Skip to main content

Analysis on Sliced Garbling via Algebraic Approach

  • Conference paper
  • First Online:
Advances in Cryptology – ASIACRYPT 2024 (ASIACRYPT 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15491))

  • 195 Accesses

Abstract

Recent improvements to garbled circuits are mainly focused on reducing their size. The state-of-the-art construction of Rosulek and Roy (Crypto 2021) requires \(1.5\kappa \) bits for garbling AND gates in the free-XOR setting. This is below the previously proven lower bound \(2\kappa \) in the linear garbling model of Zahur, Rosulek, and Evans (Eurocrypt 2015). Recently, Ashur, Hazay, and Satish (eprint 2024/389) proposed a scheme that requires \(4/3\kappa + O(1)\) bits for garbling AND gates. Precisely they extended the idea of slicing introduced by Rosulek and Roy to garble 3-input gates of the form \(g(u,v,w) := u(v+w)\). By setting \(w = 0\), it can be used to garble AND gates with the improved communication costs. However, in this paper, we observe that the scheme proposed by Ashur, Hazy, and Satish leaks information on the permute bits, thereby allowing the evaluator to reveal information on the private inputs. To be precise, we show that in their garbling scheme, the evaluator can compute the bits \(\alpha \) and \(\beta + \gamma \), where \(\alpha \), \(\beta \), and \(\gamma \) are the private permute bits of the input labels A, B, and C, respectively.

In this work, we present an attack on a new garbling scheme proposed by Ashur, Hazay, and Satish [1]. Concurrently to our work, we noticed that Fan, Lu, and Zhou [6] also described an attack on their scheme.

T. Kim—Independent Researcher.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Each of the input labels is a \(\kappa \)-bit string that is assigned to each of the inputs of the gate depending on their logical values. The input labels A, B, and C correspond to the input u, v, and w, respectively.

  2. 2.

    With the free-XOR constraint, recall that \(H(A_0 + B_0) = H(A_1 + B_1)\) and \(H(A_0 + B_1) = H(A_1 + B_0)\).

  3. 3.

    We observe that it is sufficient to consider the case where \( \textbf{R}_X \) is linear rather than of arbitrary degree. This is because when \( \boldsymbol{H} \) consists solely of linear queries, \( \textbf{M} \) is composed only of linear polynomials. For \( \textbf{R}_A (\boldsymbol{A}_0 + x \boldsymbol{\varDelta }) \) to lie within the same column space as \( \textbf{M} \), we deduce that \( \textbf{R}_A \boldsymbol{A}_0 \in \text {span}(\textbf{M}) \) for any \( \boldsymbol{A}_0 \). Therefore, \( \textbf{R}_A \) must also be linear.

  4. 4.

    To simplify discussion, for now, let us presume that the evaluator obtains the values of \(\textbf{R}_A\), \(\textbf{R}_B\) and \(\textbf{R}_C\) precisely at (ijk) in a certain way. In other words, we implicitly assume the dicing technique is applied.

  5. 5.

    By a similar argument to (See Footnote 3), it suffices to consider only linear polynomials.

  6. 6.

    In the case that s-sliced labels used, we typically choose \({\mathbb {F}}= {\mathbb {F}}_{2^{\kappa /s}}\).

References

  1. T. Ashur, C. Hazay, and R. Satish. On the feasibility of sliced garbling. Cryptology ePrint Archive, Paper 2024/389, 2024. https://eprint.iacr.org/2024/389.

  2. C. Baek and T. Kim. Can we beat three halves lower bound?: (im)possibility of reducing communication cost for garbled circuits. Cryptology ePrint Archive, Paper 2024/803, 2024. https://eprint.iacr.org/2024/803.

  3. M. Ball, H. Li, H. Lin, and T. Liu. New ways to garble arithmetic circuits. In C. Hazay and M. Stam, editors, Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part II, volume 14005 of Lecture Notes in Computer Science, pages 3–34. Springer, 2023.

    Google Scholar 

  4. D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In H. Ortiz, editor, Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, 1990, Baltimore, Maryland, USA, pages 503–513. ACM, 1990.

    Google Scholar 

  5. M. Bellare, V. T. Hoang, and P. Rogaway. Foundations of garbled circuits. In T. Yu, G. Danezis, and V. D. Gligor, editors, the ACM Conference on Computer and Communications Security, CCS’12, Raleigh, NC, USA, October 16-18, 2012, pages 784–796. ACM, 2012.

    Google Scholar 

  6. L. Fan, Z. Lu, and H. Zhou. Column-wise garbling, and how to go beyond the linear model. IACR Cryptol. ePrint Arch., page 415, 2024.

    Google Scholar 

  7. S. Gueron, Y. Lindell, A. Nof, and B. Pinkas. Fast garbling of circuits under standard assumptions. In I. Ray, N. Li, and C. Kruegel, editors, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pages 567–578. ACM, 2015.

    Google Scholar 

  8. D. Heath and V. Kolesnikov. One hot garbling. In Y. Kim, J. Kim, G. Vigna, and E. Shi, editors, CCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, pages 574–593. ACM, 2021.

    Google Scholar 

  9. D. Heath, V. Kolesnikov, and L. K. L. Ng. Garbled circuit lookup tables with logarithmic number of ciphertexts. In M. Joye and G. Leander, editors, Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part V, volume 14655 of Lecture Notes in Computer Science, pages 185–215. Springer, 2024.

    Google Scholar 

  10. C. Kempka, R. Kikuchi, and K. Suzuki. How to circumvent the two-ciphertext lower bound for linear garbling schemes. In J. H. Cheon and T. Takagi, editors, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, volume 10032 of Lecture Notes in Computer Science, pages 967–997, 2016.

    Google Scholar 

  11. V. Kolesnikov, P. Mohassel, and M. Rosulek. Flexor: Flexible garbling for XOR gates that beats free-xor. In J. A. Garay and R. Gennaro, editors, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II, volume 8617 of Lecture Notes in Computer Science, pages 440–457. Springer, 2014.

    Google Scholar 

  12. V. Kolesnikov and T. Schneider. Improved garbled circuit: Free XOR gates and applications. In L. Aceto, I. Damgård, L. A. Goldberg, M. M. Halldórsson, A. Ingólfsdóttir, and I. Walukiewicz, editors, Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, volume 5126 of Lecture Notes in Computer Science, pages 486–498. Springer, 2008.

    Google Scholar 

  13. M. Naor, B. Pinkas, and R. Sumner. Privacy preserving auctions and mechanism design. In S. I. Feldman and M. P. Wellman, editors, Proceedings of the First ACM Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3-5, 1999, pages 129–139. ACM, 1999.

    Google Scholar 

  14. B. Pinkas, T. Schneider, N. P. Smart, and S. C. Williams. Secure two-party computation is practical. In M. Matsui, editor, Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, volume 5912 of Lecture Notes in Computer Science, pages 250–267. Springer, 2009.

    Google Scholar 

  15. M. Rosulek and L. Roy. Three halves make a whole? beating the half-gates lower bound for garbled circuits. In T. Malkin and C. Peikert, editors, Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part I, volume 12825 of Lecture Notes in Computer Science, pages 94–124. Springer, 2021.

    Google Scholar 

  16. A. C. Yao. Protocols for secure computations (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, USA, 3-5 November 1982, pages 160–164. IEEE Computer Society, 1982.

    Google Scholar 

  17. S. Zahur, M. Rosulek, and D. Evans. Two halves make a whole - reducing data transfer in garbled circuits using half gates. In E. Oswald and M. Fischlin, editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II, volume 9057 of Lecture Notes in Computer Science, pages 220–250. Springer, 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taechan Kim .

Editor information

Editors and Affiliations

Appendices

A How to Randomize the Control Bits

In this section, we explain how the dicing technique works from the algebraic perspective. For the sake of readability, we mainly describe the technique with the example of RR21’s construction.

At the beginning of the dicing technique, the garbler chooses \(( \textbf{R}_A, \textbf{R}_B )\) at random among \(2^{14}\) possible choices. Assume that the choice is

$$ \textbf{R} = [ \textbf{R}_A \vert \textbf{R}_B ] = \left[ \begin{array}{cc|cc} ~0~ & ~0~ & ~ x + \alpha ~ & ~ y + \beta + 1 ~ \\ 0 & 0 & y & x \end{array} \right] . $$

It is chosen by setting all the free variables zero except \(e_3 = 1\).

To send the information on \(\textbf{R}\), the garbler encrypts it column by column. More precisely, say \(\textbf{R} = [ \overrightarrow{r_1}, \dots , \overrightarrow{r_4} ]\), where \(\overrightarrow{r_k}\) is the k-th column of \(\textbf{R}\). The garbler makes random oracle queries and define

$$\begin{aligned} \overrightarrow{S}^{con} := \left( H^c(A^0), H^c(A^1), H^c(B^0), H^c(B^1), H^c(A^0+B^0), H^c(A^0+B^1) \right) ^\top , \end{aligned}$$

where \(H^c\) is a random oracle that returns an 1-bit string (it is usually chosen as the least significant bit of outputs by the random oracle).

Given the column \(\overrightarrow{r_k}\) for each k, choose \(\overrightarrow{z_k} := ( z_{k1}, \dots , z_{k5} )^\top \) such that

$$\begin{aligned} \textbf{V} \overrightarrow{z_k} = \textbf{M} \overrightarrow{S}^{con} + \overrightarrow{r_k}. \end{aligned}$$
(20)

Then it returns the vector \(\overrightarrow{z_k}\) which comprises the ciphertexts encrypting \(\overrightarrow{r_k}\).

For instance, let us take an example of \(\overrightarrow{r_3} = ( x+\alpha , y )^\top \). By comparing both sides, we have

$$ \begin{array}{cl} z_{31} = & H^c(A^0) + H^c(A^0+B^0) + \alpha \\ z_{32} = & H^c(B^0) + H^c(A^0+B^0) \\ z_{33} = & H^c(A^0) + H^c(A^1) + 1 \\ z_{34} = & H^c(B^0) + H^c(B^1) + 1 \\ z_{35} = & H^c(A^0+B^0) + H^c(A^0+B^1). \end{array} $$

Let \(\textbf{V}_{ij}\) be the value of \(\textbf{V}\) evaluated at \((x, y) = (i,j)\). Upon receiving \(\overrightarrow{z_k}\), on input \(A^i\) and \(B^j\), the evaluator computes

$$ \overrightarrow{{ \widetilde{r}}_k} = \textbf{V}_{ij} \overrightarrow{z_k} + \begin{bmatrix} ~1~ & 0 & ~1~ \\ 0 & 1 & 1 \end{bmatrix} \begin{bmatrix} H(A^i) \\ H(B^j) \\ H(A^i+B^j) \end{bmatrix}. $$

It is easily verified that \(\overrightarrow{{ \widetilde{r}}_k}\) is the value of \(\overrightarrow{r_k}\) evaluated at \((x,y) = (i,j)\).

We observe that the above argument works in general not only for RR21’s construction. Actually, the control bit randomization is carried out by encrypting each columns of \(\textbf{R}\), the randomly chosen control bits. Moreover, it is encrypted via the same garbling equation as that used for the original garbling construction. In other words, the matrices \(\textbf{M}\) and \(\textbf{V}\) in Eq. (20) are the same as the original garbling equation. The only condition for the control bits encryption to work, it suffices to see whether \(\overrightarrow{r_k}\) belongs to the same space spanned by the columns of \(\textbf{M}\) or \(\textbf{V}\). And it turns out to be equivalent that \(\overrightarrow{r_k}\) satisfies the relation \(\pi _{\textbf{V}}\) in Sect. 5. Recall that \(\overrightarrow{r_k}\) is the column of \(\textbf{R}\). We observe that \(\textbf{R}\), thus each of its columns, satisfies the relation \(\pi _{\textbf{V}}\) which is the desired result. Henceforth, we argue that the control bit randomization is always possible with its original garbling equation.

To help readers’ understanding, let us call back the previous example of the RR21 construction. In this case, the relation \(\pi \) is equivalent to say that the y-coefficient on the top is the same as the x-coefficient of the bottom. We see that, for each \(\overrightarrow{r_k}\), it satisfies the condition.

Let us consider why this technique does not reveal the information on \(\alpha \) and \(\beta \). We see that the entire value of \(\textbf{R}\) will definitely disclose the permute bits. Observe that \(\overrightarrow{z_k}\)’s are encrypting the coefficients of the polynomials in \(\textbf{R}\) using \(\overrightarrow{S}^{con}\). And the decryption only reveals the value of the polynomials in \(\textbf{R}\) evaluated at \((x,y)= (i,j)\). Without knowing the wire labels other than \(A_i\) and \(B_j\), the evaluator cannot evaluate the polynomials outside of (ij). Thus, it does not disclose the entire information on \(\textbf{R}\).

One might observe that the number of additional ciphertexts required to encrypt the control matrices can be further reduced in RR21’s construction. Let us consider the control matrices given by

$$ \begin{bmatrix} \textbf{R}_A \mid \textbf{R}_B \end{bmatrix} = \left[ \begin{array}{cc|cc} r_1 & r_2 & r_2 + x & r_1 + r_2 + y \\ r_2 & r_1 + r_2 & r_1 + r_2 & r_1 + x \end{array} \right] $$

where \(r_1(x, y) := \alpha x + (\beta +1) y + c\) and \(r_2(x, y) := (\beta + 1) x + (\alpha + \beta + 1) y + e\) are the polynomials in \({\mathbb {F}}_2[x,y]\), and the bits c and e are randomly chosen. It can be readily verified that the above control matrices yield a correct garbling scheme for RR21’s construction. Thus, it is enough to send only the encryption of \((r_1, r_2)^\top \), instead of sending entire encryptions of all columns. Therefore, it reduces the number of ciphertexts garbling the control bits.

B How to Choose Control Matrices

Given the matrix \(\textbf{V}\) as defined in Eq. (13), for any vector \(\boldsymbol{\nu }= \boldsymbol{\nu }_0 + \boldsymbol{\nu }_1 x + \boldsymbol{\nu }_2 y + \boldsymbol{\nu }_3 z \in span(\textbf{V})\), we obtain \(\pi _{\textbf{V}}(\boldsymbol{\nu }_1, \boldsymbol{\nu }_2, \boldsymbol{\nu }_3) = \textbf{P}_1 \boldsymbol{\nu }_1 + \textbf{P}_2 \boldsymbol{\nu }_2 + \textbf{P}_3 \boldsymbol{\nu }_3 = 0\), where

$$\begin{aligned} \textbf{P} = \left[ \textbf{P}_1 \mid \textbf{P}_2 \mid \textbf{P}_3 \right] = \left[ \begin{array}{ccc|ccc|ccc} 1~ & 0~ & 1~ & ~0~ & 0~ & 0~ & ~0~ & 0~ & 0~ \\ 0~ & 0~ & 0~ & ~1~ & 1~ & 0~ & ~0~ & 0~ & 0~ \\ 0~ & 0~ & 0~ & ~0~ & 0~ & 0~ & ~0~ & 1~ & 1~ \\ 0~ & 1~ & 0~ & ~0~ & 0~ & 1~ & ~0~ & 0~ & 0~ \\ 0~ & 0~ & 0~ & ~0~ & 0~ & 1~ & ~1~ & 0~ & 0~ \end{array} \right] . \end{aligned}$$
(21)

By computing the control matrices satisfying Eq. (15) and (16), we can provide their explicit formula as follows.

1.1 B.1 Formulas for the Control Matrices

We provide explicit formulas for the control matrices.

$$\begin{aligned} \textbf{R}_A &= \left[ \begin{array}{ccc} a_0 & ~b_0~ & c_0 \\ a_1 & ~b_1~ & c_1 \\ a_0+\beta +\gamma & ~b_0~ & c_0 + \beta + \gamma \end{array} \right] + \left[ \begin{array}{ccc} a_3 & ~b_3~ & c_3 \\ a_4 & ~b_4~ & c_4 \\ a_3 & ~b_3~ & c_3 \end{array} \right] x \nonumber \\ &\quad + \left[ \begin{array}{ccc} a_4 + 1 & ~b_4~ & c_4 + 1 \\ a_4 + 1 & ~b_4~ & c_4 + 1 \\ a_4 & ~b_4~ & c_4 \end{array} \right] y + \left[ \begin{array}{ccc} a_4 & ~b_4~ & c_4 \\ a_4 + 1 & ~b_4~ & c_4 + 1 \\ a_4 + 1 & ~b_4~ & c_4 + 1 \end{array} \right] z\nonumber \\ \textbf{R}_B &= \left[ \begin{array}{ccc} d_0 & ~e_0~ & f_0 \\ d_0 + \alpha & ~e_0 + \alpha ~ & f_0 \\ a_1 + 1 & ~b_1 + \beta + \gamma + 1~ & c_1 + \alpha + 1 \end{array} \right] + \left[ \begin{array}{ccc} a_4 & ~b_4~ & c_4 +1 \\ a_4 + 1 & ~ b_4 + 1~ & c_4 + 1 \\ a_4 & ~b_4~ & c_4 + 1 \end{array} \right] x\nonumber \\ &\quad + \left[ \begin{array}{ccc} d_5 & ~e_5~ & f_5 \\ d_5 & ~e_5~ & f_5 \\ a_4 + 1 & ~b_4 + 1~ & c_4 + 1 \end{array} \right] y+ \left[ \begin{array}{ccc} a_4 + 1 & ~b_4 + 1~ & c_4 + 1 \\ a_4 + 1 & ~b_4 + 1~ & c_4 + 1 \\ a_4 + 1 & ~b_4 + 1~ & c_4 + 1 \end{array} \right] z \nonumber \\ \textbf{R}_C &= \left[ \begin{array}{ccc} a_1 + \alpha + 1 & ~b_1 + \beta + \gamma + 1~ & c_1 + 1 \\ g_1 & ~ h_1 ~ & i_1 \\ g_1 & ~ h_1 + \alpha ~ & i_1 + \alpha \end{array} \right] + \left[ \begin{array}{ccc} a_4 + 1 & ~b_4~ & c_4 \\ a_4 + 1 & ~ b_4 + 1~ & c_4 + 1 \\ a_4 + 1 & ~b_4~ & c_4 \end{array} \right] x\nonumber \\ &\quad + \left[ \begin{array}{ccc} a_4 + 1 & ~b_4 + 1~ & c_4 + 1 \\ a_4 + 1 & ~b_4 + 1~ & c_4 + 1 \\ a_4 + 1 & ~b_4 + 1~ & c_4 + 1 \end{array} \right] y + \left[ \begin{array}{ccc} a_4 + 1 & ~b_4 + 1~ & c_4 + 1 \\ g_6 & ~ h_6 ~ & i_6 \\ g_6 & ~ h_6 ~ & i_6 \end{array} \right] z, \end{aligned}$$
(22)

where all of the entries are binary elements. We observe that the set of the pairs of \((\textbf{R}_A, \textbf{R}_B, \textbf{R}_C)\) is isomorphic to 24-dimensional subspace.

Rights and permissions

Reprints and permissions

Copyright information

© 2025 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, T. (2025). Analysis on Sliced Garbling via Algebraic Approach. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15491. Springer, Singapore. https://doi.org/10.1007/978-981-96-0944-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-96-0944-4_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-96-0943-7

  • Online ISBN: 978-981-96-0944-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics