Adaptive Distributional Security for Garbling Schemes with O(| x| ) Online Complexity

Estuardo Alpírez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, Kirthivaasan Puniamurthy

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Garbling schemes allow to garble a circuit C and an input x such that C(x) can be computed while hiding both C and x. In the context of adaptive security, an adversary specifies the input to the circuit after seeing the garbled circuit, so that one can pre-process the garbling of C and later only garble the input x in the online phase. Since the online phase may be time-critical, it is an interesting question how much information needs to be transmitted in this phase and ideally, this should be close to | x|. Unfortunately, Applebaum, Ishai, Kushilevitz, and Waters (AIKW, CRYPTO 2013) show that for some circuits, specifically PRGs, achieving online complexity close to | x| is impossible with simulation-based security, and Hubáček and Wichs (HW, ITCS 2015) show that online complexity of maliciously secure 2-party computation needs to grow with the incompressibility entropy of the function. We thus seek to understand under which circumstances optimal online complexity is feasible despite these strong lower bounds. Our starting point is the observation that lower bounds (only) concern cryptographic circuits and that, when an embedded secret is not known to the adversary (distinguisher), then the lower bound techniques do not seem to apply. Our main contribution is distributional simulation-based security (DSIM), a framework for capturing weaker, yet meaningful simulation-based (adaptive) security which does not seem to suffer from impossibility results akin to AIKW. We show that DSIM can be used to prove security of a distributed symmetric encryption protocol built around garbling. We also establish a bootstrapping result from DSIM-security for NC 0 circuits to DSIM-security for arbitrary polynomial-size circuits while preserving their online complexity.
Original languageEnglish
Title of host publicationAdvances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsJ. Guo, R. Steinfeld
PublisherSpringer Science and Business Media Deutschland GmbH
Pages139-171
ISBN (Print)9789819987207
DOIs
Publication statusPublished - 2023
Externally publishedYes
Event29th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2023 - Guangzhou, China
Duration: 4 Dec 20238 Dec 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference29th Annual International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2023
Country/TerritoryChina
CityGuangzhou
Period4/12/238/12/23

Funding

We thank Christoph Egger, Pierre Meyer, the cryptography group at ENS Paris and the anonymous reviewers of Asiacrypt 2023 for the interesting discussion, and for pointing us towards the work of Hubáček and Wichs [31]. This work was supported by the Research Council of Finland, Blockchain Technology Laboratory at the University of Edinburgh and Input Output Global.

FundersFunder number
Blockchain Technology Laboratory
Research Council of Finland

    Fingerprint

    Dive into the research topics of 'Adaptive Distributional Security for Garbling Schemes with O(| x| ) Online Complexity'. Together they form a unique fingerprint.

    Cite this