Paper 2025/1081
FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC
Abstract
Abstract Secure two-party computation (2PC) is a cryptographic technique that enables two mutually distrusting parties to jointly evaluate a function over their private inputs. We consider a 2PC primitive called confidential lookup table (LUT) evaluation, which is useful in privacy-preserving ML inference and data analytics. In this setting, a server holds a confidential LUT and evaluates it over an input secret-shared between a client and the server, producing a secret-shared output. Existing approaches for 2PC LUT evaluation suffer from high asymptotic complexity and practical inefficiency, with some designs lacking confidentiality guarantees for the LUT. Recognizing that many applications involving confidential LUT evaluation require processing multiple inputs with the same LUT, we propose FABLE, a system designed to efficiently evaluate a LUT on a large batch of queries simultaneously. Compared to the state-of-the-art confidential LUT evaluation methods, FABLE achieves up to 28.46-101.47$\times$ speedup in LAN environments and up to 50.10-392.93$\times$ speedup in WAN environments.
Note: Major Revision.
Metadata
- Available format(s)
-
PDF
- Category
- Applications
- Publication info
- Published elsewhere. Major revision. USENIX Security '25
- Keywords
- Confidential LUT EvaluationPrivate information retrievalmulti-party computation2PC
- Contact author(s)
-
su-zy21 @ mails tsinghua edu cn
qipang @ cmu edu
sbeyzero @ andrew cmu edu
wenting @ cmu edu - History
- 2025-06-10: revised
- 2025-06-09: received
- See all versions
- Short URL
- https://ia.cr/2025/1081
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/1081, author = {Zhengyuan Su and Qi Pang and Simon Beyzerov and Wenting Zheng}, title = {{FABLE}: Batched Evaluation on Confidential Lookup Tables in {2PC}}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/1081}, year = {2025}, url = {https://eprint.iacr.org/2025/1081} }