On the Power of Hybrid Networks in Multi-Party Computation

Slides:



Advertisements
Similar presentations
Secret Sharing Protocols [Sha79,Bla79]
Advertisements

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Ron Rothblum Weizmann Institute Joint work with Gil Cohen, Ivan Damgard, Yuval Ishai, Jonas.
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
Impossibility of Distributed Consensus with One Faulty Process
Secure Multiparty Computations on Bitcoin
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
1 Asynchronous Broadcast Protocols in Distributed System Oct. 10, 2002 JaeHyrk Park ICU.
Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University.
Byzantine Generals Problem: Solution using signed messages.
General Cryptographic Protocols (aka secure multi-party computation) Oded Goldreich Weizmann Institute of Science.
Oblivious Transfer based on the McEliece Assumptions
Secure Multi-party Computations (MPC) A useful tool to cryptographic applications Vassilis Zikas.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung.
Randomized Byzantine Agreements (Sam Toueg 1984).

How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
Secure Message Transmission In Asynchronous Directed Networks Kannan Srinathan, Center for Security, Theory and Algorithmic Research, IIIT-Hyderabad. In.
Adaptively Secure Broadcast, Revisited
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Secure Multi-Party Quantum Computation Michael Ben-Or QCrypt 2013 Tutorial M. Ben-Or, C. Crépeau, D. Gottesman, A.Hassidim, A. Smith, arxiv.org/abs/
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Secure Computation (Lecture 3 & 4) Arpita Patra. Recap >> Why secure computation? >> What is secure (multi-party) computation (MPC)? >> Secret Sharing.
Welcome to to Autumn School! Some practical issues.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase Ronald Cramer, Ivan Damgard, Serge Fehr.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
How to Use Bitcoin to Design Fair Protocols Ranjit Kumaresan (MIT) Joint work with Iddo Bentov (Technion), Tal Moran (IDC Herzliya)
Secure Computation Lecture Arpita Patra. Recap > Shamir Secret-sharing > BGW Protocol based on secret-sharing > Offline/Online phase > Creating.
Feasibility and Completeness of Cryptographic Tasks in the Quantum World Hong-Sheng Zhou (U. Maryland) Joint work with Jonathan Katz (U. Maryland) Fang.
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
Secure Computation (Lecture 9-10) Arpita Patra. Recap >> MPC with honest majority in i.t. settings > Protocol using (n,t)-sharing, proof of security---
Secret Sharing Non-Shannon Information Inequalities Presented in: Theory of Cryptography Conference (TCC) 2009 Published in: IEEE Transactions on Information.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Secure Computation with Minimal Interaction, Revisited Yuval Ishai (Technion) Ranjit Kumaresan (MIT) Eyal Kushilevitz (Technion) Anat Paskin-Cherniavsky.
Secure Computation Lecture Arpita Patra. Recap >Three orthogonal problems- (n,t)-sharing, reconstruction, multiplication protocol > Verifiable Secret.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation Michael Ben-Or Shafi Goldwasser Avi Wigderson Lecture: Mickey Hakimi.
Secret Sharing Schemes: A Short Survey Secret Sharing 2.
The Exact Round Complexity of Secure Computation
The Exact Round Complexity of Secure Computation
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Advanced Computer Networks
Foundations of Secure Computation
Foundations of Secure Computation
Committed MPC Multiparty Computation from Homomorphic Commitments
Laconic Oblivious Transfer and its Applications
Oblivious Transfer and GMW MPC
The Round Complexity of Verifiable Secret Sharing
Ranjit Kumaresan (UMD) Arpita Patra C. Pandu Rangan (IITMadras)
CS60002: Distributed Systems
Secure Multiparty RAM Computation in Constant Rounds
Agreement Protocols CS60002: Distributed Systems
Distributed Systems, Consensus and Replicated State Machines
Cryptography for Quantum Computers
Maya Haridasan April 15th
Fault-tolerant Consensus in Directed Networks Lewis Tseng Boston College Oct. 13, 2017 (joint work with Nitin H. Vaidya)
Expected Constant-Round Protocols for Broadcast
Round-Optimal and Efficient Verifiable Secret Sharing
Fast Secure Computation for Small Population over the Internet
Limits of Practical Sublinear Secure Computation
Presentation transcript:

On the Power of Hybrid Networks in Multi-Party Computation Divya Ravi Advisor: Dr Arpita Patra Indian Institute of Science

Outline Introduction to Secure Multi-party Computation Verifiable Secret Sharing Types of Network Our Results in hybrid network Feasibility results

Secure Multi-Party Computation (MPC) x1 Parties with private inputs Goal : Compute joint function f(x1, x2, x3, x4 ) Mutual Distrust Adversary corrupts t out of n parties Properties Correctness Privacy x4 x2 x3

Verifiable Secret Sharing (VSS) Dealer s - Privacy: Dealer input secret from adversary - Commitment : unique secret defined at end of sharing is reconstructed s1 s2 s3 Reconstruction - Correctness: unique secret is honest dealer’s input Secret s

Types of Network Synchronous Asynchronous Delay bounded by known constant Convenient : Divide protocol into rounds Arbitrary yet finite delay Realistic Does not know how long to wait for Knows exactly how long to wait for Cheater Identified! Is he cheating or slow?

Challenge in Asynchronous Network n parties, t corrupt Cannot afford to wait for all : may lead to endless waiting Can wait for only (n – t) messages Might ignore t honest parties! . Drawbacks: No input provision in MPC. VSS: May not terminate when Dealer corrupt. Low Fault-Tolerance

Bridging the fault-tolerance gap (perfect security) Hybrid Network Synchronous Asynchronous Few synchronous rounds followed by asynchronous 1 Round n >= 3t + 1 n >= 4t + 1 Sufficient for VSS  Impossible for MPC! Necessary: 2; Sufficient: 3 rounds

Our Results Setting : Information-theoretic ; n >= 3t + 1 Goal : Bridge the synchronous v/s asynchronous gap Means: Hybrid Network - few synchronous rounds in beginning [1] Arpita Patra, Divya Ravi “On the power of Hybrid Network in Multi-party Computation”, IEEE Transactions on Information Theory 2018 Minimum number of synchronous Rounds : Improve fault tolerance from t < n/4 to t < n/3? Minimum number of synchronous Rounds : Achieve properties of SVSS / SMPC in hybrid network? AVSS Necessary One [Trivial] Sufficient One AMPC Two Three SVSS Necessary Sufficient Three [GIKR02] SMPC Three Three Three

Impossibility of perfect AMPC with n >= 3t + 1 for hybrid network with one synchronous round n = 4, t = 1 f( *, x2, x3, *) = x2 ∧ x3 Protocol  (x2, x3 ) P1 blocks P4’s messages in asynchronous phase. P1 P4 P2, P3 wait only for (n – t) = (4 – 1) = 3 parties  (1,0)  (0,1)  (1,1) Transcript T(x2, x3) independent of x2 and x3 T(0,1) = T(1,0) = T(1,1) P2 P3 P4’s round 1 messages independent View as in (1,0) View as in (0,1) P2 and P2 output 0. Correctness Fails!

Impossibility of SVSS : 2 synchronous rounds in hybrid network (x, r1) P1 P2 (r2) P1 P2 (r2) (y, r1) (x) (y) P3 (r4) P4 (r3) (r4) P4 P3 (r3) (y) P2 (y, r1) P1 P2 P1 * (r2) P1 (x) (r2) (x, r1) There must exist (r1, r2, r4) such that P3’s view is the same in (x) and (y) P2* (x) (y) (x) (y) (y) (x) (x) P4 P4 P4 * P3 (r3) (r4) P3 (r3) (r4) P3 (r3) (y) E1(x) E2(y) E3(*) P4’s view in E1, E3 is same P2’s view in E2, E3 is same P3’s view in E1, E2 E3 is same {P2, P3, P4} participate in reconstruction with same views across all !

Upper bounds AVSS with t < n/3 : single synchronous round in hybrid network New primitive “Asynchronous Weak Polynomial Sharing” Uses no broadcast, efficient Property of 2d-sharing, useful to design MPC SMPC with t < n/3 : three synchronous rounds in hybrid network Uses 3-round existing SVSS protocol [KKK08] Builds upon the framework of [CHP13] [KKK08] J. Katz, C.-Y. Koo, and R. Kumaresan, “Improving the round complexity of VSS in point-to-point networks,” ICALP 2008. [CHP13] A. Choudhury, M. Hirt, and A. Patra, “Asynchronous multiparty computation with linear communication complexity,” DISC 2013.

Thank You 

Impossibility of SVSS with 2 synchronous rounds n = 4, t = 1 . P1 is dealer (x) (y) (r1, r2, r3, r4) (r1, r2, r3, r4) R1 2→1 3→1 4→1 1→2 3→2 4→2 1→3 2→3 4→3 1→4 2→4 3→4 1→3 2→3 4→3 1→3 2→3 4→3 1→4 2→4 2→1 4→1 1→2 4→2 3 →1 3 →1 3 →2 3 →2 3→4 3→4 R2 Async There must exist (r1, r2, r4) such that P3’s view is the same in (x) and (y)

(x) (y) E3(*) P2* E2(y) P1* E1(x) R1 R1 R2 R2 Async Async P4* 2→1 3→1 4→1 1→2 3→2 4→2 1→3 2→3 4→3 1→4 2→4 3→4 R1 2→1 3→1 4→1 1→2 3→2 4→2 1→3 2→3 4→3 1→4 2→4 3→4 R2 R2 Async Async P2* E1(x) P4* E2(y) (r1, r2, r3, *) P1* E3(*) (r1, * , r3, r4) (*, r2, r3, r4) 3→1 4→1 2→1 1→2 3→2 4→2 1→3 4→3 1→4 3→ 4 1→2 3→2 1→3 2→3 2→1 3→1 4→1 1→2 2→3 4→3 1→4 2→4 3→4 1→3 2→1 3→1 2→4 3→4 1→4 2→3 3→2 4→2 2→4 4→1 4→2 4 →3

Gap between the two models Network Security Resilience CC Synchronous Perfect t < n/3 O(n) Statistical t < n/2 Cryptographic Asynchronous t < n/4 O(n2) O(n5) How to overcome this difference?