Paper 2024/2073

Succinct Partial Garbling from Groups and Applications

Yuval Ishai, Technion – Israel Institute of Technology
Hanjun Li, University of Washington
Huijia Lin, University of Washington
Abstract

A garbling scheme transforms a program (e.g., circuit) $C$ into a garbled program $\hat{C}$, along with a pair of short keys $(k_{i,0},k_{i,1})$ for each input bit $x_i$, such that $(C,\hat{C}, \{k_{i,x_i}\})$ can be used to recover the output $z = C(x)$ while revealing nothing else about the input $x$. This can be naturally generalized to partial garbling, where part of the input is public, and a computation $z = C(x, y)$ is decomposed into a public part $C_{\text{pub}}(x)$, depending only on the public input $x$, and a private part $z = C_{\text{priv}}(C_{\text{pub}}(x), y)$ that also involves a private input $y$. A key challenge in garbling is to achieve succinctness, where the size of the garbled program may grow only with the security parameter and (possibly) the output length, but not with the size of $C$. Prior work achieved this strong notion of succinctness using heavy tools such as indistinguishability obfuscation (iO) or a combination of fully homomorphic encryption and attribute-based encryption. In this work, we introduce new succinct garbling schemes based on variants of standard group-based assumptions. Our approach, being different from prior methods, offers a promising pathway towards practical succinct garbling. Specifically, we construct: - A succinct partial garbling scheme for general circuits, where the garbled circuit size scales linearly with the private computation $|C_{\text{priv}}|$ and is independent of the public computation $|C_{\text{pub}}|$. This implies fully succinct conditional disclosure of secrets (CDS) protocols for circuits. - Succinct (fully hiding) garbling schemes for simple types of programs, including truth tables, bounded-length branching programs (capturing decision trees and DFAs as special cases) and degree-2 polynomials, where the garbled program size is independent of the program size. This implies succinct private simultaneous messages (PSM) protocols for the same programs. Our succinct partial garbling scheme can be based on a circular-security variant of the power-DDH assumption, which holds in the generic group model, or alternatively on the key-dependent message security of the Damgård-Jurik encryption. For bounded-depth circuits or the aforementioned simple programs, we avoid circular-security assumptions entirely. At the heart of our technical approach is a new computational flavor of algebraic homomorphic MAC (aHMAC), for which we obtain group-based constructions building on techniques from the literature on homomorphic secret sharing. Beyond succinct garbling, we demonstrate the utility of aHMAC by constructing constrained pseudorandom functions (CPRFs) for general constraint circuits from group-based assumptions. Previous CPRF constructions were limited to $\mathsf{NC}^1$ circuits or alternatively relied on lattices or iO.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint.
Keywords
garbled circuitssecure computationconstrained pseudorandom function
Contact author(s)
yuvali @ cs technion ac il
hanjul @ cs washington edu
rachel @ cs washington edu
History
2024-12-26: approved
2024-12-24: received
See all versions
Short URL
https://ia.cr/2024/2073
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/2073,
      author = {Yuval Ishai and Hanjun Li and Huijia Lin},
      title = {Succinct Partial Garbling from Groups and Applications},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/2073},
      year = {2024},
      url = {https://eprint.iacr.org/2024/2073}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.