An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates

dc.cclicenceCC-BY-NCen
dc.contributor.authorBingol, Muhammed Alien
dc.contributor.authorBicer, O.en
dc.contributor.authorKiraz, Mehmet Sabiren
dc.contributor.authorLevi, A.en
dc.date.acceptance2018-11-29en
dc.date.accessioned2019-02-14T12:23:09Z
dc.date.available2019-02-14T12:23:09Z
dc.date.issued2018-12-24
dc.descriptionThe file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.en
dc.description.abstractPrivate function evaluation (PFE) is a special case of secure multi-party computation (MPC), where the function to be computed is known by only one party. PFE is useful in several real-life applications where an algorithm or a function itself needs to remain secret for reasons such as protecting intellectual property or security classification level. In this paper, we focus on improving 2-party PFE based on symmetric cryptographic primitives. In this respect, we look back at the seminal PFE framework presented by Mohassel and Sadeghian at Eurocrypt’13. We show how to adapt and utilize the well-known half gates garbling technique (Zahur et al., Eurocrypt’15) to their constant-round 2-party PFE scheme. Compared to their scheme, our resulting optimization significantly improves the efficiency of both the underlying Oblivious Evaluation of Extended Permutation (OEP) and secure 2-party computation (2PC) protocols, and yields a more than 40% reduction in overall communication cost (the computation time is also slightly decreased and the number of rounds remains unchanged).en
dc.funderN/Aen
dc.identifier.citationBingol, M.A., Bicer, O., Kiraz, M.S., Levi, A. (2018) An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates. The Computer Journal, 62 (4), pp. 598-613en
dc.identifier.doihttps://doi.org/10.1093/comjnl/bxy136
dc.identifier.urihttp://hdl.handle.net/2086/17550
dc.language.isoenen
dc.peerreviewedYesen
dc.projectidN/Aen
dc.publisherOxford University Pressen
dc.subjectCryptographic protocolen
dc.subjectPrivate function evaluationen
dc.subjectSecure multi-party computationen
dc.subjectCommunication and computationen
dc.titleAn Efficient 2-Party Private Function Evaluation Protocol Based on Half Gatesen
dc.typeArticleen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
COMPJ-2018-06-0429-Final_version.pdf
Size:
996.48 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.2 KB
Format:
Item-specific license agreed upon to submission
Description: