Paper 2024/820

Rate-1 Arithmetic Garbling from Homomorphic Secret-Sharing

Pierre Meyer, Aarhus University
Claudio Orlandi, Aarhus University
Lawrence Roy, Aarhus University
Peter Scholl, Aarhus University
Abstract

We present a new approach to garbling arithmetic circuits using techniques from homomorphic secret sharing, obtaining constructions with high rate that support free addition gates. In particular, we build upon non-interactive protocols for computing distributed discrete logarithms in groups with an easy discrete-log subgroup, further demonstrating the versatility of tools from homomorphic secret sharing. Relying on distributed discrete log for the Damgård-Jurik cryptosystem (Roy and Singh, Crypto `21), whose security follows from the decisional composite residuosity assumption (DCR), we get the following main results: [**Two ciphertexts per multiplication, from IND-CPA security of Damgård-Jurik.**] Assuming the Damgård-Jurik cryptosystem is semantically secure (which follows from DCR), there is a garbling scheme for circuits with $B$-bounded integer arithmetic using only two ciphertexts per multiplication. The total bit-size of the resulting garbled circuit is: $$(n + 2s_\times+2D_\times)\cdot (\zeta + 1) \cdot \log N$$ where $n$ is the number of inputs, $s_\times$ is the number of multiplications, $D_\times$ is the multiplicative depth of the circuit, $N$ is an RSA modulus and $N^{\zeta-1}$ is a rough bound on the magnitude of wire values in the computation. [**One ciphertext per multiplication, from KDM security of Damgård-Jurik.**] Assuming the Damgård-Jurik encryption scheme remains secure given encryption of the key and its inverse, the construction achieves rate-$1$. The total bit-size of the resulting garbled circuit is: $$(n + s_\times + 1) \cdot (\zeta + 1) \cdot \log N$$ where the parameters are as above, except $N^{\zeta-2}$ is the magnitude bound. As a side result, we show that our scheme based on IND-CPA security achieves rate $3/5$ for levelled circuits.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
Arithmetic Garbled CircuitHomomorphic Secret SharingDCRDamgård-Jurik cryptosystem
Contact author(s)
pierre meyer @ cs au dk
orlandi @ cs au dk
ldr709 @ gmail com
peter scholl @ cs au dk
History
2024-05-27: approved
2024-05-26: received
See all versions
Short URL
https://ia.cr/2024/820
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/820,
      author = {Pierre Meyer and Claudio Orlandi and Lawrence Roy and Peter Scholl},
      title = {Rate-1 Arithmetic Garbling from Homomorphic Secret-Sharing},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/820},
      year = {2024},
      url = {https://eprint.iacr.org/2024/820}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy