ENCODING FUNCTIONS WITH CONSTANT ONLINE RATE, OR HOW TO COMPRESS GARBLED CIRCUIT KEYS

被引:10
|
作者
Applebaum, Benny [1 ]
Ishai, Yuval [2 ]
Kushilevitz, Eyal [2 ]
Waters, Brent [3 ]
机构
[1] Tel Aviv Univ, Sch Elect Engn, IL-69978 Tel Aviv, Israel
[2] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[3] Univ Texas Austin, Dept Comp Sci, Austin, TX 78712 USA
基金
欧洲研究理事会;
关键词
garbled circuits; randomized encodings; cryptography; secure multiparty computation; verifiable computation; ROUND SECURE COMPUTATION; RANDOMIZING POLYNOMIALS; MULTIPARTY COMPUTATION; FOUNDING CRYPTOGRAPHY; INTERACTIVE PROOFS; ENCRYPTION;
D O I
10.1137/130929643
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Randomized encodings of functions can be used to replace a "complex" function f(x) by a "simpler" randomized mapping (f) over cap (x; r) whose output distribution on an input x encodes the value of f(x) and hides any other information about x. One desirable feature of randomized encodings is low online complexity. That is, the goal is to obtain a randomized encoding (f) over cap of f in which most of the output can be precomputed and published before seeing the input x. When the input x is available, it remains to publish only a short string (x) over cap, where the online complexity of computing (x) over cap is independent of (and is typically much smaller than) the complexity of computing f. Yao's garbled circuit construction gives rise to such randomized encodings in which the online part (x) over cap consists of n encryption keys of length kappa each, where n = vertical bar x vertical bar and kappa is a security parameter. Thus, the online rate vertical bar(x) over cap vertical bar/vertical bar x vertical bar of this encoding is proportional to the security parameter kappa. In this paper, we show that the online rate can be dramatically improved. Specifically, we show how to encode any polynomial-time computable function f : {0, 1}(n) -> {0, 1}(m(n)) with online rate of 1 + o(1) and with nearly linear online computation. More concretely, the online part (x) over cap consists of an n-bit string and a single encryption key. These constructions can be based on the decisional DiffieHellman (DDH) assumption, the learning with errors (LWE) assumption, or the RSA assumption. We also present a variant of this result which applies to arithmetic formulas, where the encoding only makes use of arithmetic operations, as well as several negative results which complement our positive results. Our positive results can lead to efficiency improvements in most contexts where randomized encodings of functions are used. We demonstrate this by presenting several concrete applications. These include protocols for secure multiparty computation and for noninteractive verifiable computation in the preprocessing model which achieve, for the first time, an optimal online communication complexity, as well as noninteractive zero-knowledge proofs which simultaneously minimize the online communication and the prover's online computation.
引用
收藏
页码:433 / 466
页数:34
相关论文
共 1 条
  • [1] Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
    Applebaum, Benny
    Ishai, Yuval
    Kushilevitz, Eyal
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 166 - 184