Private Computing with Garbled Circuits [Applications Corner]

Private computing provides a clever way to process data without revealing any details about the data itself to the party in charge of processing it. When the to-beprocessed data is a signal, private computing is customarily referred to as SPED, which stands for signal processing in the encrypted domain, since signal protection is usually achieved by encrypting the signals and processing them in encrypted form. Yao's garbled circuits (GCs) theory is one of the most used approaches to private computing. It permits the evaluation of binary circuits on input bits privately owned by the two parties involved in the computation, so that the final result is available to one of them (or both), while intermediate values cannot be discovered by any of the parties.The scope of this paper is to introduce the readers to GC's theory and provide some hints for its use in practical applications.

[1]  Moni Naor,et al.  Efficient oblivious transfer protocols , 2001, SODA '01.

[2]  Vladimir Kolesnikov,et al.  Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.

[3]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.

[4]  Donald Beaver,et al.  Precomputing Oblivious Transfer , 1995, CRYPTO.

[5]  Ahmad-Reza Sadeghi,et al.  Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Mauro Barni,et al.  An efficient protocol for private iris-code matching by means of garbled circuits , 2012, 2012 19th IEEE International Conference on Image Processing.

[7]  Thomas Schneider,et al.  Engineering Secure Two-Party Computation Protocols , 2012, Springer Berlin Heidelberg.

[8]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.