Cryptology ePrint Archive: Report 2016/067

OPFE: Outsourcing Computation for Private Function Evaluation

Henry Carter and Patrick Traynor

Abstract: Outsourcing secure multiparty computation(SMC) protocols has allowed resource-constrained devices to take advantage of these developing cryptographic primitives with great efficiency. While the existing constructions for outsourced SMC guarantee input and output privacy, they require that all parties know the function being evaluated. Thus, stronger security guarantees are necessary in applications where the function itself needs to be kept private. We develop the first linear-complexity protocols for outsourcing private function evaluation (PFE), a subset of SMC protocols that provide both input and function privacy. Assuming a semi-honest function holder, we build on the most efficient two-party PFE constructions to develop outsourced protocols that are secure against a semi-honest, covert, or malicious Cloud server and malicious mobile devices providing input to the function. Our protocols require minimal symmetric key operations and only two rounds of communication from the mobile participants. As a secondary contribution, we develop a technique for combining public and private sub-circuits in a single computation called partially-circuit private (PCP) garbling. This novel garbling technique allows us to apply auxiliary circuits to check for malicious behavior using only free-XOR overhead gates rather than the significantly more costly PFE gate construction. These protocols demonstrate the feasibility of outsourced PFE and provide a first step towards developing privacy-preserving applications for use in Cloud computing.

Category / Keywords: cryptographic protocols / private function evaluation, garbled circuits, server-assisted cryptography

Date: received 25 Jan 2016

Contact author: carterh at gatech edu

Available format(s): PDF | BibTeX Citation

Version: 20160126:155248 (All versions of this report)

Short URL: ia.cr/2016/067

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]