Reactive garbling: Foundation, instantiation, application

Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

Garbled circuits is a cryptographic technique, which has been used among other things for the construction of two and threeparty secure computation, private function evaluation and secure outsourcing. Garbling schemes is a primitive which formalizes the syntax and security properties of garbled circuits. We define a generalization of garbling schemes called reactive garbling schemes. We consider functions and garbled functions taking multiple inputs and giving multiple outputs. Two garbled functions can be linked together: an encoded output of one garbled function can be transformed into an encoded input of the other garbled function without communication between the parties. Reactive garbling schemes also allow partial evaluation of garbled functions even when only some of the encoded inputs are provided. It is possible to further evaluate the linked garbled functions when more garbled inputs become available. It is also possible to later garble more functions and link them to the ongoing garbled evaluation. We provide rigorous definitions for reactive garbling schemes. We define a new notion of security for reactive garbling schemes called confidentiality. We provide both simulation based and indistinguishability based notions of security. We also show that the simulation based notion of security implies the indistinguishability based notion of security. We present an instantiation of reactive garbling schemes. We finally present an application of reactive garbling schemes to reactive two-party computation secure against a malicious, static adversary.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsJung Hee Cheon, Tsuyoshi Takagi
Number of pages31
Volume10032
PublisherSpringer VS
Publication year2016
Pages1022-1052
ISBN (print)9783662538890
ISBN (Electronic)978-3-662-53890-6
DOIs
Publication statusPublished - 2016
Event22nd International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2016 - Hanoi, Viet Nam
Duration: 4 Dec 20168 Dec 2016

Conference

Conference22nd International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2016
LandViet Nam
ByHanoi
Periode04/12/201608/12/2016
SponsorCISCO, Google, Intel, Microsoft Research , XLIM
SeriesLecture Notes in Computer Science
Volume10032
ISSN0302-9743

See relations at Aarhus University Citationformats

ID: 108371485