[Resource Topic] 2018/578: Optimizing Authenticated Garbling for Faster Secure Two-Party Computation

Welcome to the resource topic for 2018/578

Title:
Optimizing Authenticated Garbling for Faster Secure Two-Party Computation

Authors: Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang

Abstract:

Wang et al. (CCS 2017) recently proposed a protocol for malicious secure two-party computation that represents the state-of-the- art with regard to concrete efficiency in both the single-execution and amortized settings, with or without preprocessing. We show here several optimizations of their protocol that result in a significant improvement in the overall communication and running time. Specifically: - We show how to make the “authenticated garbling” at the heart of their protocol compatible with the half-gate optimization of Zahur et al. (Eurocrypt 2015). We also show how to avoid sending an information-theoretic MAC for each garbled row. These two optimizations give up to a 2.6x improvement in communication, and make the communication of the online phase essentially equivalent to that of state-of-the-art semi-honest secure computation. - We show various optimizations to their protocol for generating AND triples that, overall, result in a 1.5x improvement in the communication and a 2x improvement in the computation for that step.

ePrint: https://eprint.iacr.org/2018/578

Talk: https://www.youtube.com/watch?v=l-xM4RcF0tI

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .