Foundations of Secure Computation

Slides:



Advertisements
Similar presentations
Polylogarithmic Private Approximations and Efficient Matching
Advertisements

Constant-Round Private Database Queries Nenad Dedic and Payman Mohassel Boston UniversityUC Davis.
Efficient Private Approximation Protocols Piotr Indyk David Woodruff Work in progress.
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Secure Evaluation of Multivariate Polynomials
Efficient Two-party and Multiparty Computation against Covert Adversaries Vipul Goyal Payman Mohassel Adam Smith Penn Sate UCLAUC Davis.
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
On Fair Exchange, Fair Coins and Fair Sampling Shashank Agrawal, Manoj Prabhakaran University of Illinois at Urbana-Champaign.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
General Cryptographic Protocols (aka secure multi-party computation) Oded Goldreich Weizmann Institute of Science.
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung.
1 Cross-Domain Secure Computation Chongwon Cho (HRL Laboratories) Sanjam Garg (IBM T.J. Watson) Rafail Ostrovsky (UCLA)
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Secure Computation (Lecture 3 & 4) Arpita Patra. Recap >> Why secure computation? >> What is secure (multi-party) computation (MPC)? >> Secret Sharing.
Welcome to to Autumn School! Some practical issues.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
Secure Computation Lecture Arpita Patra. Recap >> MPC with dishonest majority over Boolean circuit- [GMW87] > Oblivious Transfer (from CPA secure.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Paradigms for Multiparty Computation Ivan Damgård BRICS, Århus University.
1 Secure Multi-party Computation Minimizing Online Rounds Seung Geol Choi Columbia University Joint work with Ariel Elbaz(Columbia University) Tal Malkin(Columbia.
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
On the Cryptographic Complexity of the Worst Functions Amos Beimel (BGU) Yuval Ishai (Technion) Ranjit Kumaresan (Technion) Eyal Kushilevitz (Technion)
Secure Computation Lecture Arpita Patra. Recap >> Improving the complexity of GMW > Step I: Offline: O(n 2 c AND ) OTs; Online: i.t., no crypto.
Secure Computation Lecture Arpita Patra. Recap > Shamir Secret-sharing > BGW Protocol based on secret-sharing > Offline/Online phase > Creating.
Feasibility and Completeness of Cryptographic Tasks in the Quantum World Hong-Sheng Zhou (U. Maryland) Joint work with Jonathan Katz (U. Maryland) Fang.
Secure Computation (Lecture 9-10) Arpita Patra. Recap >> MPC with honest majority in i.t. settings > Protocol using (n,t)-sharing, proof of security---
Secure Computation with Minimal Interaction, Revisited Yuval Ishai (Technion) Ranjit Kumaresan (MIT) Eyal Kushilevitz (Technion) Anat Paskin-Cherniavsky.
Secure Computation Lecture Arpita Patra. Recap >Three orthogonal problems- (n,t)-sharing, reconstruction, multiplication protocol > Verifiable Secret.
Improved OT Extension for Transferring Short Secrets Vladimir Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion)
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Lower bounds for Unconditionally Secure MPC Ivan Damgård Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.
Cryptography Lecture 13 Arpita Patra
The Exact Round Complexity of Secure Computation
The Exact Round Complexity of Secure Computation
Carmit Hazay (Bar-Ilan University, Israel)
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Homomorphic encryption of quantum data
Fast Actively Secure OT Extension For Short Secrets
Foundations of Secure Computation
Committed MPC Multiparty Computation from Homomorphic Commitments
Oblivious Transfer and GMW MPC
Secret Sharing (or, more accurately, “Secret Splitting”)
The first Few Slides stolen from Boaz Barak
The Round Complexity of Verifiable Secret Sharing
Course Business I am traveling April 25-May 3rd
Gate Evaluation Secret Sharing and Secure Two-Party Computation
Maliciously Secure Two-Party Computation
Radix 2 Sequential Multipliers
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems Omer Barkol Yuval Ishai Technion.
Secure Multiparty RAM Computation in Constant Rounds
On the Power of Hybrid Networks in Multi-Party Computation
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Cryptography Lecture 7 Arpita Patra © Arpita Patra.
Cryptography for Quantum Computers
Cryptographic protocols 2016, Lecture 9 multi-party computation
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Cryptography Lecture 7 Arpita Patra © Arpita Patra.
Multi-Party Computation: Second year
Round-Optimal and Efficient Verifiable Secret Sharing
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
MPC Scenario 1. “Privacy-protected contingency tables”
Fast Secure Computation for Small Population over the Internet
Cryptography Lecture 8 Arpita Patra © Arpita Patra.
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
Presentation transcript:

Foundations of Secure Computation Arpita Patra © Arpita Patra

GMW87 [GMW87]: How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. STOC 1987. Over Binary circuits

(n,n) - Secret Sharing for Semi-honest Adversaries Secret x is (n,n) if x = x1 + x2 + ….. + xn ; shares are random; all are bits; + is + mod 2 … x2 x3 xn x1 P1 P2 P3 Pn Linearity is satisfied!!

GMW87- Two Party Case x1 x2 x3 x4    y

GMW87- Two Party Case (2, 2)- secret share each input 1 1 (2, 2)- secret share each input  2. Find (2, 2)-sharing of each intermediate value   XOR gate: Non-Interactive x0 x1 P1 P0 + + y1 y0 y x + y x=x0 + x1 y=y0 + y1 x + y=(x0 + y0) + (x1 + y1)

GMW87- Two Party Case (2, 2)- secret share each input 1 1 (2, 2)- secret share each input  2. Find (2, 2)-sharing of each intermediate value   NOT gate: Non-Interactive (One party flips the bit) P1 P0 x0 x1 y x= x0 + x1

GMW87- Two Party Case (2, 2)- secret share each input 1 1 (2, 2)- secret share each input  2. Find (2, 2)-sharing of each intermediate value   XOR gate: Non-Interactive NOT gate: Non-Interactive (One party flips the bit) AND gate: Interactive (OT) y

AND Gate Evaluation x0 P0 P1 x1 y0 y1 y x=x0 + x1 y=y0 + y1 Leaks information from the partial product !! x0 P0 P1 x1   y0 y1 1-out-of-2 OT y1 x0 x0y1 1-out-of-2 OT y0 y0x1 x1 x0y1 + x1y1 x0y0 + y0x1 x  y x=x0 + x1 y=y0 + y1 xy = (x0+x1)  (y0+ y1) = x0y0 + x0y1 + y0x1 + x1y1

AND Gate Evaluation x0 P1 P0 x1 y0 y1 y   1-out-of-2 OT r0 y1 Try doing it using one 1-out-of-4 OT ! x0 P0 P1 x1   y0 y1 1-out-of-2 OT r0 y1 r0 + x0 r0 + x0y1 1-out-of-2 OT y0 r1 r1+ y0x1 r1 + x1 x0y0 + r0 + (r1 + y0x1) (r0 + x0y1)+ r1 + x1y1 x  y x=x0 + x1 y=y0 + y1 xy = (x0+x1)  (y0+ y1) = x0y0 + x0y1 + y0x1 + x1y1

GMW87- Two Party Case (2, 2)- secret share each input 1 1 (2, 2)- secret share each input  2. Find (2, 2)-sharing of each intermediate value   XOR gate: Non-Interactive NOT gate: Non-Interactive (One party flips the bit) AND gate: Interactive (OT) y 3. Reconstruct y by exchanging the shares

Extension to Multiparty Case >> Use (n,n) secret sharing instead of (2,2)-secret sharing >> XOR and NOT gate evaluation extend in natural way in n party case >> AND gate evaluation: xy = (x1+x2 + ……+ xn)  (y1+ y2 + ……+ yn) = n summands that can be locally computed of the form (x1y1, ……, xnyn ) + (n2-n) summands that need 1-out-of-2 OT for (2,2)-sharing ( x1y2 , y1x2 etc) To compute (2,2)-secret sharing of xiyj 1-out-of-2 OT ri yj Pi Pj ri + xi ri + xiyj

AND Gate Evaluation Pn P0 Pi Pj x0 xi xj xn y0 yi yj yn y     Two cross summands xiyj and yixj 1-out-of-2 OT ri yj ri + xi ri + xiyj 1-out-of-2 OT yi rj rj+ yixj rj + xj Pi ‘s share: his summand + 2 shares of two cross terms (for every other party) >> Security will hold even in the presence of (n-1) corruptions. Adv will have no info about the shares held by the sole honest party (reduces to OT security) x  y

OT is Complete for Secure Computation >> the security of GMW is information-theoretic assuming ideal realization of OT. >> the security of GMW relies on crypto only inside the OTs. >> If OT can be realized i.t settings then secure computation via GMW can be done in i.t. settings. >> Unconventional setting (noisy channel) where OT can be realized in i.t. security

Efficiency >> Computation Complexity ≥ Communication Complexity (the parties will send subset of what it computes) >> Unlike i.t. settings computation complexity matters here as we usually work on huge algebraic structures to maintain security I.T settings: k > log n (perfect security) k > 40 (statistical security) Comp. settings: k > 128 (symmetric key) k > 3248 (public key) Multiplication gate computation: O(1) PKE operation [1 PKE Op = one Gen, one Enc, one Dec] Computation Complexity: O(n2cAND) PKE operations Goal: O(n2cAND) SKE operations in offline phase I.T online phase with no operations other than bit XOR. Round Complexity: O(d); d = multiplicative depth of the circuit Goal: Constant? Yes, Yao’s 2PC, BMR90 for MPC

Efficiency Computation Complexity: O(n2cAND) PKE operations Goal: O(n2cAND) SKE operations in offline phase I.T online phase with no operations other than bit XOR. Step 1: O(n2cAND) OTs (PKE operations) in offline phase I.T online phase with no operations other than bit XOR. Step 2: O(n2cAND) SKE operations + k OTs in offline phase I.T online phase with no operations other than bit XOR.

Preprocessing of OT P1 P0 Preprocessing on Random Inputs 1-out-of-2 OT >> Can we run OTs on random inputs in the offline phase and use during online phase.. Preprocessing on Random Inputs 1-out-of-2 OT r0 c P0 P1 r1 rc Computation in Online Phase m0 b m1 z = b + c mb If z = 0 y0 = m0 + r0 y1 = m1 + r1 If z = 1 y0 = m0 + r1 y1 = m1 + r0 y0 , y1 mb = yb + rc

GMW in Offline/Online Setting Offline Phase >> cAND OT operations in the offline phase. >> cAND PKE operations >> Goal: cAND SKE operations + k OT operations (via OT-extension) Online Phase >> Cheap XOR operations in the online phase. >> Information theoretic!!