Skip to main content

Circuit Optimizations and Constructions

  • Chapter
  • First Online:
  • 763 Accesses

Abstract

The complexity of many cryptographic protocols, including today’s most efficient Secure Function Evaluation (SFE) protocols, depends linearly on the size of the boolean circuit representation of the function to be evaluated. In this chapter we show how to optimize boolean circuits for cryptographic protocols and give efficient circuit constructions. We first motivate protocols that allow “free” evaluation of XOR gates: (SFE), Homomorphic Encryption (HE), and zero-knowledge (Introduction). Afterwards, we give optimization algorithms that reduce the size of boolean circuits in particular when XOR gates can be evaluated “for free” in circuit optimizations. In circuit constructions we show how our optimizations allow one to construct more efficient circuits for standard functionalities such as integer comparison. We also give efficient circuit constructions for computing minima (or maxima) and for fast multiplication. As applications we consider efficient protocols for secure comparison and first-price auctions in applications: secure comparison auctions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Multiplicative complexity of a function measures the number of AND gates in its circuit (and gives NOT and XOR gates for free).

  2. 2.

    To simplify presentation we write the number of bits of a variable as superscript index.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Schneider .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schneider, T. (2012). Circuit Optimizations and Constructions. In: Engineering Secure Two-Party Computation Protocols. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30042-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30042-4_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30041-7

  • Online ISBN: 978-3-642-30042-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics