Thanks for the context. This brings up a few points.
SPDY (and now HTTP/2) perform automatic compression of headers. The CRIME attack revealed that it was possible for attackers to discover cookies from such compressed headers. HTTP/2 uses HPACK which is not vulnerable to this attack and a since SPDY/3.1 is deprecated and will be removed from Chrome in the near future, you should definitely use HTTP/2, which can be negotiated via NPN or ALPN during the TLS handshake. That being said, Chrome's SPDY/3.1 gzip implementation has been modified to protect against this attack.
Of course, I suspect the compressing the request/response body is probably more important to you than compressing headers. Neither HTTP/2 nor SPDY/3.1 will do this automatically. (Though earlier versions of SPDY did have this capability, it was never implemented in Chrome, as far as I know).
If you want a library for simply compressing/decompressing HPACK headers, you might want to look at the code in Chromium's net/spdy/ repository.
Cheers,
Ryan