Publication: An efficient 2-party private function evaluation protocol based on half gates
dc.contributor.coauthor | Bingol, Muhammed Ali | |
dc.contributor.coauthor | Kiraz, Mehmet Sabir | |
dc.contributor.coauthor | Levi, Albert | |
dc.contributor.department | N/A | |
dc.contributor.kuauthor | Biçer, Osman | |
dc.contributor.kuprofile | PhD Student | |
dc.contributor.schoolcollegeinstitute | Graduate School of Sciences and Engineering | |
dc.contributor.yokid | N/A | |
dc.date.accessioned | 2024-11-09T23:57:48Z | |
dc.date.issued | 2019 | |
dc.description.abstract | Private function evaluation (PFE) is a special case of secure multi-party computation (MPC), where the function to be computed is known by only one party. PFE is useful in several real-life applications where an algorithm or a function itself needs to remain secret for reasons such as protecting intellectual property or security classification level. In this paper, we focus on improving 2-party PFE based on symmetric cryptographic primitives. In this respect, we look back at the seminal PFE framework presented by Mohassel and Sadeghian at Eurocrypt'13. We show how to adapt and utilize the well-known half gates garbling technique (Zahur et al., Eurocrypt'15) to their constant-round 2-party PFE scheme. Compared to their scheme, our resulting optimization significantly improves the efficiency of both the underlying Oblivious Evaluation of Extended Permutation (OEP) and secure 2-party computation (2PC) protocols, and yields a more than 40% reduction in overall communication cost (the computation time is also slightly decreased and the number of rounds remains unchanged). | |
dc.description.indexedby | WoS | |
dc.description.indexedby | Scopus | |
dc.description.issue | 4 | |
dc.description.openaccess | NO | |
dc.description.publisherscope | International | |
dc.description.volume | 62 | |
dc.identifier.doi | 10.1093/comjnl/bxy136 | |
dc.identifier.eissn | 1460-2067 | |
dc.identifier.issn | 0010-4620 | |
dc.identifier.quartile | Q3 | |
dc.identifier.scopus | 2-s2.0-85064182144 | |
dc.identifier.uri | http://dx.doi.org/10.1093/comjnl/bxy136 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/15358 | |
dc.identifier.wos | 465133500009 | |
dc.keywords | Cryptographic protocol | |
dc.keywords | Private function evaluation | |
dc.keywords | Secure multi-party computation | |
dc.keywords | Communication and computation | |
dc.keywords | complexity computation | |
dc.language | English | |
dc.publisher | Oxford Univ Press | |
dc.source | Computer Journal | |
dc.subject | Computer science, Hardware | |
dc.subject | Architecture | |
dc.subject | Information systems | |
dc.subject | Engineering | |
dc.subject | Software engineering | |
dc.subject | Theory methods | |
dc.title | An efficient 2-party private function evaluation protocol based on half gates | |
dc.type | Journal Article | |
dspace.entity.type | Publication | |
local.contributor.authorid | N/A | |
local.contributor.kuauthor | Biçer, Osman |