Ajith Suresh
CrIS Lab, IISc
https://www.csa.iisc.ac.in/~cris
* Indian Institute of Science (IISc), Bangalore
^ Aarhus University, Denmark
Ajith Suresh CrIS Lab, IISc * Indian Institute of Science (IISc), - - PowerPoint PPT Presentation
Ajith Suresh CrIS Lab, IISc * Indian Institute of Science (IISc), Bangalore https://www.csa.iisc.ac.in/~cris ^ Aarhus University, Denmark Outline q Privacy Preserving Machine Learning (PPML) q Secure Multi-party Computation (MPC) q Overview of
^ Aarhus University, Denmark
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Model Parameters Query Result
Aladdin (Client) Jasmine (Model Owner) ML Algorithm
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Model Parameters
Query
Result
Aladdin (Client) Jasmine (Model Owner) ML Algorithm
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Model Parameters Query Result
Aladdin (Client) Jasmine (Model Owner) ML Algorithm
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Model Parameters Query Result
Aladdin (Client) Jasmine (Model Owner)
PPML Algorithm
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
ü A set of parties with private inputs wish to
compute some joint function of their inputs.
ü Goals of MPC:
§
Correctness – Parties should correctly evaluate the function output.
§
Privacy – Nothing more than the function
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model v 4 parties v Honest majority v At most 1 corruption
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model v Data independent pre-processing v Fast online phase
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Corrupt parties arbitrarily deviate
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Honest parties get output whenever corrupt parties get output
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
(#elements)
(#elements)
Araki et al’17 (3PC) 12 9 Abort
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
(#elements)
(#elements)
Araki et al’17 (3PC) ASTRA (3PC) 12 21 9 4 Abort Fair
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
(#elements)
(#elements)
Araki et al’17 (3PC) ASTRA (3PC) Gordon et al.’18 (4PC) 12 21 2 9 4 4 Abort Fair Abort
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
(#elements)
(#elements)
Araki et al’17 (3PC) ASTRA (3PC) Gordon et al.’18 (4PC)
12 21 2
9 4 4
Abort Fair Abort
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Boolean Boolean World
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Boolean Arithmetic Boolean World
Arithmetic World
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Boolean Arithmetic Garbled Boolean World
Arithmetic World
Garbled World
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Boolean Arithmetic Garbled
B2A A2B G2B B2G A2G G2A
Online Rounds Online Communication Up to 7x
Range of improvement over ABY3
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Arithmetic
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Arithmetic
A2B
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Arithmetic Boolean
A2B
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Arithmetic Boolean
A2B B2G
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Arithmetic Boolean
A2B A2G B2G
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Arithmetic Boolean
A2B A2G B2G
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Arithmetic Boolean
A2B A2G B2G
Garbled
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Arithmetic Boolean Garbled
A2B G2A A2G B2G
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions Ø Special tools for PPML
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
(#elements)
(#elements)
ABY3 (3PC) 12d 9d Abort
&'( )
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
(#elements)
(#elements)
ABY3 (3PC) ASTRA (3PC) 12d 21d 9d 2d+2 Abort Fair
&'( )
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
(#elements)
(#elements)
ABY3 (3PC) ASTRA (3PC)
12d 21d
9d 2d+2
Abort Fair
&'( )
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Dot Product Truncation Fixed Point Arithmetic Comparison Bit to Arithmetic Bit Injection Non-linear Activation Functions
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions Ø Special tools for PPML Ø Lower monetary cost in the outsourced setting
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions Ø Special tools for PPML Ø Lower monetary cost in the outsourced setting Computation is
hired servers
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Ø Implemented both Trident and ABY3, using the ENCRYPTO library. Ø Benchmarked the protocols over LAN (40 Mbps) and WAN (1 Gbps) with the Google Cloud Platform. Ø Servers located in West Europe, East Australia, South Asia, and South East Asia. Ø For benchmarking, we used batch sizes up to 512 and feature sizes up to 1000.
Improvement in terms of Online Throughput over ABY3 Training Prediction
*Throughput for Training - #iterations processed by servers / minute *Throughput for Prediction - #queries processed by servers / minute
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
1.
Andrew Chi-Chih Yao. Protocols for secure computations (extended abstract). In FOCS, pages 160-164, 1982.
2.
3.
Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier. In IEEE S&P, 2017.
4.
and an Honest Majority. In EUROCRYPT, 2017.
5.
Malicious Adversaries. In CRYPTO, 2018.
6.
7.
Secure Prediction, In ACM CCSW , 2019.
8.
ASIACRYPT, 2018.