Garbled RAM revisited

82Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The notion of garbled random-access machines (garbled RAMs) was introduced by Lu and Ostrovsky (Eurocrypt 2013). It can be seen as an analogue of Yao's garbled circuits, that allows a user to garble a RAM program directly, without performing the expensive step of converting it into a circuit. In particular, the size of the garbled program and the time it takes to create and evaluate it are only proportional to its running time on a RAM rather than its circuit size. Lu and Ostrovsky gave a candidate construction of this primitive based on pseudo-random functions (PRFs). The starting point of this work is pointing out a subtle circularity hardness assumption in the Lu-Ostrovsky construction. Specifically, the construction requires a complex "circular" security assumption on the underlying Yao garbled circuits and PRFs. We then proceed to abstract, simplify and generalize the main ideas behind the Lu-Ostrovsky construction, and show two alternatives constructions that overcome the circularity of assumptions. Our first construction breaks the circularity by replacing the PRF-based encryption in the Lu-Ostrovsky construction by identity-based encryption (IBE). The result retains the same asymptotic performance characteristics of the original Lu-Ostrovsky construction, namely overhead of O(poly(k)polylog(n)) (with k the security parameter and n the data size). Our second construction breaks the circularity assuming only the existence of one way functions, but with overhead O(poly(k)nε) for any constant ε > 0. This construction works by adaptively "revoking" the PRFs at selected points, and using a delicate recursion argument to get successively better performance characteristics. It remains as an interesting open problem to achieve an overhead of poly(k)polylog(n) assuming only the existence of one-way functions. © 2014 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Gentry, C., Halevi, S., Lu, S., Ostrovsky, R., Raykova, M., & Wichs, D. (2014). Garbled RAM revisited. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8441 LNCS, pp. 405–422). Springer Verlag. https://doi.org/10.1007/978-3-642-55220-5_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free