Valiantβs Universal Circuit is Practical
Γgnes Kiss Thomas Schneider TU Darmstadt Eurocrypt 2016 May 11, 2016
is Practical gnes Kiss Thomas Schneider TU Darmstadt Eurocrypt - - PowerPoint PPT Presentation
Valiant s Universal Circuit is Practical gnes Kiss Thomas Schneider TU Darmstadt Eurocrypt 2016 May 11, 2016 Universal Circuit (UC) There is a Boolean circuit of size O log for which it holds that for any Boolean
Γgnes Kiss Thomas Schneider TU Darmstadt Eurocrypt 2016 May 11, 2016
Leslie G. Valiant 1976
2
Leslie G. Valiant 1976
2
Verifiable computation Program obfuscation Attribute-based encryption Private function evaluation
3
4
4
4
4
βͺ Yaoβs Garbled Circuit Protocol βͺ Goldreich-Micali-Wigderson Protocol
Boolean circuit
4
5
5
5
Software diagnostics Medical diagnostics Private databases Private search queries
6
7
7
7
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976. [KS08] V. Kolesnikov, T. Schneider: A practical universal circuit construction and secure evaluation of private functions. In FC 2008.
8
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976.
9
10
11
12
... ... ... ...
12
π 8 111 ππ» π 8 112
π 8 121 ππ» π 8 122
π 8 211 ππ» π 8 212
π 8 221 ππ» π 8 222
12
π 8 111 ππ» π 8 112
π 8 121 ππ» π 8 122
π 8 211 ππ» π 8 212
π 8 221 ππ» π 8 222
12
13
13
13
13
13
13
13
13
13
14
π 8 111 ππ» π 8 112
π 8 121 ππ» π 8 122
π 8 211 ππ» π 8 212
π 8 221 ππ» π 8 222
15
16
Our upper bound Our lower bound
Size of the universal graph Size of original graph
Exact number of nodes πΊ π = 2πΊ
πβ2 2
+ 5 πβ2
2
, if π is even πΊ π = πΊ
πβ1 2
+ πΊ
πβ3 2
+ 5 πβ3
2
+ 3, if π is odd
17
Our upper bound: 2.5π log2 π β 9π + 5 log2 π + 10 Our lower bound: 2.5π log2 π β 4π + 2.5 log2 π + 5
Size of the universal graph Size of original graph
Exact number of nodes
17
Devination in percentage Size of original graph
2.5π log2 π β 6.5π + 3.75 log2 π + 7.5 πΊ π = 2πΊ
πβ2 2
+ 5 πβ2
2
, if π is even πΊ π = πΊ
πβ1 2
+ πΊ
πβ3 2
+ 5 πβ3
2
+ 3, if π is odd
18
Size of the universal circuit Number of gates
2860
19
Size of the universal circuit Number of gates
1070 2860
19
Symmetric-key operations
19 656 (DES) 27 429 (AES) 43 874 (MD5) 7 103 (MULT32)
20
Symmetric-key operations
(size)
7 103 (MULT32) 19 656 (DES) 27 429 (AES) 43 874 (MD5) [MS13]: P. Mohassel, S. S. Sadeghian. How to hide circuits in MPC an efficient framework for private function evaluation. In Eurocrypt 2013.
20
21
[MNPS04] D. Malkhi, N. Nisan, B. Pinkas, Y. Sella. Fairplay-Secure Two-Party Computation
22
3 1 1 2 2 3
ID
22
22
22
22
22
23
[DSZ15] D. Demmler, T. Schneider, M. Zohner. ABYβa framework for efficient mixed-protocol secure two-party computation. In NDSS 2015.
23
Private function (circuit size) UC Compile (ms) UC I/O (ms) PFE (GMW) (ms) PFE (Yao) (ms) MULT32 7 103 329 1443 1092 540 DES 19 656 1596 4174 2695 1311 AES 27 429 2104 5064 5522 2349 MD5 43 874 4043 8785 7041 3548
24
25
25
[Val76] L. G. Valiant: Universal circuits (preliminary report). In STOC 1976. [KS08] V. Kolesnikov, T. Schneider: A practical universal circuit construction and secure evaluation of private functions. In FC 2008. [MNPS04] D. Malkhi, N. Nisan, B. Pinkas, Y. Sella. Fairplay-Secure Two- Party Computation System. In USENIX Security Symposium 2004. [MS13]: P. Mohassel, S. S. Sadeghian. How to hide circuits in MPC an efficient framework for private function evaluation. In Eurocrypt 2013. [DSZ15] D. Demmler, T. Schneider, M. Zohner. ABYβa framework for efficient mixed-protocol secure two-party computation. In NDSS 2015.