Paper 2025/1081

FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC

Zhengyuan Su, Tsinghua University
Qi Pang, Carnegie Mellon University
Simon Beyzerov, Carnegie Mellon University
Wenting Zheng, Carnegie Mellon University
Abstract

Abstract Secure two-party computation (2PC) is a cryptographic technique that enables two mutually distrusting parties to jointly evaluate a function over their private inputs. We consider a 2PC primitive called confidential lookup table (LUT) evaluation, which is useful in privacy-preserving ML inference and data analytics. In this setting, a server holds a confidential LUT and evaluates it over an input secret-shared between a client and the server, producing a secret-shared output. Existing approaches for 2PC LUT evaluation suffer from high asymptotic complexity and practical inefficiency, with some designs lacking confidentiality guarantees for the LUT. Recognizing that many applications involving confidential LUT evaluation require processing multiple inputs with the same LUT, we propose FABLE, a system designed to efficiently evaluate a LUT on a large batch of queries simultaneously. Compared to the state-of-the-art confidential LUT evaluation methods, FABLE achieves up to 28.46-101.47$\times$ speedup in LAN environments and up to 50.10-392.93$\times$ speedup in WAN environments.

Note: Major Revision.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Major revision. USENIX Security '25
Keywords
Confidential LUT EvaluationPrivate information retrievalmulti-party computation2PC
Contact author(s)
su-zy21 @ mails tsinghua edu cn
qipang @ cmu edu
sbeyzero @ andrew cmu edu
wenting @ cmu edu
History
2025-06-10: revised
2025-06-09: received
See all versions
Short URL
https://ia.cr/2025/1081
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/1081,
      author = {Zhengyuan Su and Qi Pang and Simon Beyzerov and Wenting Zheng},
      title = {{FABLE}: Batched Evaluation on Confidential Lookup Tables in {2PC}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/1081},
      year = {2025},
      url = {https://eprint.iacr.org/2025/1081}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.