Vladimir Kolesnikov (Bell Labs) Tal Malkin (Columbia U), Payman Mohassel (U Calgary), Mike Rosulek (Oregon State), Yehuda Lindell (Bar-Ilan U) Kedar Namjoshi,

Slides:



Advertisements
Similar presentations
Polylogarithmic Private Approximations and Efficient Matching
Advertisements

Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Quid-Pro-Quo-tocols Strengthening Semi-Honest Protocols with Dual Execution Yan Huang 1, Jonathan Katz 2, David Evans 1 1. University of Virginia 2. University.
Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.
Gate Evaluation Secret Sharing and Secure Two-Party Computation Vladimir Kolesnikov University of Toronto
Yan Huang, David Evans, Jonathan Katz
Secure Evaluation of Multivariate Polynomials
Oblivious Branching Program Evaluation
Efficient Two-party and Multiparty Computation against Covert Adversaries Vipul Goyal Payman Mohassel Adam Smith Penn Sate UCLAUC Davis.
Semi-Honest to Malicious Oblivious-Transfer The Black-box Way Iftach Haitner Weizmann Institute of Science.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
Simple, Black-Box Constructions of Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia University), Tal Malkin (Columbia University),
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
GARBLED CIRCUITS & SECURE TWO-PARTY COMPUTATION
Using Programmer-Written Compiler Extensions to Catch Security Holes Authors: Ken Ashcraft and Dawson Engler Presented by : Hong Chen CS590F 2/7/2007.
Automating Efficient RAM- Model Secure Computation Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael Hicks University of Maryland, College Park.
General Cryptographic Protocols (aka secure multi-party computation) Oded Goldreich Weizmann Institute of Science.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Oblivious Transfer based on the McEliece Assumptions
Jointly Restraining Big Brother: Using cryptography to reconcile privacy with data aggregation Ran Canetti IBM Research.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
Privacy Preserving Learning of Decision Trees Benny Pinkas HP Labs Joint work with Yehuda Lindell (done while at the Weizmann Institute)
Control of Personal Information in a Networked World Rebecca Wright Boaz Barak Jim Aspnes Avi Wigderson Sanjeev Arora David Goodman Joan Feigenbaum ToNC.
SPAR-MPC Day 2 Breakout Sessions Mayank Varia 29 May 2014.
Chang Liu, Michael Hicks, Elaine Shi The University of Maryland, College Park.
Blind Seer: Scalable Private DB Querying Columbia-Bell Labs work on IARPA SPAR project Vladimir Kolesnikov (Bell Labs), Tal Malkin (Columbia) Steve Bellovin,
How to play ANY mental game
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
1 Privacy-Preserving Distributed Information Sharing Nan Zhang and Wei Zhao Texas A&M University, USA.
ObliVM: A Programming Framework for Secure Computation
Collusion-Free Multiparty Computation in the Mediated Model
Insert presenter logo here on slide master. See hidden slide 4 for directions  Session ID: Session Classification: SEUNG GEOL CHOI UNIVERSITY OF MARYLAND.
Scaling Secure Computation Using the Cloud
13. Oktober 2010 | Dr.Marc Fischlin | Kryptosicherheit | 1 Rate-Limited Secure Function Evaluation 21. Public Key Cryptography, March 1 st, 2013 Özgür.
Overview of Workshop Goals and RFI Responses Emily Shen SPAR-MPC Workshop 28 May 2014.
GARBLED CIRCUITS CHECKING GARBLED CIRCUITS MORE EFFICIENT AND SECURE TWO-PARTY COMPUTATION Payman Mohassel Ben Riva University of Calgary Tel Aviv University.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
Making Secure Computation Practical IBM: Craig Gentry, Shai Halevi, Charanjit Jutla, Hugo Krawczyk, Tal Rabin, NYU: Victor Shoup SRI: Mariana Raykova Stanford:
SPAR-MPC Day 1 Breakout Sessions Emily Shen 29 May 2014.
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
Secure Multiparty Computation Basic Technology + Past, Present, Future Jesper Buus Nielsen Associate Professor Aarhus University Send comments and input.
How to Use Bitcoin to Design Fair Protocols Ranjit Kumaresan (MIT) Joint work with Iddo Bentov (Technion), Tal Moran (IDC Herzliya)
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
1 Longest Common Subsequence as Private Search Payman Mohassel and Mark Gondree U of CalgaryNPS.
Cryptography In the Bounded Quantum-Storage Model
Jonathan Katz Professor, Computer Science, UMD Director, Maryland Cybersecurity Center Secure Computation.
Vladimir Kolesnikov (Bell Labs) Steven M. Bellovin, Seung Geol Choi, Ben Fisch, Wesley George, Angelos Keromytis, Fernando Krell, Abishek Kumarasubramanian,
Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-106 Efficient Fully-Simulatable Oblivious Transfer.
Auditing Information Leakage for Distance Metrics Yikan Chen David Evans TexPoint fonts used in EMF. Read the TexPoint manual.
Efficient Oblivious Transfer with Stateless Secure Tokens Alcatel-Lucent Bell Labs Vlad Kolesnikov.
Improved OT Extension for Transferring Short Secrets Vladimir Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion)
Practical and Deployable Secure Multi-Party Computation Debayan Gupta Yale University May 11, 2016 Jai Dadabhai.
1© Nokia 2016 Overlaying Circuit Clauses for Secure Computation Sean Kennedy Vladimir Kolesnikov Gordon Wilfong Bell Labs.
740: Computer Architecture Project Proposal and Topics Prof. Onur Mutlu Carnegie Mellon University Fall 2013.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Garbling Techniques David Evans
Vladimir Kolesnikov (Bell Labs), Tal Malkin (Columbia)
MPC and Verifiable Computation on Committed Data
Verifiable Oblivious Storage
Privacy Preserving analytics Private Set Intersection(PSI)
Making Secure Computation Practical
Malicious-Secure Private Set Intersection via Dual Execution
Fast Secure Computation for Small Population over the Internet
CRYP-F02 Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection Peter Scholl (University of Bristol) Michele Orrù (ENS Paris)
Presentation transcript:

Vladimir Kolesnikov (Bell Labs) Tal Malkin (Columbia U), Payman Mohassel (U Calgary), Mike Rosulek (Oregon State), Yehuda Lindell (Bar-Ilan U) Kedar Namjoshi, Alan Jeffrey, Steve Fortune (Bell Labs) Challenges and directions for optimizing the automated solution of the general MPC problem

2 Problem description Protocol composition for performance improvement Leakage for insane performance improvement ­But what guarantees do we have? Research directions in cryptography, compilers and program analysis Heilmeier’s Catechism Outline

3 One button to generate the best protocol High-level language? Program may specify (partial list) ­Number of players ­Trust assumptions ­Communication channel assumptions ­Player computational abilities ­Leakage allowance ­Automatically or manually select: ­The “right” subroutine ­E.g. Array implementation via GC or ORAM General MPC

4 Crypto primitives for variety of general and special cases ­GC, Info-theoretic GC, GMW, ­ORAM, ORAM-based MPC ­Server-aided computation ­OBDD, FSA ­Homomorpic ­… Each is best in some setting (Automatic) Subroutine Selection & Protocol composition

5 Crypto primitives for variety of special cases Idea: compose (automatically or manually) the “right” subroutines. ­Few first attempts ­[KSS13] (GC + homomorphic, manual), TASTY [HSSW10] ­[LHSHK14] (GC+ORAM, compiler), “order of magnitude” improvement GC can serve as secure “glue” for many compositions ­In the semi-honest model. Much harder in malicious model. Systematize the approaches Amend/design protocols to enable easy composition (Automatic) Subroutine Selection & Protocol composition (cont.)

6 Much of the cost of MPC comes from “the last mile” ­Selective abort allows to learn one bit at the cost of being caught ­Cost: complex Cut-and-choose with s^2 commitments ­Dual execution [MF06] leaks one bit at the cost of being caught ­Cost: 20x performance overhead via [Lin13] ­Leaking execution path in large-input computation (e.g. [PKVKMCGKB14]) ­Cost: insane (vs GC), orders of magnitude (vs ORAM-MPC) In deadline-driven applications, the choice is between ­no privacy / imperfect privacy ­Imperfect privacy can be more dangerous if not clearly understood Leakage

7 ­Research in improving standalone protocols, with a view of composition ­General ­Specific functions ­Implementations ­Profiling frequently-used primitives a-la OT Extension[ALSZ13] ­Specific to settings (high/low power devices, battery considerations, etc.) Research directions – MPC improvements & Benchmarking

8 Systematize the many approaches Amend/design protocols to enable easy composition at compile-time Malicious model composition Compiler work to automate primitive selection and gluing Research directions – Composition

9 Design faster and less-leaking protocols ­Improve bounds and guarantees on ­Covert protocols ­Dual execution protocols ­Other Research directions – Leakage

10 Needed even in “proper” non-leaky protocols ­Multiple execution leaks a complex object that is often hard to understand ­E.g. What is learned from a sequence of DB queries ­If running time is also revealed Design concepts, language, and tools for leakage analysis New leaky definitions Research directions – Understanding (Composed) Leakage

11 Consider a high-level program which calls subroutines (e.g. DB queries) Use automated program analysis and verification techniques: ­Trace possible/probable program states and subroutine call sequences ­Bound the knowledge gained from leakage, malicious gains and legal outputs ­Answer questions of the type “Is information x leaked?” Research directions – Understanding (Composed) Leakage

12 What are you trying to do? ­Understandable security for deadline-oriented applications How is it done today, and what are the limits of current practice? ­Not done* What's new in your approach and why do you think it will be successful? ­Combination of crypto, compilers, and automated leakage analysis Who cares? ­Agencies who may not share their data; industry if it’s simple and fast enough If you're successful, what difference will it make? ­More PII privacy, ability to securely share data, technological enforcement of data laws. Heilmeier’s Catechism (1)

13 What are the risks and the payoffs? ­MPC improvements are low- to medium- risk, depending on expectation ­Leakage analysis is high-risk as a new field ­Pay off – up to eliminating overhead of MPC (with leakage, in ideal world, in some settings) How much will it cost? ­7-10 people working ½ time How long will it take? ­3-4 years to see noticeable results Heilmeier’s Catechism (2)

14 What are the midterm and final "exams" to check for success? ­Foundations (1.5 yrs) ­MPC crypto work in systematization etc. ­Design of leakage specification language and analysis tools ­Demo Implementation of (1.5 yrs) ­Improve foundations and deliver an implementation ­Deliverable ­A push-button system Heilmeier’s Catechism (3)

15 [ALSZ13] Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner. More efficient oblivious transfer and extensions for faster secure computation. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. [HSSW10] Wilko Henecka, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg. TASTY: tool for automating secure two-party computations. CCS 2010 [KSS13] Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider: A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design. Journal of Computer Security 21(2): (2013) [LHSHK14] Chang Liu, Yan Huang, Elaine Shi, Michael Hicks, and Jonathan Katz. Automating Efficient RAM-Model Secure Computation. In S&P (Oakland) 2014 [MF06] Payman Mohassel, Matthew K. Franklin: Efficiency Tradeoffs for Malicious Two- Party Computation. In PKC 2006 [Lin13] Yehuda Lindell: Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries. CRYPTO (2) 2013 [PKVKMCGKB14] Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos Keromytis, Steve Bellovin. Blind Seer: A Scalable Private DBMS. In Oakland Bibliography