Paper 2025/281

Securely Instantiating 'Half Gates' Garbling in the Standard Model

Anasuya Acharya, Bar-Ilan University
Karen Azari, University of Vienna
Mirza Ahad Baig, Institute of Science and Technology Austria
Dennis Hofheinz, ETH Zurich
Chethan Kamath, Indian Institute of Technology Bombay
Abstract

Garbling is a fundamental cryptographic primitive, with numerous theoretical and practical applications. Since the first construction by Yao (FOCS’82, ’86), a line of work has concerned itself with reducing the communication and computational complexity of that construction. One of the most efficient garbling schemes presently is the ‘Half Gates’ scheme by Zahur, Rosulek, and Evans (Eurocrypt’15). Despite its widespread adoption, the provable security of this scheme has been based on assumptions whose only instantiations are in idealized models. For example, in their original paper, Zahur, Rosulek, and Evans showed that hash functions satisfying a notion called circular correlation robustness (CCR) suffice for this task, and then proved that CCR secure hash functions can be instantiated in the random permutation model. In this work, we show how to securely instantiate the Half Gates scheme in the standard model. To this end, we first show how this scheme can be securely instantiated given a (family of) weak CCR hash function, a notion that we introduce. Furthermore, we show how a weak CCR hash function can be used to securely instantiate other efficient garbling schemes, namely the ones by Rosulek and Roy (Crypto’21) and Heath (Eurocrypt’24). Thus we believe this notion to be of independent interest. Finally, we construct such weak CCR hash functions using indistinguishability obfuscation and one-way functions. The security proof of this construction constitutes our main technical contribution. While our construction is not practical, it serves as a proof of concept supporting the soundness of these garbling schemes, which we regard to be particularly important given the recent initiative by NIST to standardize garbling, and the optimizations in Half Gates being potentially adopted.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint.
Keywords
Garbling SchemesCircular Correlation Robust HashingIndistinguishability Obfuscation
Contact author(s)
anasuyahirai @ gmail com
karen azari @ univie ac at
mbaig @ ist ac at
hofheinz @ inf ethz ch
ckamath @ cse iitb ac in
History
2025-02-19: approved
2025-02-18: received
See all versions
Short URL
https://ia.cr/2025/281
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/281,
      author = {Anasuya Acharya and Karen Azari and Mirza Ahad Baig and Dennis Hofheinz and Chethan Kamath},
      title = {Securely Instantiating 'Half Gates' Garbling in the Standard Model},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/281},
      year = {2025},
      url = {https://eprint.iacr.org/2025/281}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.