TY - GEN
T1 - Enforcing input correctness via certification in garbled circuit evaluation
AU - Zhang, Yihua
AU - Blanton, Marina
AU - Bayatbabolghani, Fattaneh
N1 - Publisher Copyright: © 2017, Springer International Publishing AG.
PY - 2017
Y1 - 2017
N2 - Secure multi-party computation allows a number of participants to securely evaluate a function on their private inputs and has a growing number of applications. Two standard adversarial models that treat the participants as semi-honest or malicious, respectively, are normally considered for showing security of constructions in this framework. In this work, we go beyond the standard security model in the presence of malicious participants and treat the problem of enforcing correct inputs to be entered into the computation. We achieve this by having a certification authority certify user’s information, which is consequently used in secure two-party computation based on garbled circuit evaluation. The focus of this work on enforcing correctness of garbler’s inputs via certification, as prior work already allows one to achieve this goal for circuit evaluator’s input. Thus, in this work, we put forward a novel approach for certifying user’s input and tying certification to garbler’s input used during secure function evaluation based on garbled circuits. Our construction achieves notable performance of adding only one (standard) signature verification and (formula presented) symmetric key/hash operations to the cost of garbled circuit evaluation in the malicious model via cut-and-choose, in which (formula presented) circuits are garbled and n is the length of the garbler’s input in bits. Security of our construction is rigorously proved in the standard model.
AB - Secure multi-party computation allows a number of participants to securely evaluate a function on their private inputs and has a growing number of applications. Two standard adversarial models that treat the participants as semi-honest or malicious, respectively, are normally considered for showing security of constructions in this framework. In this work, we go beyond the standard security model in the presence of malicious participants and treat the problem of enforcing correct inputs to be entered into the computation. We achieve this by having a certification authority certify user’s information, which is consequently used in secure two-party computation based on garbled circuit evaluation. The focus of this work on enforcing correctness of garbler’s inputs via certification, as prior work already allows one to achieve this goal for circuit evaluator’s input. Thus, in this work, we put forward a novel approach for certifying user’s input and tying certification to garbler’s input used during secure function evaluation based on garbled circuits. Our construction achieves notable performance of adding only one (standard) signature verification and (formula presented) symmetric key/hash operations to the cost of garbled circuit evaluation in the malicious model via cut-and-choose, in which (formula presented) circuits are garbled and n is the length of the garbler’s input in bits. Security of our construction is rigorously proved in the standard model.
KW - Garbled circuits
KW - Input certification
KW - Input verification
KW - Secure function evaluation
UR - https://www.scopus.com/pages/publications/85029500816
U2 - 10.1007/978-3-319-66399-9_30
DO - 10.1007/978-3-319-66399-9_30
M3 - Conference contribution
SN - 9783319663982
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 552
EP - 569
BT - Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings
A2 - Foley, Simon N.
A2 - Gollmann, Dieter
A2 - Snekkenes, Einar
PB - Springer Verlag
T2 - 22nd European Symposium on Research in Computer Security, ESORICS 2017
Y2 - 11 September 2017 through 15 September 2017
ER -