previous techniques together with a new efficient protocol to certify that pairs of strings transmitted via oblivious transfer satisfy a global relation. Settling for “security with correlated abort”, the concrete communication complexity of the second variant of our protocol can beat the best previous protocols with the same kind of security even for realistic values of the circuit size and the security parameter. This variant is particularly attractive in the offline–online setting, where the online cost is dominated by a single evaluation of an authenticated garbled circuit, and can also be made non-interactive using the Fiat–Shamir heuristic.
BibTeX
@article{jofc-2023-33324,
  title={Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model},
  journal={Journal of Cryptology},
  publisher={Springer},
  volume={36},
  doi={10.1007/s00145-023-09465-3},
  author={Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam},
  year=2023
}