Limits of Practical Sublinear Secure Computation

Slides:



Advertisements
Similar presentations
Polylogarithmic Private Approximations and Efficient Matching
Advertisements

Efficient Private Approximation Protocols Piotr Indyk David Woodruff Work in progress.
Multi-Query Computationally-Private Information Retrieval with Constant Communication Rate Jens Groth, University College London Aggelos Kiayias, University.
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
The Complexity of Information-Theoretic Secure Computation Yuval Ishai Technion 2014 European School of Information Theory.
Nearest Neighbor Search in High Dimensions Seminar in Algorithms and Geometry Mica Arie-Nachimson and Daniel Glasner April 2009.
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Lecture 15 Private Information Retrieval Stefan Dziembowski MIM UW ver 1.0.
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based.
Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University.
New Advances in Garbling Circuits Based on joint works with Yuval Ishai Eyal Kushilevitz Brent Waters University of TexasTechnion Benny Applebaum Tel Aviv.
General Cryptographic Protocols (aka secure multi-party computation) Oded Goldreich Weizmann Institute of Science.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems Omer Barkol Yuval Ishai Technion.
How Should We Solve Search Problems Privately? Kobbi Nissim – BGU A. Beimel, T. Malkin, and E. Weinreb.
1 Keyword Search and Oblivious Pseudo-Random Functions Mike Freedman NYU Yuval Ishai, Benny Pinkas, Omer Reingold.
Lecture 4: Divide and Conquer III: Other Applications and Examples Shang-Hua Teng.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson 1, Stuart Haber 2, William G. Horne 2, Tomas.
Locally Decodable Codes Uri Nadav. Contents What is Locally Decodable Code (LDC) ? Constructions Lower Bounds Reduction from Private Information Retrieval.
Private Information Retrieval Amos Beimel – Ben-Gurion University Tel-Hai, June 4, 2003 This talk is based on talks by:
ON THE PROVABLE SECURITY OF HOMOMORPHIC ENCRYPTION Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014 based on joint work.
Privacy Preserving Learning of Decision Trees Benny Pinkas HP Labs Joint work with Yehuda Lindell (done while at the Weizmann Institute)
Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.
Randomized Algorithms Morteza ZadiMoghaddam Amin Sayedi.
Completeness in Two-Party Secure Computation Revisited Danny Harnik Moni Naor Omer Reingold Alon Rosen Weizmann Institute of Science AT&T IAS.
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb (Technion)
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
On the Cryptographic Complexity of the Worst Functions Amos Beimel (BGU) Yuval Ishai (Technion) Ranjit Kumaresan (Technion) Eyal Kushilevitz (Technion)
FHE Introduction Nigel Smart Avoncrypt 2015.
Secure Multiparty Computation and its Applications
Efficient Private Matching and Set Intersection Mike Freedman, NYU Kobbi Nissim, MSR Benny Pinkas, HP Labs EUROCRYPT 2004.
Private Information Retrieval Based on the talk by Yuval Ishai, Eyal Kushilevitz, Tal Malkin.
Secure Computation with Minimal Interaction, Revisited Yuval Ishai (Technion) Ranjit Kumaresan (MIT) Eyal Kushilevitz (Technion) Anat Paskin-Cherniavsky.
Improved OT Extension for Transferring Short Secrets Vladimir Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion)
Linear, Nonlinear, and Weakly-Private Secret Sharing Schemes
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Lower bounds for Unconditionally Secure MPC Ivan Damgård Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.
Bounded key-dependent message security
The Exact Round Complexity of Secure Computation
The Exact Round Complexity of Secure Computation
Carmit Hazay (Bar-Ilan University, Israel)
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
TCC 2016-B Composable Security in the Tamper-Proof Hardware Model under Minimal Complexity Carmit Hazay Bar-Ilan University, Israel Antigoni Ourania.
MPC and Verifiable Computation on Committed Data
Jens Groth, University College London
Privacy Preserving Similarity Evaluation of Time Series Data
Foundations of Secure Computation
NP-Completeness (36.4-5/34.4-5)
Committed MPC Multiparty Computation from Homomorphic Commitments
Laconic Oblivious Transfer and its Applications
CS573 Data Privacy and Security
Verifiable Oblivious Storage
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems Omer Barkol Yuval Ishai Technion.
Distributed Computing Made Secure: A New Cycle Cover Theorem
Local Error-Detection and Error-correction
On the Power of Hybrid Networks in Multi-Party Computation
Four-Round Secure Computation without Setup
Cryptography for Quantum Computers
Locally Decodable Codes from Lifting
Near-Optimal (Euclidean) Metric Compression
Multi-Party Computation: Second year
cse 521: design and analysis of algorithms
Two-Round Adaptively Secure Protocols from Standard Assumptions
Cryptography Lecture 18.
Identity Based Encryption from the Diffie-Hellman Assumption
Presentation transcript:

Limits of Practical Sublinear Secure Computation CRYPTO 2018 Limits of Practical Sublinear Secure Computation Elette Boyle, IDC Herzliya Yuval Ishai, Technion Antigoni Polychroniadou, Cornell Tech

Secure Two-Party Computation x1 f(x1, x2) = (y1, y2 ) y2 y1 x2 Goal: Correctness: Everyone computes f(x1,x2) Security: Nothing else but the output is revealed Adversary Semi-honest

Secure Computation on Big Data The age of Big Data Secure Computation on Big Data EXAMPLE EXPLANATION JOURNEY THIS IS GREAT – CHECK THIS OUT WANT IT TO BE TECHNOLOGY GEOMETRY TECHY COMPUTER GADGET EXAMPLE EXPLANATION JOURNEY THIS IS GREAT WANT IT TO BE TECHNOLOGY GEOMETRY

Communication Complexity Computational Complexity Secure Computation on BIG DATA Efficiency Metrics Communication Complexity Computational Complexity Ω(n) o(n) ω(n) Where n is the # of bits in the database Almost all protocols with sublinear communication complexity suffer in computational complexity (e.g. FHE\PIR-based protocols)

Sublinear Communication 2PC Sublinear computation Linear computation PIR [Chor-Goldreich-Kushilevitz-Sudan'95, Kushilevitz-Ostrovsky'97] MST FHE [Gentry09] Median Convex Hull Single source shortest distances Approximate Set cover All pairs shortest distance [Aggarwal-Mishra-Pinkas04,Brickell-Shmatikov05,Shelat-Venkitasubramaniam15]

be securely computed with Motivation Which functions can be securely computed with sublinear overhead? Secure Computation on Big Data

Our Results Provide framework for identifying “provably hard” sublinear secure computation tasks on big data. Provide formal reductions showing that many natural problems are inherently “hard”. (Including variants of the problems in [AMP'04,BS'05,SV'15]) (Akin to NP-hardness) Define intermediate hardness to capture natural problems that are neither “hard” or “easy”. HARD EASY

Types of Functionalities Two-sided Functionalities One-sided Functionalities Secret-Shared output Functionalities Useful for MPC composition f(x1, x2) = ( [y] , [y] ) f(x1, x2) = ( [y] , ⊥ ) f(x1, x2) = (y, y) f(x1, x2) = (y, ⊥) x1 x2 [y] y ⊥ y [y]

One-Sided Functionalities Sublinear computation Linear computation PIR One-sided Convex Hull, Median etc… FHE Secret-shared Convex Hull, Median etc… Two-sided Convex Hull, Median, MST Single source shortest Distances, Approximate Set cover, All pairs shortest distance

One-Sided Functionalities Sublinear computation Linear computation PIR One-sided Convex Hull, Median etc… Are these variants of problems hard? FHE Secret-shared Convex Hull, Median etc… TRUE CORRECT Two-sided Convex Hull, Median, MST Single source shortest Distances, Approximate Set cover, All pairs shortest distance FALSE INCORRECT!

Our Framework Benchmark metric for measuring computation complexity in the sublinear communication regime: PIR

Private Information Retrival (PIR) [Chor-Goldreich-Kushilevitz-Sudan'95,Kushilevitz-Ostrovsky'97] Request entry i Di Database D=D1D2...Dn Goal: Correctness: User obtains Di Privacy: Server learns nothing about i

Private Information Retrival (PIR) [Chor-Goldreich-Kushilevitz-Sudan'95,Kushilevitz-Ostrovsky'97] “Hello, wake up” Return all the entries in D Database D=D1D2...Dn Privacy is perfect but the overhead is prohibitively large. Non-triviality requirement: Communication cost must be in o(n)

1-server PIR State-of-the-art efficiency Communication Complexity Computational Complexity o(n) O(n) Where n is the # of bits in the database Drawbacks: PIR (without preprocessing) inherently requires linear computation. Heavy public key operations. slower than symmetric encryption by orders of magnitude -XPIR, SealPIR 1-server IT PIR is impossible Even with preprocessing, sublinear-time PIR protocols are slow [BIM00, BIPW17, CHS17] PIR forms a computational barrier for 2PC on big data

Our Framework (PIR Hardness) any secure protocol for the problem implies nontrivial PIR on a large database. Problem is PIR-Hard when: EASY

Our Framework (PIR Hardness) A two-party functionality f with input size N is (n(N),1)-PIR-hard if there is a single-server PIR protocol on a database of size n(N) by making a single oracle call to f.   EASY

One-sided Median is PIR-Hard Toy example D0 D1 If i=0: min Such that D0 < D1 Database D=D0D1 i∈ [n] Input phase: … … Output phase:

One-sided Median is PIR-Hard Toy example D0 D1 If i=0: min Such that D0 < D1 If i=1: max D0 D1 Database D=D0D1...Dn i∈ [n] Input phase: max min D0 D1 min D0 D0 D1 max D1 Output phase: D0 D1

One-sided Median Protocol is PIR-Hard Toy example D0 D1 If i=0: min Such that D0 < D1 If i=1: max D0 Database D=D0D1...Dn Fails for the 2-sided functionalities i∈ [n] Input phase: min D0 D1 Output phase: D0

PIR-Hard One-Sided Functionalities Median Convex Hull Single source shortest Distances Approximate Set cover All pairs shortest distance Utilize combinatorial notion of VC-dimension [Vapnik,Chervonenkis71]

One-sided functionalities are PIR-Hard Recall the ‘easy’ two-sided functionalities: Two-sided Convex Hull, Median, MST Single source shortest Distances, Approximate Set cover, All pairs shortest distance Are all two-sided functionalities ‘easy’?

Two-sided Nearest Neighbor Problem (x,y) Input phase: Location (x,y) … (a0,b0) (an,bn) Output to both parties the nearest restaurant to (x,y)

Our Framework (Semi-PIR Hardness) Di D=D1D2...Dn Semi-PIR Semi-PIR: Correctness: User obtains Di Privacy: Server learns nothing about i only if Di=1. EASY

Two-sided Nearest Neighbor is Semi-PIR hard If Di=0: choose (ai,bi) on the circle Two-sided Nearest Neighbor is Semi-PIR hard Toy example If Di=1: choose (ai,bi) outside the circle (a0,b0) If i=3 then (x,y) (a3,b3) (a1,b1) c i∈ [n] Database D=0101 (a2,b2) Input phase: c … (a0,b0) (a3,b3) Location (x,y) Output to both parties the nearest restaurant to (x,y) If Di=1 output c and if Di=0 : output c and (ai,bi) Output phase:

Semi-PIR Hard Two-Sided Functionalities Nearest Neighbor Single Source Single Destination shortest path Shortest list selection Closest destination ….?

Semi-PIR vs. PIR Semi-PIR is not PIR hard via 1 call. Existence of polylogarithmic semi-PIR implies the existence of slightly sublinear PIR (via multiple adaptive calls to semi-PIR): Reduction uses LDCs polylogarithmic PIR from polylogarithmic semi-PIR? if ‘dream’ LDCs exist. PIR-hard * With constant query complexity and polynomial rate.

Polylogarithmic semi-PIR ⇒ weak PIR Via q-query LDCs and O(2q) adaptive calls Rand 𝟏 𝟐 PIR Semi-PIR to Rand ½ PIR: Database Database D=D0D1...Dn Encode Database using LDCs … (i1,…,i5) i∈ [n] PIR

Conclusion Introduce PIR-hardness for identifying “provably hard” sublinear secure computation tasks on big data. Provide formal reductions showing that many natural problems are PIR-Hard. (Including variants of the problems in [AMP'04,BS'05,SV'15]) (Akin to NP-hardness) Introduce semi-PIR hardness HARD Semi-PIR EASY

Our Taxonomy PIR One-sided Convex Hull, Median etc… Easy problems Semi-PIR hard problems PIR-hard problems PIR One-sided Convex Hull, Median etc… Two-sided Single Source Single Dest. shortest path, Nearest Neighbor, Shortest list selection, closest destination. FHE Secret-shared Convex Hull, Median etc… Two-sided Convex Hull, Median, MST Single source shortest Distances, Approximate Set cover, All pairs shortest distance Two-sided local compressible MST, Median.

Future Directions Hierarchy of hardness classes beyond PIR-hardness and Semi-PIR-hardness? -- somewhat HE-hardness? Better understanding of the relation semi-PIR and PIR? VC-dimension analogue that captures PIR and semi-PIR-hardness for two-sided functionalities? Multi-party functionalities?

[Vapnik,Chervonenkis71] PIR and VC-dimension [Vapnik,Chervonenkis71] [BIKO12]: exploit this relation to construction PIR protocols A one-sided functionality f is PIR-hard iff f has a certain efficiently computable VC-dimension. PIR-hard: High VC-dimension Easy: Low VC-dimension