Efficient Multiparty Protocols via Log-Depth Threshold Formulae Ron Rothblum Weizmann Institute Joint work with Gil Cohen, Ivan Damgard, Yuval Ishai, Jonas.

Slides:



Advertisements
Similar presentations
Mix and Match: A Simple Approach to General Secure Multiparty Computation + Markus Jakobsson Bell Laboratories Ari Juels RSA Laboratories.
Advertisements

Dov Gordon & Jonathan Katz University of Maryland.
Secret Sharing Protocols [Sha79,Bla79]
PRG for Low Degree Polynomials from AG-Codes Gil Cohen Joint work with Amnon Ta-Shma.
Are PCPs Inherent in Efficient Arguments? Guy Rothblum, MIT ) MSR-SVC ) IAS Salil Vadhan, Harvard University.
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
How to Fool People to Work on Circuit Lower Bounds Ran Raz Weizmann Institute & Microsoft Research.
Secure Linear Algebra against Covert or Unbounded Adversaries Payman Mohassel and Enav Weinreb UC Davis CWI.
Circuits Resilient to Additive Manipulation with Applications to Secure Computation Yuval Ishai Technion Daniel Genkin Manoj Prabhakaran Amit Sahai Eran.
Private Circuits Protecting Circuits Against Side-Channel Attacks Yuval Ishai Technion & UCLA Based on joint works with Manoj Prabhakaran, Amit Sahai,
Secure Computation of Linear Algebraic Functions
Gate Evaluation Secret Sharing and Secure Two-Party Computation Vladimir Kolesnikov University of Toronto
Secure Evaluation of Multivariate Polynomials
Rarest First and Choke Algorithms are Enough Arnaud LEGOUT INRIA, Sophia Antipolis France G. Urvoy-Keller and P. Michiardi Institut Eurecom France.
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
On Fair Exchange, Fair Coins and Fair Sampling Shashank Agrawal, Manoj Prabhakaran University of Illinois at Urbana-Champaign.
How to Delegate Computations: The Power of No-Signaling Proofs Ron Rothblum Weizmann Institute Joint work with Yael Kalai and Ran Raz.
Achieving Byzantine Agreement and Broadcast against Rational Adversaries Adam Groce Aishwarya Thiruvengadam Ateeq Sharfuddin CMSC 858F: Algorithmic Game.
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Bar-Ilan University Gilad Asharov UCLA Abhishek Jain NYU Adriana.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
General Cryptographic Protocols (aka secure multi-party computation) Oded Goldreich Weizmann Institute of Science.
Impossibility Results for Concurrent Two-Party Computation Yehuda Lindell IBM T.J.Watson.
Information Security for Sensors Overwhelming Random Sequences and Permutations Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, and Paul.
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems Omer Barkol Yuval Ishai Technion.
Secure Multi-party Computations (MPC) A useful tool to cryptographic applications Vassilis Zikas.
How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
1 Cross-Domain Secure Computation Chongwon Cho (HRL Laboratories) Sanjam Garg (IBM T.J. Watson) Rafail Ostrovsky (UCLA)
Tensor-Rank and Lower Bounds for Arithmetic Formulas Ran Raz Weizmann Institute.
Secure Message Transmission In Asynchronous Directed Networks Kannan Srinathan, Center for Security, Theory and Algorithmic Research, IIIT-Hyderabad. In.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
1 New Coins from old: Computing with unknown bias Elchanan Mossel, U.C. Berkeley
1 Secure Multi-party Computation Minimizing Online Rounds Seung Geol Choi Columbia University Joint work with Ariel Elbaz(Columbia University) Tal Malkin(Columbia.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
Interactive Channel Capacity Ran Raz Weizmann Institute Joint work with Gillat Kol Technion.
Optimizing Robustness while Generating Shared Secret Safe Primes Emil Ong and John Kubiatowicz University of California, Berkeley.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
Lecture 14 Multi-party Computation Protocols Stefan Dziembowski MIM UW ver 1.0.
Secure Multiparty Computation and its Applications
Pseudorandom Bits for Constant-Depth Circuits with Few Arbitrary Symmetric Gates Emanuele Viola Harvard University June 2005.
Gillat Kol (IAS) joint work with Anat Ganor (Weizmann) Ran Raz (Weizmann + IAS) Exponential Separation of Information and Communication.
Verifiable Outsourcing of Computation Ron Rothblum.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
Secret Sharing Schemes: A Short Survey Secret Sharing 2.
Linear, Nonlinear, and Weakly-Private Secret Sharing Schemes
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Lower bounds for Unconditionally Secure MPC Ivan Damgård Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.
Random projections and depth hierarchy theorems
Efficient Leakage Resilient Circuit Compilers
The Exact Round Complexity of Secure Computation
Carmit Hazay (Bar-Ilan University, Israel)
Negation-Limited Formulas
TCC 2016-B Composable Security in the Tamper-Proof Hardware Model under Minimal Complexity Carmit Hazay Bar-Ilan University, Israel Antigoni Ourania.
MPC and Verifiable Computation on Committed Data
Foundations of Secure Computation
Committed MPC Multiparty Computation from Homomorphic Commitments
Gate Evaluation Secret Sharing and Secure Two-Party Computation
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems Omer Barkol Yuval Ishai Technion.
Secure Multiparty RAM Computation in Constant Rounds
On the Power of Hybrid Networks in Multi-Party Computation
Four-Round Secure Computation without Setup
Expected Constant-Round Protocols for Broadcast
Non-Malleable Extractors
Malicious-Secure Private Set Intersection via Dual Execution
Secret Sharing: Linear vs. Nonlinear Schemes (A Survey)
Fast Secure Computation for Small Population over the Internet
Helen: Maliciously Secure Coopetitive Learning for Linear Models
Presentation transcript:

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Ron Rothblum Weizmann Institute Joint work with Gil Cohen, Ivan Damgard, Yuval Ishai, Jonas Kolker, Peter Bro Miltersen and Ran Raz

Secure Multiparty Computation (MPC) [Yao86,GMW87] An adversary that controls a (limited) subset of the parties learns nothing more than the inputs and outputs of the parties it controls.

Feasibility Results: Perfect Security [BGW88,CCD88]

Our Contribution Huge body of work on secure MPC but protocols are fairly complicated. We suggest a conceptually simple and flexible approach to designing efficient MPC protocols. Building blocks: 1.Player emulation - builds on Hirt-Maurer [HM00] but with a different motivation. 2.Simple constant-party MPC protocols. 3.Threshold formulae composed of threshold gates.

Applications 1.Conceptually simple protocols for perfectly secure MPC – obtaining passive/active security. 2.New results on feasibility of MPC in a variety of settings, e.g., secure MPC over algebraic structures such as non-Abelian groups. 3.Distributed computing – broadcast/Byzantine agreement.

MPC via Player Emulation [HM00]

MPC via Player Emulation Minimal number of parties needed for security against one passive party

MPC with a Trusted Party

MPC via Player Emulation

The output is sent back to the parties.

MPC via Player Emulation

Associate wires with parties and place 1 on input wires that the adversary controls. If output is 0 then the protocol is secure against this adversary.

MPC via Player Emulation

Comparison with [HM00]

MPC via Player Emulation

3-Party Protocols Can use BGW restricted to 3 parties or better yet use the MPC made simple protocol of [Maurer02]. Maurers protocol is simple and elegant but exponential in the number of parties. For 3 parties– not an issue!

MPC via Player Emulation

Majority from Majorities

Active Security Minimal number of parties for security against one active party

Applications Simplifications*: 1.MPC over fields ([BGW88], [CCD88], [AL13]). 2.MPC over rings ([CFIK03]). 3.MPC over groups ([DPSW07,DPS+12a,DPS12+b]). 4.Distributed computing: broadcast, broadcast from 2-cast ([FM00]). * Caveats: non-optimal threshold and higher polynomial complexity.

Applications

Conclusions and Open Questions MPC methodology: 1.Design simple constant-party protocols. 2.Prove player emulation theorem. Intriguing connections to open questions in complexity-theory: 1.Explicit exact majority-from-majorities formula. 2.Exact threshold-from-thresholds formula (even non-explicit).

Thank you!