Abstract
Recent improvements to garbled circuits are mainly focused on reducing their size. The state-of-the-art construction of Rosulek and Roy (Crypto 2021) requires \(1.5\kappa \) bits for garbling AND gates in the free-XOR setting. This is below the previously proven lower bound \(2\kappa \) in the linear garbling model of Zahur, Rosulek, and Evans (Eurocrypt 2015). Recently, Ashur, Hazay, and Satish (eprint 2024/389) proposed a scheme that requires \(4/3\kappa + O(1)\) bits for garbling AND gates. Precisely they extended the idea of slicing introduced by Rosulek and Roy to garble 3-input gates of the form \(g(u,v,w) := u(v+w)\). By setting \(w = 0\), it can be used to garble AND gates with the improved communication costs. However, in this paper, we observe that the scheme proposed by Ashur, Hazy, and Satish leaks information on the permute bits, thereby allowing the evaluator to reveal information on the private inputs. To be precise, we show that in their garbling scheme, the evaluator can compute the bits \(\alpha \) and \(\beta + \gamma \), where \(\alpha \), \(\beta \), and \(\gamma \) are the private permute bits of the input labels A, B, and C, respectively.
In this work, we present an attack on a new garbling scheme proposed by Ashur, Hazay, and Satish [1]. Concurrently to our work, we noticed that Fan, Lu, and Zhou [6] also described an attack on their scheme.
T. Kim—Independent Researcher.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Each of the input labels is a \(\kappa \)-bit string that is assigned to each of the inputs of the gate depending on their logical values. The input labels A, B, and C correspond to the input u, v, and w, respectively.
- 2.
With the free-XOR constraint, recall that \(H(A_0 + B_0) = H(A_1 + B_1)\) and \(H(A_0 + B_1) = H(A_1 + B_0)\).
- 3.
We observe that it is sufficient to consider the case where \( \textbf{R}_X \) is linear rather than of arbitrary degree. This is because when \( \boldsymbol{H} \) consists solely of linear queries, \( \textbf{M} \) is composed only of linear polynomials. For \( \textbf{R}_A (\boldsymbol{A}_0 + x \boldsymbol{\varDelta }) \) to lie within the same column space as \( \textbf{M} \), we deduce that \( \textbf{R}_A \boldsymbol{A}_0 \in \text {span}(\textbf{M}) \) for any \( \boldsymbol{A}_0 \). Therefore, \( \textbf{R}_A \) must also be linear.
- 4.
To simplify discussion, for now, let us presume that the evaluator obtains the values of \(\textbf{R}_A\), \(\textbf{R}_B\) and \(\textbf{R}_C\) precisely at (i, j, k) in a certain way. In other words, we implicitly assume the dicing technique is applied.
- 5.
By a similar argument to (See Footnote 3), it suffices to consider only linear polynomials.
- 6.
In the case that s-sliced labels used, we typically choose \({\mathbb {F}}= {\mathbb {F}}_{2^{\kappa /s}}\).
References
T. Ashur, C. Hazay, and R. Satish. On the feasibility of sliced garbling. Cryptology ePrint Archive, Paper 2024/389, 2024. https://eprint.iacr.org/2024/389.
C. Baek and T. Kim. Can we beat three halves lower bound?: (im)possibility of reducing communication cost for garbled circuits. Cryptology ePrint Archive, Paper 2024/803, 2024. https://eprint.iacr.org/2024/803.
M. Ball, H. Li, H. Lin, and T. Liu. New ways to garble arithmetic circuits. In C. Hazay and M. Stam, editors, Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part II, volume 14005 of Lecture Notes in Computer Science, pages 3–34. Springer, 2023.
D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In H. Ortiz, editor, Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, 1990, Baltimore, Maryland, USA, pages 503–513. ACM, 1990.
M. Bellare, V. T. Hoang, and P. Rogaway. Foundations of garbled circuits. In T. Yu, G. Danezis, and V. D. Gligor, editors, the ACM Conference on Computer and Communications Security, CCS’12, Raleigh, NC, USA, October 16-18, 2012, pages 784–796. ACM, 2012.
L. Fan, Z. Lu, and H. Zhou. Column-wise garbling, and how to go beyond the linear model. IACR Cryptol. ePrint Arch., page 415, 2024.
S. Gueron, Y. Lindell, A. Nof, and B. Pinkas. Fast garbling of circuits under standard assumptions. In I. Ray, N. Li, and C. Kruegel, editors, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pages 567–578. ACM, 2015.
D. Heath and V. Kolesnikov. One hot garbling. In Y. Kim, J. Kim, G. Vigna, and E. Shi, editors, CCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, pages 574–593. ACM, 2021.
D. Heath, V. Kolesnikov, and L. K. L. Ng. Garbled circuit lookup tables with logarithmic number of ciphertexts. In M. Joye and G. Leander, editors, Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part V, volume 14655 of Lecture Notes in Computer Science, pages 185–215. Springer, 2024.
C. Kempka, R. Kikuchi, and K. Suzuki. How to circumvent the two-ciphertext lower bound for linear garbling schemes. In J. H. Cheon and T. Takagi, editors, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, volume 10032 of Lecture Notes in Computer Science, pages 967–997, 2016.
V. Kolesnikov, P. Mohassel, and M. Rosulek. Flexor: Flexible garbling for XOR gates that beats free-xor. In J. A. Garay and R. Gennaro, editors, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II, volume 8617 of Lecture Notes in Computer Science, pages 440–457. Springer, 2014.
V. Kolesnikov and T. Schneider. Improved garbled circuit: Free XOR gates and applications. In L. Aceto, I. Damgård, L. A. Goldberg, M. M. Halldórsson, A. Ingólfsdóttir, and I. Walukiewicz, editors, Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, volume 5126 of Lecture Notes in Computer Science, pages 486–498. Springer, 2008.
M. Naor, B. Pinkas, and R. Sumner. Privacy preserving auctions and mechanism design. In S. I. Feldman and M. P. Wellman, editors, Proceedings of the First ACM Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3-5, 1999, pages 129–139. ACM, 1999.
B. Pinkas, T. Schneider, N. P. Smart, and S. C. Williams. Secure two-party computation is practical. In M. Matsui, editor, Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, volume 5912 of Lecture Notes in Computer Science, pages 250–267. Springer, 2009.
M. Rosulek and L. Roy. Three halves make a whole? beating the half-gates lower bound for garbled circuits. In T. Malkin and C. Peikert, editors, Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part I, volume 12825 of Lecture Notes in Computer Science, pages 94–124. Springer, 2021.
A. C. Yao. Protocols for secure computations (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, USA, 3-5 November 1982, pages 160–164. IEEE Computer Society, 1982.
S. Zahur, M. Rosulek, and D. Evans. Two halves make a whole - reducing data transfer in garbled circuits using half gates. In E. Oswald and M. Fischlin, editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II, volume 9057 of Lecture Notes in Computer Science, pages 220–250. Springer, 2015.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A How to Randomize the Control Bits
In this section, we explain how the dicing technique works from the algebraic perspective. For the sake of readability, we mainly describe the technique with the example of RR21’s construction.
At the beginning of the dicing technique, the garbler chooses \(( \textbf{R}_A, \textbf{R}_B )\) at random among \(2^{14}\) possible choices. Assume that the choice is
It is chosen by setting all the free variables zero except \(e_3 = 1\).
To send the information on \(\textbf{R}\), the garbler encrypts it column by column. More precisely, say \(\textbf{R} = [ \overrightarrow{r_1}, \dots , \overrightarrow{r_4} ]\), where \(\overrightarrow{r_k}\) is the k-th column of \(\textbf{R}\). The garbler makes random oracle queries and define
where \(H^c\) is a random oracle that returns an 1-bit string (it is usually chosen as the least significant bit of outputs by the random oracle).
Given the column \(\overrightarrow{r_k}\) for each k, choose \(\overrightarrow{z_k} := ( z_{k1}, \dots , z_{k5} )^\top \) such that
Then it returns the vector \(\overrightarrow{z_k}\) which comprises the ciphertexts encrypting \(\overrightarrow{r_k}\).
For instance, let us take an example of \(\overrightarrow{r_3} = ( x+\alpha , y )^\top \). By comparing both sides, we have
Let \(\textbf{V}_{ij}\) be the value of \(\textbf{V}\) evaluated at \((x, y) = (i,j)\). Upon receiving \(\overrightarrow{z_k}\), on input \(A^i\) and \(B^j\), the evaluator computes
It is easily verified that \(\overrightarrow{{ \widetilde{r}}_k}\) is the value of \(\overrightarrow{r_k}\) evaluated at \((x,y) = (i,j)\).
We observe that the above argument works in general not only for RR21’s construction. Actually, the control bit randomization is carried out by encrypting each columns of \(\textbf{R}\), the randomly chosen control bits. Moreover, it is encrypted via the same garbling equation as that used for the original garbling construction. In other words, the matrices \(\textbf{M}\) and \(\textbf{V}\) in Eq. (20) are the same as the original garbling equation. The only condition for the control bits encryption to work, it suffices to see whether \(\overrightarrow{r_k}\) belongs to the same space spanned by the columns of \(\textbf{M}\) or \(\textbf{V}\). And it turns out to be equivalent that \(\overrightarrow{r_k}\) satisfies the relation \(\pi _{\textbf{V}}\) in Sect. 5. Recall that \(\overrightarrow{r_k}\) is the column of \(\textbf{R}\). We observe that \(\textbf{R}\), thus each of its columns, satisfies the relation \(\pi _{\textbf{V}}\) which is the desired result. Henceforth, we argue that the control bit randomization is always possible with its original garbling equation.
To help readers’ understanding, let us call back the previous example of the RR21 construction. In this case, the relation \(\pi \) is equivalent to say that the y-coefficient on the top is the same as the x-coefficient of the bottom. We see that, for each \(\overrightarrow{r_k}\), it satisfies the condition.
Let us consider why this technique does not reveal the information on \(\alpha \) and \(\beta \). We see that the entire value of \(\textbf{R}\) will definitely disclose the permute bits. Observe that \(\overrightarrow{z_k}\)’s are encrypting the coefficients of the polynomials in \(\textbf{R}\) using \(\overrightarrow{S}^{con}\). And the decryption only reveals the value of the polynomials in \(\textbf{R}\) evaluated at \((x,y)= (i,j)\). Without knowing the wire labels other than \(A_i\) and \(B_j\), the evaluator cannot evaluate the polynomials outside of (i, j). Thus, it does not disclose the entire information on \(\textbf{R}\).
One might observe that the number of additional ciphertexts required to encrypt the control matrices can be further reduced in RR21’s construction. Let us consider the control matrices given by
where \(r_1(x, y) := \alpha x + (\beta +1) y + c\) and \(r_2(x, y) := (\beta + 1) x + (\alpha + \beta + 1) y + e\) are the polynomials in \({\mathbb {F}}_2[x,y]\), and the bits c and e are randomly chosen. It can be readily verified that the above control matrices yield a correct garbling scheme for RR21’s construction. Thus, it is enough to send only the encryption of \((r_1, r_2)^\top \), instead of sending entire encryptions of all columns. Therefore, it reduces the number of ciphertexts garbling the control bits.
B How to Choose Control Matrices
Given the matrix \(\textbf{V}\) as defined in Eq. (13), for any vector \(\boldsymbol{\nu }= \boldsymbol{\nu }_0 + \boldsymbol{\nu }_1 x + \boldsymbol{\nu }_2 y + \boldsymbol{\nu }_3 z \in span(\textbf{V})\), we obtain \(\pi _{\textbf{V}}(\boldsymbol{\nu }_1, \boldsymbol{\nu }_2, \boldsymbol{\nu }_3) = \textbf{P}_1 \boldsymbol{\nu }_1 + \textbf{P}_2 \boldsymbol{\nu }_2 + \textbf{P}_3 \boldsymbol{\nu }_3 = 0\), where
By computing the control matrices satisfying Eq. (15) and (16), we can provide their explicit formula as follows.
1.1 B.1 Formulas for the Control Matrices
We provide explicit formulas for the control matrices.
where all of the entries are binary elements. We observe that the set of the pairs of \((\textbf{R}_A, \textbf{R}_B, \textbf{R}_C)\) is isomorphic to 24-dimensional subspace.
Rights and permissions
Copyright information
© 2025 International Association for Cryptologic Research
About this paper
Cite this paper
Kim, T. (2025). Analysis on Sliced Garbling via Algebraic Approach. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15491. Springer, Singapore. https://doi.org/10.1007/978-981-96-0944-4_8
Download citation
DOI: https://doi.org/10.1007/978-981-96-0944-4_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-0943-7
Online ISBN: 978-981-96-0944-4
eBook Packages: Computer ScienceComputer Science (R0)