Securely Instantiating ‘Half Gates’ Garbling in the Standard Model

  • Anasuya Acharya
  • , Karen Azari
  • , Mirza Ahad Baig
  • , Dennis Hofheinz
  • , Chethan Kamath

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Garbling is a fundamental cryptographic primitive, with numerous theoretical and practical applications. Since the first construction by Yao (FOCS’82, ’86), a line of work has concerned itself with reducing the communication and computational complexity of that construction. One of the most efficient garbling schemes presently is the ‘Half Gates’ scheme by Zahur, Rosulek, and Evans (Eurocrypt’15). Despite its widespread adoption, the provable security of this scheme has been based on assumptions whose only instantiations are in idealized models. For example, in their original paper, Zahur, Rosulek, and Evans showed that hash functions satisfying a notion called circular correlation robustness (CCR) suffice for this task, and then proved that CCR secure hash functions can be instantiated in the random permutation model. In this work, we show how to securely instantiate the Half Gates scheme in the standard model. To this end, we first show how this scheme can be securely instantiated given a (family of) weak CCR hash function, a notion that we introduce. Furthermore, we show how a weak CCR hash function can be used to securely instantiate other efficient garbling schemes, namely the ones by Rosulek and Roy (Crypto’21) and Heath (Eurocrypt’24). Thus we believe this notion to be of independent interest. Finally, we construct such weak CCR hash functions using indistinguishability obfuscation and one-way functions. The security proof of this construction constitutes our main technical contribution. While our construction is not practical, it serves as a proof of concept supporting the soundness of these garbling schemes, which we regard to be particularly important given the recent initiative by NIST to standardize garbling, and the optimizations in Half Gates being potentially adopted.

Original languageEnglish
Title of host publicationPublic-Key Cryptography – PKC 2025 - 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, 2025, Proceedings
EditorsTibor Jager, Jiaxin Pan
PublisherSpringer Science and Business Media Deutschland GmbH
Pages37-75
Number of pages39
ISBN (Print)9783031918285
DOIs
StatePublished - 2025
Event28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025 - Røros, Norway
Duration: 12 May 202515 May 2025

Publication series

NameLecture Notes in Computer Science
Volume15677 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025
Country/TerritoryNorway
CityRøros
Period12/05/2515/05/25

Bibliographical note

Publisher Copyright:
© International Association for Cryptologic Research 2025.

Keywords

  • Circular Correlation Robust (CCR) Hashing
  • Garbling Schemes
  • Indistinguishability Obfuscation

Fingerprint

Dive into the research topics of 'Securely Instantiating ‘Half Gates’ Garbling in the Standard Model'. Together they form a unique fingerprint.

Cite this