Efficient Secure Computation with Garbled Circuits
Title | Efficient Secure Computation with Garbled Circuits |
Publication Type | Journal Articles |
Year of Publication | 2011 |
Authors | Huang Y, Shen C, Evans D, Katz J, Shelat A |
Journal | Information Systems Security |
Pagination | 28 - 48 |
Date Published | 2011/// |
Abstract | Secure two-party computation enables applications in which participants compute the output of a function that depends on their private inputs, without revealing those inputs or relying on any trusted third party. In this paper, we show the potential of building privacy-preserving applications using garbled circuits, a generic technique that until recently was believed to be too inefficient to scale to realistic problems. We present a Java-based framework that uses pipelining and circuit-level optimizations to build efficient and scalable privacy-preserving applications. Although the standard garbled circuit protocol assumes a very week, honest-but-curious adversary, techniques are available for converting such protocols to resist stronger adversaries, including fully malicious adversaries. We summarize approaches to producing malicious-resistant secure computations that reduce the costs of transforming a protocol to be secure against stronger adversaries. In addition, we summarize results on ensuring fairness, the property that either both parties receive the result or neither party does. Several open problems remain, but as theory and pragmatism advance, secure computation is approaching the point where it offers practical solutions for a wide variety of important problems. |
DOI | 10.1007/978-3-642-25560-1_2 |