Download presentation
Presentation is loading. Please wait.
Published byRoger Austin Modified over 8 years ago
1
1© Nokia 2016 Overlaying Circuit Clauses for Secure Computation Sean Kennedy Vladimir Kolesnikov Gordon Wilfong Bell Labs
2
2© Nokia 2016 Outline Boolean circuits Motivation for overlaying branches A heuristic Performance GC protocols
3
3© Nokia 2016 Boolean circuits Two-party SFE Given function F Generate bool circuit C computing F Run Yao or GMW
4
4© Nokia 2016 Boolean circuits Circuit representation is inefficient Random access (lots of work) Unroll loops Duplicate if/switch clauses today
5
5© Nokia 2016 Example: semi-private function evaluation F(c,x,y) = f c (y), wheref 1 (x,y) = y/2<x<y f 2 (x,y) = xy > 9000 f 3 (x,y) = Ham(x,y) < 30 … f 30 (x,y) = x 2 +y 2 <9000 Why: private policy selection
6
6© Nokia 2016 Example: semi-private function evaluation Sel c f 1 (x,y) f 3 (x,y) f 2 (x,y) f 30 (x,y) … F(c,x,y) = f c (y), wheref 1 (x,y) = y/2<x<y f 2 (x,y) = xy > 9000 f 3 (x,y) = Ham(x,y) < 30 … f 30 (x,y) = x 2 +y 2 <9000
7
7© Nokia 2016 Semi-private function evaluation via circuit overlay Sel c … GC Generator will program the gates according to its input choice c. Any of C 1 …C 30 is programmable in D 0 C1C1 C2C2 C3C3 C 30 D0D0 In GC gate function is hidden and can be set by Generator to anything.
8
8© Nokia 2016 Embed how?
9
9© Nokia 2016 Embed how? Exploit common topologies Can insert no-op/pass through nodes, edges as needed
10
10© Nokia 2016 From circuits to weighted directed acyclic graphs (DAGs) 2-bit Adder D 0 1 1 11 0 0 0 0 0 0 0 0 0
11
11© Nokia 2016 Embeddings D An embedding of D into D' is a mapping f: from nodes of D to out-arborescences of D', from directed-edges of D to directed-edges of D’ satisfying: 0 0 0 1 1 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 1 1 1
12
12© Nokia 2016 The easy case: formulas D1D1 D2D2 Theorem: There exists an O(|D 1 ||D 2 |) algorithm to determine an optimal circuit D embedding both D 1 and D 2.
13
13© Nokia 2016 General Case D1D1 D2D2 1.Find spanning forest rooted at each output node. 2.For each pair of trees apply formula algorithm. Determine pairwise embedding cost 3.Min cost perfect matching determines best pairing. 2 3 3 2
14
14© Nokia 2016 General Case continued Combine the embeddings Possible complications when adding back “ignored” edges: 1.Keeping fan-in at most two. 2.Cycles.
15
15© Nokia 2016 Fixing cycles b a c d 2 1 3 4 b=2 a=1 c=3 d=4 b 1 c=3 d=4 2 c
16
16© Nokia 2016 Empirical Results
17
17© Nokia 2016 Empirical Results Best pairings
18
18© Nokia 2016 Empirical Results.
19
19© Nokia 2016 General GC with switch Programming of D 0 set of garbled tables Generator G cannot directly program D 0 as selection c is private variable. G prepares k programmings and send via natural OT variant. Need to send k programmings under the hood of OT
20
20© Nokia 2016 General GC with switch Idea: Programming string is a string of gate functions (symbols, e.g. AND, OR). G secret-shares k programming strings For each gate: 1 out of 5 OT of gate tables, where OT selection is based on secret sharing of programming symbol for the gate.
21
21© Nokia 2016 General GC with switch switch can be nested cheaply Only need to adjust secret sharing of the programming strings. Not trivial, but not hard either. Gate OT costs remain same
22
22© Nokia 2016 General GC with switch Approx 13x overhead compared to [ZRE15]. Expect to break even at 64 circuits based on empirical results Sooner with optimizations (lots of room to follow up) or with more aligned input circuits.
23
23© Nokia 2016 GMW with switch Natural combination of GMW and this talk. Unlike GC, don’t need to do OT of 1-out of-5 gate tables Just do 1-out-of-5*4 OT of 1-bit secrets via [KK13] with sending extra 16 bits per gate as compared to standard GMW and 1-out of 4 OT (plus need OT of programming strings). Overlay improvement => SFE improvement
24
Bell Labs
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.