ajith suresh
play

Ajith Suresh CrIS Lab, IISc * Indian Institute of Science (IISc), - PowerPoint PPT Presentation

Ajith Suresh CrIS Lab, IISc * Indian Institute of Science (IISc), Bangalore https://www.csa.iisc.ac.in/~cris ^ Aarhus University, Denmark Outline q Privacy Preserving Machine Learning (PPML) q Secure Multi-party Computation (MPC) q Overview of


  1. Ajith Suresh CrIS Lab, IISc * Indian Institute of Science (IISc), Bangalore https://www.csa.iisc.ac.in/~cris ^ Aarhus University, Denmark

  2. Outline q Privacy Preserving Machine Learning (PPML) q Secure Multi-party Computation (MPC) q Overview of Trident Protocol q Benchmarking Results AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  3. Machine Learning (ML) Prediction – An Abstraction Model Query Parameters Result ML Algorithm Jasmine Aladdin (Model Owner) (Client) Privacy ?? AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  4. Machine Learning (ML) Prediction – An Abstraction Query Model Parameters Result ML Algorithm Jasmine Aladdin (Model Owner) (Client) Privacy ?? AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  5. Machine Learning (ML) Prediction – An Abstraction Model Query Parameters Result ML Algorithm Jasmine Aladdin (Model Owner) (Client) Privacy ?? AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  6. Privacy Preserving Machine Learning (PPML) Model Query Parameters Result PPML Algorithm Jasmine Aladdin (Model Owner) (Client) MPC meets ML AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  7. Secure Multi-party Computation (MPC) [Yao’82] ü A set of parties with private inputs wish to compute some joint function of their inputs. ü Goals of MPC: Correctness – Parties should correctly evaluate § the function output. Privacy – Nothing more than the function § output should be revealed AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  8. Secure Multi-party Computation (MPC) [Yao’82] Trusted Third Party (TTP) AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  9. Trusted Third Party (TTP) AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  10. MPC MPC emulates TTP AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  11. AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  12. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  13. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model v 4 parties v Honest majority v At most 1 corruption AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  14. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model v Data independent pre-processing v Fast online phase AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  15. Sharing Semantics

  16. Pre-processing

  17. Pre-processing

  18. + = Online

  19. Shares of

  20. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  21. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Corrupt parties arbitrarily deviate AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  22. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Honest parties get output whenever corrupt parties get output AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  23. Multiplication ( !. # ) Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 (3PC) 12 9 Abort AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  24. Multiplication ( !. # ) Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 (3PC) 12 9 Abort ASTRA (3PC) 21 4 Fair AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  25. Multiplication ( !. # ) Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 (3PC) 12 9 Abort ASTRA (3PC) 21 4 Fair Gordon et al.’18 (4PC) 2 4 Abort AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  26. Multiplication ( !. # ) Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 (3PC) 12 9 Abort ASTRA (3PC) 21 4 Fair Gordon et al.’18 (4PC) 2 4 Abort Trident 3 3 Fair AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  27. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  28. Mixed World Conversions Boolean World Boolean o Comparison, Bit Extraction … AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  29. Mixed World Conversions Boolean World Boolean o Comparison, Bit Extraction … Arithmetic World o Addition, Multiplication … Arithmetic AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  30. Mixed World Conversions Boolean World Boolean o Comparison, Bit Extraction … Arithmetic World o Addition, Multiplication … Garbled Arithmetic Garbled World o Division over rings … AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  31. Mixed World Conversions Boolean Online Online Rounds Communication B2A B2G Up to 7 x 2 x - 67 x A2B G2B Range of improvement over ABY3 A2G Garbled Arithmetic G2A AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  32. Mixed World Conversions – An Example min(% & + % ( , % * ) % , AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  33. Mixed World Conversions – An Example ! " + x % AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  34. Mixed World Conversions – An Example Arithmetic ! " + x % AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  35. Mixed World Conversions – An Example Arithmetic A2B ! " + x % min(! " + ! % , ! + ) AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  36. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  37. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) B2G AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  38. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) B2G A2G ! - AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  39. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) B2G A2G min ! " + ! % , ! + ÷ ! . ! . AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  40. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) B2G A2G min ! " + ! % , ! + ÷ ! . ! . Garbled AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  41. Mixed World Conversions – An Example Arithmetic Boolean A2B % & + x ( min(% & + % ( , % * ) B2G min(% & + % ( , % * ) A2G G2A min % & + % ( , % * ÷ % , % , % , Garbled AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  42. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions Ø Special tools for PPML AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  43. ) Dot Product !∎# = % * + . -+ &'( Pre-processing Online Ref Security (#elements) (#elements) ABY3 (3PC) 12d 9d Abort d – #elements in each vector AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  44. ) Dot Product !∎# = % * + . -+ &'( Pre-processing Online Ref Security (#elements) (#elements) ABY3 (3PC) 12d 9d Abort ASTRA (3PC) 21d 2d+2 Fair d – #elements in each vector AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  45. ) Dot Product !∎# = % * + . -+ &'( Pre-processing Online Ref Security (#elements) (#elements) ABY3 (3PC) 12d 9d Abort ASTRA (3PC) 21d 2d+2 Fair Trident 3 3 Fair d – #elements in each vector AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  46. Non-linear Dot Activation Product Functions Bit Truncation Injection Tools for PPML Bit to Fixed Point Arithmetic Arithmetic Comparison AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  47. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions Ø Special tools for PPML Ø Lower monetary cost in the outsourced setting AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend