2013 IEEE Symposium on Security and Privacy 2013
DOI: 10.1109/sp.2013.39
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Garbling from a Fixed-Key Blockcipher

Abstract: We advocate schemes based on fixed-key AES as the best route to highly efficient circuit-garbling. We provide such schemes making only one AES call per garbled-gate evaluation. On the theoretical side, we justify the security of these methods in the random-permutation model, where parties have access to a public random permutation. On the practical side, we provide the JustGarble system, which implements our schemes. JustGarble evaluates moderate-sized garbled-circuits at an amortized cost of 23.2 cycles per g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
250
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 252 publications
(250 citation statements)
references
References 31 publications
0
250
0
Order By: Relevance
“…Therefore, the cost of the GC protocol can be measured only in terms of the number of AND gates in the circuit. We also use garbling with a fixed-key blockcipher [3] together with the half gates technique [40] for efficient evaluation of AND gates. For OT required in the initial data exchange of the GC protocol, we use the OT Extension method [2,14].…”
Section: Optimizationsmentioning
confidence: 99%
“…Therefore, the cost of the GC protocol can be measured only in terms of the number of AND gates in the circuit. We also use garbling with a fixed-key blockcipher [3] together with the half gates technique [40] for efficient evaluation of AND gates. For OT required in the initial data exchange of the GC protocol, we use the OT Extension method [2,14].…”
Section: Optimizationsmentioning
confidence: 99%
“…Bellare, Hoang, and Keelveedhi [BHK13d] point out that the theorem can be extended to a singlequery source by applying a pseudorandom generator to the output of the hash function. This result is noteworthy as several applications only require the source to make a single query.…”
Section: The Io Attackmentioning
confidence: 99%
“…After we communicated our attack [BHK13d], BHK in the revised version of their paper [BHK13c] also independently suggested the statistical notion of unpredictability. They denote by S sup the class of all statistically unpredictable sources and recast their proofs of the above to use UCE[S sup ].…”
Section: Rka Security Of Brsmentioning
confidence: 99%
See 2 more Smart Citations