2017
DOI: 10.1007/978-3-319-70697-9_19
|View full text |Cite
|
Sign up to set email alerts
|

JIMU: Faster LEGO-Based Secure Computation Using Additive Homomorphic Hashes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…The second one is the gate-level C&C approach that was introduced by Nielsen and Orlandi [225] and called LEGO, where a lot of individual garbled AND gates are prepared, a random subset of them are opened and verified, and the remaining unchecked garbled gates are soldered to a garbled fault tolerant circuit using the XOR-homomorphic commitments. Subsequently, the LEGO protocol was optimized in [226][227][228][229][230][231]. Compared to the circuit-level C&C approach, the gate-level C&C approach has a lower asymptotic complexity O(ρ/ log |C|) and supports the function-independent preprocessing where both circuit and input are unknown (where such preprocessing is not supported by the circuit-level C&C approach), but is less efficient in the amortized setting and has also lower efficiency for some functions in the single-execution setting.…”
Section: Secure Two-party Computationmentioning
confidence: 99%
“…The second one is the gate-level C&C approach that was introduced by Nielsen and Orlandi [225] and called LEGO, where a lot of individual garbled AND gates are prepared, a random subset of them are opened and verified, and the remaining unchecked garbled gates are soldered to a garbled fault tolerant circuit using the XOR-homomorphic commitments. Subsequently, the LEGO protocol was optimized in [226][227][228][229][230][231]. Compared to the circuit-level C&C approach, the gate-level C&C approach has a lower asymptotic complexity O(ρ/ log |C|) and supports the function-independent preprocessing where both circuit and input are unknown (where such preprocessing is not supported by the circuit-level C&C approach), but is less efficient in the amortized setting and has also lower efficiency for some functions in the single-execution setting.…”
Section: Secure Two-party Computationmentioning
confidence: 99%
“…They then instantiate H as H(x, i) = π(2x ⊕ i) ⊕ 2x ⊕ i, and claim without proof that this satisfies their definition. 5 Zhu et al [54] used a customized garbling scheme with the hash function instantiated as H(x, i) = π(x ⊕ i) ⊕ x ⊕ i. Since the garbling scheme of Zhu et al incorporates the free-XOR optimization [31], a proof of security requires H to satisfy a notion of circular correlation robustness [14].…”
Section: B Garblingmentioning
confidence: 99%
“…Roughly speaking, it requires the garbler to generate a bunch of garbled circuit and sends to the evaluator, the evaluator checks the correctness of some garbled circuits and evaluates the others. Although this solution has been optimized through the works [4], [5], the replication factor of the garbled circuits is at least 2 [6].…”
mentioning
confidence: 99%