Efficient Secure Computation with Garbled Circuits

Yan Huang, Chih-hao Shen, David Evans, Jonathan Katz, and abhi shelat
Seventh International Conference on Information Systems Security (ICISS 2011)
(Invited Paper)
15-19 December 2011
Jadavpur University, Kolkata


Secure two-party computation enables applications in which participants compute the output of a function that depends on their private inputs, without revealing those inputs or relying on any trusted third party. In this paper, we show the potential of building privacy-preserving applications using garbled circuits, a generic technique that until recently was believed to be too inefficient to scale to realistic problems. We present a Java-based framework that uses pipelining and circuit-level optimizations to build efficient and scalable privacy-preserving applications. Although the standard garbled circuit protocol assumes a very week, honest-but-curious adversary, techniques are available for converting such protocols to resist stronger adversaries, including fully malicious adversaries. We summarize approaches to producing malicious-resistant secure computations that reduce the costs of transforming a protocol to be secure against stronger adversaries. In addition, we summarize results on ensuring fairness, the property that either both parties receive the result or neither party does. Several open problems remain, but as theory and pragmatism advance, secure computation is approaching the point where it offers practical solutions for a wide variety of important problems.


Full paper (21 pages): [PDF (21 pages)]
Springer Copyright Form (that justifies this open posting): [PDF]

Secure Computation Project site