Polylogarithmic Private Approximations and Efficient Matching

Slides:



Advertisements
Similar presentations
Constant-Round Private Database Queries Nenad Dedic and Payman Mohassel Boston UniversityUC Davis.
Advertisements

Mix and Match: A Simple Approach to General Secure Multiparty Computation + Markus Jakobsson Bell Laboratories Ari Juels RSA Laboratories.
Fast Moment Estimation in Data Streams in Optimal Space Daniel Kane, Jelani Nelson, Ely Porat, David Woodruff Harvard MIT Bar-Ilan IBM.
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Tight Bounds for Distributed Functional Monitoring David Woodruff IBM Almaden Qin Zhang Aarhus University MADALGO Based on a paper in STOC, 2012.
Tight Bounds for Distributed Functional Monitoring David Woodruff IBM Almaden Qin Zhang Aarhus University MADALGO.
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Private Inference Control David Woodruff MIT Joint work with Jessica Staddon (PARC)
Numerical Linear Algebra in the Streaming Model Ken Clarkson - IBM David Woodruff - IBM.
Private Inference Control
The Average Case Complexity of Counting Distinct Elements David Woodruff IBM Almaden.
Optimal Bounds for Johnson- Lindenstrauss Transforms and Streaming Problems with Sub- Constant Error T.S. Jayram David Woodruff IBM Almaden.
Efficient Private Approximation Protocols Piotr Indyk David Woodruff Work in progress.
Sublinear-time Algorithms for Machine Learning Ken Clarkson Elad Hazan David Woodruff IBM Almaden Technion IBM Almaden.
Tight Lower Bounds for the Distinct Elements Problem David Woodruff MIT Joint work with Piotr Indyk.
Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Quid-Pro-Quo-tocols Strengthening Semi-Honest Protocols with Dual Execution Yan Huang 1, Jonathan Katz 2, David Evans 1 1. University of Virginia 2. University.
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padro,
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
The Round Complexity of Two-Party Random Selection Saurabh Sanghvi and Salil Vadhan Harvard University.
Secure Linear Algebra against Covert or Unbounded Adversaries Payman Mohassel and Enav Weinreb UC Davis CWI.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Secure Computation of Linear Algebraic Functions
Gate Evaluation Secret Sharing and Secure Two-Party Computation Vladimir Kolesnikov University of Toronto
Yan Huang, David Evans, Jonathan Katz
Oblivious Branching Program Evaluation
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Efficient Two-party and Multiparty Computation against Covert Adversaries Vipul Goyal Payman Mohassel Adam Smith Penn Sate UCLAUC Davis.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
ORAM – Used for Secure Computation by Venkatasatheesh Piduri 1.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
How Should We Solve Search Problems Privately? Kobbi Nissim – BGU A. Beimel, T. Malkin, and E. Weinreb.
Oblivious Transfer based on the McEliece Assumptions
CS151 Complexity Theory Lecture 8 April 22, 2015.
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Privacy Preserving Learning of Decision Trees Benny Pinkas HP Labs Joint work with Yehuda Lindell (done while at the Weizmann Institute)
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
How to play ANY mental game
Secure Computation of the k’th Ranked Element Gagan Aggarwal Stanford University Joint work with Nina Mishra and Benny Pinkas, HP Labs.
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb (Technion)
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
On the Cryptographic Complexity of the Worst Functions Amos Beimel (BGU) Yuval Ishai (Technion) Ranjit Kumaresan (Technion) Eyal Kushilevitz (Technion)
Secure Computation Lecture Arpita Patra. Recap >> Improving the complexity of GMW > Step I: Offline: O(n 2 c AND ) OTs; Online: i.t., no crypto.
Amplification and Derandomization Without Slowdown Dana Moshkovitz MIT Joint work with Ofer Grossman (MIT)
Efficient and Private Distance Approximation David Woodruff MIT.
Efficient Private Matching and Set Intersection Mike Freedman, NYU Kobbi Nissim, MSR Benny Pinkas, HP Labs EUROCRYPT 2004.
Private Information Retrieval Based on the talk by Yuval Ishai, Eyal Kushilevitz, Tal Malkin.
The Message Passing Communication Model David Woodruff IBM Almaden.
Secure Computation Basics Yan Huang Indiana University May 9, 2016.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Lower bounds for Unconditionally Secure MPC Ivan Damgård Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.
Topic 36: Zero-Knowledge Proofs
The Exact Round Complexity of Secure Computation
The Exact Round Complexity of Secure Computation
Information Complexity Lower Bounds
New Characterizations in Turnstile Streams with Applications
Foundations of Secure Computation
The first Few Slides stolen from Boaz Barak
Sublinear Algorithmic Tools 3
Course Business I am traveling April 25-May 3rd
Gate Evaluation Secret Sharing and Secure Two-Party Computation
Presentation transcript:

Polylogarithmic Private Approximations and Efficient Matching David Woodruff MIT, Tsinghua Piotr Indyk MIT TCC 2006

Secure communication a  {0,1}n b  {0,1}n Alice Bob a  {0,1}n b  {0,1}n Want to compute some function F(a,b) Security: protocol does not reveal anything except for the value F(a,b) Semi-honest: both parties follow protocol Malicious: parties are adversarial Efficiency: want to exchange few bits

Secure Function Evaluation (SFE) [Yao, GMW]: If F computed by circuit C, then F can be computed securely with O~(|C|) bits of communication [GMW] + … + [NN]: can assume parties semi-honest Semi-honest protocol can be compiled to give security against malicious parties Problem: circuit size at least linear in n * O~() hides factors poly(k, log n)

Secure and Efficient Function Evaluation Can we achieve sublinear communication? With sublinear communication, many interesting problems can be solved only approximately. What does it mean to have a private approximation? Efficiency: want SFE with communication comparable to insecure case

Private Approximation [FIMNSW’01]: A protocol computing an approximation G(a,b) of F(a,b) is private, if each party can simulate its view of the protocol given the exact value F(a,b) Not sufficient to simulate non-private G(a,b) using SFE Example: Define G(a,b): bin(G(a,b))i =bin((a,b))i if i>0 bin(G(a,b))0=a0 G(a,b) is a 1 -approximation of (a,b), but not private Popular protocols for approximating (a,b), e.g., [KOR98], are not private

Approximating Hamming Distance [FIMNSW01]: A private protocol with complexity O~(n1/2/ ) (a,b) small: compute (a,b) exactly in O~((a,b)) bits (a,b) high: sample O~(n/(a,b)) (a-b)i, estimate (a,b) Our main result: Complexity: O~(1/2) bits Works even for L2 norm, i.e., estimates ||a-b||2 for a,b  {1…M}n * O~() hides factors poly(k, log n, log M, log 1/)

Crypto Tools Efficient OT1n: P1 has A[1] … A[n] 2 {0,1}m , P2 has i 2 [n] Goal: P2 privately learns A[i], P1 learns nothing Can be done using O~(m) communication [CMS99, NP99] Circuits with ROM [NN01] (augments [Yao86]) Standard AND/OR/NOT gates Lookup gates: In: i Out: Mgate[i] Can just focus on privacy of the output Communication at most O~(m|C|)

High-dimensional tools Random projection: Take a random orthonormal nn matrix D, that is ||Dx|| = ||x|| for all x. There exists c>0 s.t. for any xRn, i=1…n Pr[ (Dx)i2 > ||Dx||2/n * k] < e-ck

Approximating ||a-b|| Recall: Alice has a 2 [M]d, Bob has b 2 [M]d Goal: privately estimate ||a-b||, x=a-b Suffices to estimate ||a-b||2

Protocol Intuition Alice and Bob agree upon a random orthonormal matrix D Efficient by exchanging a seed of a PRG Alice and Bob rotate vectors a,b, obtaining Da, Db ||Da-Db|| = ||a-b|| D “spreads the mass” of the difference vector uniformly across the n coordinates. Can now try obliviously sampling coordinates as in [FIMNSW01]

Protocol Intuition Con’d Alice and Bob agree upon random orthonormal D Alice and Bob rotate a,b, obtaining Da, Db Use secure circuit with ROMs Da and Db to: Circuit obtains (Da)i and (Db)i for many random indices i Problem: Now what? Samples leak a lot of info! Fix: - Suppose you know upper bound T with T ¸ ||a-b||2 - Flip a coin z with heads probability n((Da)i – (Db)i)2/(kT) - Then E[z] = n||Da-Db||2/(nkT) = ||a-b||2/(kT) - E[z] only depends on ||a-b||, and z only depends on E[z]!

Protocol Intuition Con’d Alice and Bob agree upon random orthonormal D Alice and Bob rotate a,b, obtaining Da, Db Use secure circuit with ROMs Da, Db, to: Obtain (Da)i and (Db)i for L random i Generate Bernoulli z1, … , zL with E[zi] = ||a-b||2/(kT) Output kT  zi/L Privacy: View only depends on ||a-b|| Problem: Correctness! A priori bound T=M2 n, but ||a-b||2 may be (1), so (n) samples required. Fix: Private binary search on T

Protocol Intuition Con’d … Use secure circuit with ROMs Da, Db to: Obtain (Da)i and (Db)i for L random i Generate Bernoulli z1, … , zL with E[zi] = ||a-b||2/(kT) Output kT  zi/L Fix: - Private binary search on T - If many zi = 0, then intuitively can replace T with T/2 - Eventually T = ~(||a-b||2) - We will show: final choice of T is simulatable!

One last detail Want to show final choice of T is simulatable Estimate is kT zi/L and we stop when “many” zi = 1 Recall E[zi] = ||a-b||2/(kT) Key Observation: Since orthonormal D is uniformly random, can guarantee that if many zi = 0, then ||a-b||2 << T. Note: - Suppose didn’t use D, and a = (M, 0, …, 0), b = (0, …, 0) - Then ||a-b||2 = M2 is large, but almost always zi = 0, so you’ll choose T < ||a-b||2. - Not simulatable since T depends on the structure of a, b

Algorithm vs. Simulation Repeat Generate L independent bits zi such that Pr[zi=1]= ||a-b|| 2/Tk T=T/2 Until Σi zi ≥ (L/k) Output E= Σi zi /L * 2Tk as an estimate of ||a-b||2 ALGORITHM Repeat Generate L independent bits zi such that Pr[zi=1]= ||D(a-b)|| 2/Tk T=T/2 Until Σi zi ≥ (L/k) Output E= Σi zi /L * 2Tk as an estimate of ||a-b||2 Recall:||D(a-b)||=||a-b|| Communication = O~(L) = O~(1/2)

Other Results Use homomorphic encryption tricks to get better upper bounds for private nearest neighbor and private all-pairs nearest neighbors. Define private approximate nearest neighbor problem: Requires a new definition of private approximations for functionalities that can return sets of values. Achieve small communication in this setting.