TY - GEN
T1 - Authenticated BitGC for Actively Secure Rate-One 2PC
AU - Liu, Hanlin
AU - Wang, Xiao
AU - Yang, Kang
AU - Yu, Yu
N1 - Publisher Copyright:
© International Association for Cryptologic Research 2025.
PY - 2025
Y1 - 2025
N2 - In this paper, we present a constant-round actively secure two-party computation protocol with small communication based on the ring learning with errors (RLWE) assumption with key-dependent message security. Our result builds on the recent BitGC protocol by Liu, Wang, Yang, and Yu (Eurocrypt 2025) with communication of one bit per gate for semi-honest security. First, we achieve a different manner of distributed garbling, where the global correlation is secret-shared among the two parties. The garbler always and only holds the garbled labels corresponding to the wire values when all inputs are zero, while the evaluator holds the labels corresponding to the real evaluation. In the second phase, we run an authentication protocol that requires some extra communication, which allows two parties to check the correct computation of each gate by treating the ciphertext as commitments, now that the global key is distributed. For layered circuits, the extra communication for authentication is o(1) bits per gate, resulting in total communication of 1+o(1) bits per gate. For generic circuits, the extra communication cost can be 1 bit per gate, and thus, the total communication cost would be 2 bits per gate.
AB - In this paper, we present a constant-round actively secure two-party computation protocol with small communication based on the ring learning with errors (RLWE) assumption with key-dependent message security. Our result builds on the recent BitGC protocol by Liu, Wang, Yang, and Yu (Eurocrypt 2025) with communication of one bit per gate for semi-honest security. First, we achieve a different manner of distributed garbling, where the global correlation is secret-shared among the two parties. The garbler always and only holds the garbled labels corresponding to the wire values when all inputs are zero, while the evaluator holds the labels corresponding to the real evaluation. In the second phase, we run an authentication protocol that requires some extra communication, which allows two parties to check the correct computation of each gate by treating the ciphertext as commitments, now that the global key is distributed. For layered circuits, the extra communication for authentication is o(1) bits per gate, resulting in total communication of 1+o(1) bits per gate. For generic circuits, the extra communication cost can be 1 bit per gate, and thus, the total communication cost would be 2 bits per gate.
UR - https://www.scopus.com/pages/publications/105014148906
U2 - 10.1007/978-3-032-01884-7_21
DO - 10.1007/978-3-032-01884-7_21
M3 - 会议稿件
AN - SCOPUS:105014148906
SN - 9783032018830
T3 - Lecture Notes in Computer Science
SP - 652
EP - 687
BT - Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings
A2 - Tauman Kalai, Yael
A2 - Kamara, Seny F.
PB - Springer Science and Business Media Deutschland GmbH
T2 - 45th Annual International Cryptology Conference, CRYPTO 2025
Y2 - 17 August 2025 through 21 August 2025
ER -