Hierarchy for classes of garbling schemes (Q2820752)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Hierarchy for classes of garbling schemes |
scientific article; zbMATH DE number 6626078
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Hierarchy for classes of garbling schemes |
scientific article; zbMATH DE number 6626078 |
Statements
Hierarchy for classes of garbling schemes (English)
0 references
9 September 2016
0 references
reusable garbled circuits
0 references
garbling schemes
0 references
secure multiparty computations
0 references
adaptive security
0 references
Garbled circuits were introduced by \textit{A. Yao} [How to generate and exchange secrets, IEEE 27th Ann. Symp. FOCS 1986, 162--167 (1986)] as a technique for secure multiparty computation, providing a way to securely evaluating a function \(f\), on argument \(x\). Bellare, Hoang and Rogaway formalized the notion of garbling scheme and the security notions of privacy, obliviousness and authenticity, both in the \textit{static} case [In: Proc. ACM Computer and Communications Security (CCS 2012), ACM, 784--796 (2012)] and in the \textit{adaptive} one \textit{M. Bellare}, \textit{V. T. Hoang} and \textit{P. Rogaway} [Asiacrypt 2012, Lect. Notes Comput. Sci. 7658, 134--153 (2012; Zbl 1292.94027)]. Other security notions and reusable garbled circuits were later proposed by other authors.NEWLINENEWLINEThe present paper proposes new security classes of garbling schemes, allowing ``garbled circuits that provide at least some level of reusability while still being practical to construct'', as well as a hierarchy of those classes, including the previous ones.NEWLINENEWLINE Section II gathers the concepts and terminology relatives to garbling schemes and Sections III and IV describe the security classes of the static and adaptive garbling schemes.NEWLINENEWLINEThe core Section V states and proves relations between security classes of adaptive schemes building up the hierarchy of those classes. For instance if \(C_l\), is a class of adaptive schemes, with \(l\), denoting how many times the adversary is allowed to use the same scheme, Theorem 1 proves that \(C_{l+1}\subsetneqq C_l\), (unless both classes are empty). Finally Section VI provides an interpretation of the hierarchy in terms of directed graph Cartesian product.
0 references
0.8641040325164795
0 references
0.8373158574104309
0 references
0.8310836553573608
0 references
0.8242574334144592
0 references
0.8165147304534912
0 references