We present generalized UC constructions to efficiently simulate any circuit with gates of $d \ge 2$ inputs having efficient circuit representation. Our constructions are non-trivial generalizations of previously known UC constructions. As application we show how to securely evaluate private functions such as neural networks (NN) which are increasingly used in commercial applications. Our provably secure PF-SFE protocol needs only one round in the semi-honest model (or even no online communication at all using non-interactive oblivious transfer) and evaluates a generalized UC that entirely hides the structure of the private NN. This enables applications like privacy-preserving data classification based on private NNs without trusted third party while simultaneously protecting user's data and NN owner's intellectual property.
Category / Keywords: cryptographic protocols / universal circuits, secure evaluation of private functions, neural networks, private data classification, privacy Publication Info: ICISC 2008 Date: received 27 Oct 2008, last revised 22 Dec 2008 Contact author: thomas schneider at trust rub de Available formats: PDF | BibTeX Citation Version: 20081222:202251 (All versions of this report) Discussion forum: Show discussion | Start new discussion