graphic primitives, it is difficult to assess their effi-
ciency. According to (Wang et al., 2017) both so-
lutions are not practical. Thus, (Wang et al., 2017)
constructed a reusable garbled circuit scheme with a
trade-off between security and privacy. Their solu-
tion does not contain any benchmarks or implementa-
tions. (Gorbunov et al., 2015) proposed a step towards
reusable garbled circuits by encrypting each garbled
value with a seed. For each wire and each gate, a dif-
ferent encryption key is used. The evaluator obtains
an encoded seed in the beginning to evaluate the cir-
cuit. However, their scheme does not achieve input
privacy.
Due to the lack of an existing reusable garbled cir-
cuit implementation, we compare our library with the
alternative of constructing a new Yao’s Garbled Cir-
cuit for each evaluation with a state-of-the-art frame-
work. Multiple libraries have been proposed that
implement Yao’s Garbled Circuit protocol with var-
ious optimizations such as Free XOR (Kolesnikov
and Schneider, 2008). Libraries that offer state-of-
the-art performance and rich functionalities are Tiny-
Garble2 (Hussain et al., 2020), Obliv-C (Zahur and
Evans, 2015), ABY (Demmler et al., 2015), and
EMP SH2PC (Wang et al., 2016). Since (Hussain
et al., 2020) demonstrated that TinyGarble2 outper-
forms Obliv-C and ABY, we chose EMP and Tiny-
Garble2 as our benchmark.
5 CONCLUSION
In this work, we proposed obfuscation-based tech-
niques for constructing completely reusable garbled
circuits (CRGCs) and partially reusable garbled cir-
cuits (PRGCs). We showed that our CRGC library
can evaluate constructed circuits up to 20 times faster
than current state-of-the-art garbled circuit libraries.
CRGCs come with predictable input leakage.
While we were not able to not infer multiple input
bits from our test circuits, certain functionalities or
more sophisticated analyses may do so. In this case,
the generator and evaluator can engage in our hybrid
PRGC protocol to only use a CRGC for evaluating the
sections of the underlying circuit that do not pose in-
put leakage. The remaining sub-circuits can be evalu-
ated by Yao’s Garbled Circuit protocol. Future work
may introduce techniques to increase the number of
gates in the reusable section or find more efficient
ways to construct RGCs for n-party computation.
REFERENCES
Boneh, D., Gentry, C., Gorbunov, S., Halevi, S., Niko-
laenko, V., Segev, G., Vaikuntanathan, V., and
Vinayagamurthy, D. (2014). Fully key-homomorphic
encryption, arithmetic circuit abe and compact gar-
bled circuits. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 533–556. Springer.
Boneh, D., Sahai, A., and Waters, B. (2011). Functional
encryption: Definitions and challenges. In Theory of
Cryptography Conference, pages 253–273. Springer.
Demmler, D., Schneider, T., and Zohner, M. (2015). Aby-
a framework for efficient mixed-protocol secure two-
party computation. In NDSS.
Goldwasser, S., Kalai, Y., Popa, R. A., Vaikuntanathan, V.,
and Zeldovich, N. (2013). Reusable garbled circuits
and succinct functional encryption. In Proceedings of
the forty-fifth annual ACM symposium on Theory of
computing, pages 555–564.
Gorbunov, S., Vaikuntanathan, V., and Wee, H. (2015).
Attribute-based encryption for circuits. Journal of the
ACM (JACM), 62(6):1–33.
Hussain, S., Li, B., Koushanfar, F., and Cammarota, R.
(2020). Tinygarble2: Smart, efficient, and scalable
yao’s garble circuit. In Proceedings of the 2020
Workshop on Privacy-Preserving Machine Learning
in Practice, pages 65–67.
Kolesnikov, V. and Schneider, T. (2008). Improved garbled
circuit: Free xor gates and applications. In Interna-
tional Colloquium on Automata, Languages, and Pro-
gramming, pages 486–498. Springer.
Lemire, D., Boytsov, L., and Kurz, N. (2014). Simd com-
pression and the intersection of sorted integers. Soft-
ware: Practice and Experience, 46.
Lindell, Y. (2017). How to simulate it–a tutorial on the sim-
ulation proof technique. Tutorials on the Foundations
of Cryptography, pages 277–346.
Lindell, Y. (2020). Secure multiparty computation (mpc).
IACR Cryptol. ePrint Arch., 2020:300.
Lindell, Y. and Pinkas, B. (2009). A proof of security of
yao’s protocol for two-party computation. Journal of
cryptology, 22(2):161–188.
Saleem, A., Khan, A., Shahid, F., Alam, M. M., and Khan,
M. K. (2018). Recent advancements in garbled com-
puting: how far have we come towards achieving se-
cure, efficient and reusable garbled circuits. Journal
of Network and Computer Applications, 108:1–19.
Wang, X., Malozemoff, A. J., and Katz, J. (2016). Emp-
toolkit: Efficient multiparty computation toolkit.
Wang, X. A., Xhafa, F., Ma, J., Cao, Y., and Tang, D.
(2017). Reusable garbled gates for new fully homo-
morphic encryption service. International journal of
web and grid services, 13(1):25–48.
Yao, A. C. (1982). Protocols for secure computations. In
23rd annual symposium on foundations of computer
science (sfcs 1982), pages 160–164. IEEE.
Yao, A. C. (1986). How to generate and exchange secrets. In
27th Annual Symposium on Foundations of Computer
Science (sfcs 1986), pages 162–167.
SECRYPT 2022 - 19th International Conference on Security and Cryptography
90