benny pinkas bar ilan university can el elec ecti tions
play

Benny Pinkas, Bar-Ilan University Can el elec ecti tions, ons, - PowerPoint PPT Presentation

Shai Halevi, IBM T.J. Watson Yehuda uda Lindel dell, Bar-Ilan University Benny Pinkas, Bar-Ilan University Can el elec ecti tions, ons, auction ions, , statistic tistical al analysis lysis of distributed parties data really be


  1. Shai Halevi, IBM T.J. Watson Yehuda uda Lindel dell, Bar-Ilan University Benny Pinkas, Bar-Ilan University

  2.  Can el elec ecti tions, ons, auction ions, , statistic tistical al analysis lysis of distributed parties’ data really be carried out using ing secur ure e computat utation? ion?  Does s our r model of secure ure comput utation ation real ally ly model l the needs eds of these se appl plic ication ations? ◦ And I’m not talking about efficiency concerns…

  3.  In all known own protoco tocols, ls, all parties rties mu must t interact eract simul ultaneously taneously  Ar Arguably guably, , this s is a huge ge obstacl tacle e to adopti ption on ◦ A department wants to carry out a faculty tenure vote using a secure protocol  When do they run the protocol? ◦ A website wishes to securely aggregate statistics about users  Each user gives her information only when connected

  4.  Th The e sec ecure ure comp mput utation ation mo model: el:

  5.  Th The e rea eal-world world we web mo model: el:

  6.  Can secure ecure comp mputation utation be e ma made e non- simul ultaneous taneous? ◦ A natural theoretical question  Deepens our understanding of the required communication model for secure computation ◦ Important ramifications to practice  Especially if this can be done efficiently  Note: fully homomorphic encryption does not solve the problem

  7.  Pa Parti ties es ◦ One server 𝑻 ◦ 𝒐 parties 𝑸 𝟐 , … , 𝑸 𝒐  Comm mmunic unication ation mo model el ◦ Each party interacts with the server exactly ctly once ce  In all of our protocols, this interaction is a single message from the server to the party and back, but this is not essential to the model ◦ At the end, the server obtains the output  A p A protoco tocol for this s set etting ting is called ed one e pass ss

  8.  Si Since e the e protocol ocol is one-pas pass, s, the e computat utation ion carri ried ed out by 𝑸 𝒋+𝟐 , … , 𝑸 𝒐 and nd 𝑻 is of the resid sidual ual function ction 𝒉 𝒋 𝒚 𝒋+𝟐 , … , 𝒚 𝒐 = 𝒈(𝒚 𝟐 , … , 𝒚 𝒋 , 𝒚 𝒋+𝟐 , … , 𝒚 𝒐 )  If If 𝑸 𝒋+𝟐 , … , 𝑸 𝒐 and nd 𝑻 are re all corrup rupted ted and d colluding, ding, they ey can comp mpute ute 𝒉 𝒋 𝒚 𝒋+𝟐 , … , 𝒚 𝒐 and d 𝒉 𝒋 𝒚′ 𝒋+𝟐 , … , 𝒚′ 𝒐 and nd so on, on many ny inputs uts ◦ This is not allowed in classic secure computation but is inherent herent to the one-pass model

  9.  A A dec ecomposi mpositi tion on of a function ction 𝒈 𝒚 𝟐 , … , 𝒚 𝒐 is a seri ries es of 𝒐 two wo-inp input func ncti tions ons 𝒈 𝟐 , … 𝒈 𝒐 such uch that t 𝒈 𝒐 ⋯ 𝒈 𝟑 𝒈 𝟐 𝒚 𝟐 , 𝒚 𝟑 ⋯ 𝒚 𝒐 = 𝒈 𝒚 𝟐 , … , 𝒚 𝒐 ◦ In the one-pass setting 𝑸 𝒋 (and 𝑻 ) compute 𝒈 𝒋 and pass on the result ◦ If 𝑸 𝒋+𝟐 , … , 𝑸 𝒐 and 𝑻 are all corrupted and colluding, then they learn the value 𝒈 𝒋 ⋯ 𝒈 𝟑 𝒈 𝟐 𝒚 𝟐 , 𝒚 𝟑 ⋯ 𝒚 𝒋

  10.  Ho How w mu much h does es 𝒈 𝒋 ⋯ 𝒈 𝟑 𝒈 𝟐 𝒚 𝟐 , 𝒚 𝟑 ⋯ 𝒚 𝒋 revea eveal?  If it reveals veals nothing hing more e than n wh what can be comp mputed uted by the e res esidual idual functio ction 𝒉 𝒋 𝒚 𝒋+𝟐 , … , 𝒚 𝒐 = 𝒈(𝒚 𝟐 , … , 𝒚 𝒋 , 𝒚 𝒋+𝟐 , … , 𝒚 𝒐 ) then n it is minimal al disclo losure sure

  11.  Def efine ine 𝒈 𝟐 𝒚 𝟐 = 𝒚 𝟐 , , 𝒈 𝟑 𝒛 𝟐 , 𝒚 𝟑 = 𝒛 𝟐 , 𝒚 𝟑 = (𝒚 𝟐 , 𝒚 𝟑 ) , , and d so on (all are ident ntity ity function ctions), s), and d 𝒈 𝒐 = 𝒈 ◦ If 𝑸 𝒐 and 𝑻 are corrupted, all is revealed  Consid sider er the SUM M function ction and define ne 𝒈 𝒋 𝒛 𝒋−𝟐 , 𝒚 𝒋 = 𝒛 𝒋−𝟐 + 𝒚 𝒋 ◦ Given 𝒛 𝒋 can learn nothing more than sum of first 𝒋 ◦ But this is computable from the residual function ◦ This is minimal disclosure

  12.  We We follow w the e real eal/ideal /ideal simu mulation lation paradi radigm gm  Security urity is formal aliz ized ed as in the stand ndard rd setti ting ng wi with one except ption ion ◦ If the server is corrupted, then the adversary is given 𝒈 𝒋 (𝒚 𝟐 , … , 𝒚 𝒋 ) where 𝑸 𝒋 is the last honest party  A p protocol tocol one-pa pass ss secu cure rely ly co compute mputes s a deco compo mpositi sition on if there e exists sts an ideal simula ulator tor such ch that t real and ideal are indistingui stinguisha shabl ble ◦ The protocol is opti tima mall lly private vate if the decomposition is minimum disclosure

  13.  Can this s notion on be e achieved eved?  If yes, s, ◦ Under what assumptions? ◦ At what cost?

  14.  Bi Binary ary symm mmetric etric func ncti tions ons ◦ Depend only on Hamming weight of input ◦ E.g., AND, OR, PARITY, MAJORITY  Concise ise truth th table e represent presentatio ation ◦ Example: the MAJORITY function over 5 bits Hamming ng Outpu put Weight ght In general, this 0 0 contains the 1 0 function output on the relevant 2 0 weight 3 1 4 1 5 1

  15.  Define ine 𝒛 𝟐 = 𝒈 𝟐 𝒚 𝟐 to be the truth th table, e, wi with the 1 st st row w erased ased if 𝒚 𝟐 = 𝟐 and nd the last t row w er erased ased if 𝒚 𝟐 = 𝟏 Hamming ng Outpu put Weight ght 𝒚 𝟐 = 𝟐 0 0 1 0 2 0 3 1 4 1 𝒚 𝟐 = 𝟏 5 1

  16.  Define ine 𝒈 𝟑 𝒛 𝟐 , 𝒚 𝟑 to be the trunc uncate ated d truth uth table, e, wi with the last remaining aining row w erased sed if 𝒚 𝟑 = 𝟏 and nd the e first st row w er erased ased if 𝒚 𝟑 = 𝟐 Hamming ng Outpu put Weight ght 𝒚 𝟑 = 𝟐 0 0 1 0 2 0 3 1 4 1 𝒚 𝟐 = 𝟏 5 1

  17.  And so on… ◦ Note, each truth table can be efficiently computed from the previous one Hamming ng Outpu put Weight ght 𝒚 𝟑 = 𝟐 0 0 𝒚 𝟒 = 𝟐 1 0 2 0 𝒚 𝟔 = 𝟏 3 1 𝒚 𝟓 = 𝟏 4 1 𝒚 𝟐 = 𝟏 5 1 ◦ Indeed, the output of 𝑵𝑩𝑲(𝟏𝟐𝟐𝟏𝟏) = 𝟏

  18.  Wh Why is this s minimum mum disclosure osure? ◦ The truth table reveals nothing more than the output of the function on the remaining inputs

  19.  Main n tool – layer er rerandomi erandomizable zable en encryptio ryption ◦ Denote 𝑭 𝒒𝒍 (𝒚; 𝒔) and 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝒐+𝟐 𝒚; 𝒔 𝟐 , … , 𝒔 𝒐+𝟐 = 𝑭 𝒒𝒍 𝟐 ⋯ 𝑭 𝒒𝒍 𝒐+𝟐 𝒚; 𝒔 𝒐+𝟐 ⋯ ; 𝒔 𝟐 ◦ This is layer yer rerandom randomizab izable le if there exists an efficient procedure that rerandomizes all layers (given public keys) ◦ This can be constructed from any rerandomizable encryption, and highly ighly effi fici cientl ently y from ElGamal  Note: : all protocols ocols assume sume PK PKI (essential ssential here) re)

  20.  Se Server rver 𝑻 en encrypts crypts the e truth th table le under der all parties’ keys ys ◦ Using rerandomizable layer encryption  For 𝒋 = 𝟐, … , 𝒐 (bu but t in any y order er) ◦ Party 𝑸 𝒋 retrieves current truth table from the server ◦ 𝑸 𝒋 removes the first or last remaining row, decrypts under its key, rerandomizes every entry of the truth table, and sends to 𝑻  After r all parti ties es conclude, ude, all that t remai ains ns is a single gle row, w, wh which h is the outpu put

  21.  Majo jority rity function ction wi with 5 p 5 parti ties es Hamming ng Outpu put Weight ght 0 0 1 0 2 0 3 1 4 1 5 1

  22.  Th The server ver 𝑻 co compute mputes s the encr crypte ypted d co conci cise se truth th table e ( 𝒒𝒍 𝟕 is the server’s public -key key) 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟏; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟏; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟏; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟐; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟐; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟐; 𝒔 𝟐 , … , 𝒔 𝟕

  23.  𝑸 𝟐 wi with input ut 𝒚 𝟐 = 𝟏 erases erases 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟏; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟏; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟏; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟐; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟐; 𝒔 𝟐 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟐; 𝒔 𝟐 , … , 𝒔 𝟕

  24.  𝑸 𝟐 wi with input ut 𝒚 𝟐 = 𝟏 erases, erases, rem emove ves s its key ey and d rerandom randomizes izes 𝑭 𝒒𝒍 𝟑 ,…,𝒒𝒍 𝟕 𝟏; 𝒔 𝟑 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟑 ,…,𝒒𝒍 𝟕 𝟏; 𝒔 𝟑 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟑 ,…,𝒒𝒍 𝟕 𝟏; 𝒔 𝟑 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟑 ,…,𝒒𝒍 𝟕 𝟐; 𝒔 𝟑 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟑 ,…,𝒒𝒍 𝟕 𝟐; 𝒔 𝟑 , … , 𝒔 𝟕 𝑭 𝒒𝒍 𝟐 ,…,𝒒𝒍 𝟕 𝟐; 𝒔 𝟐 , … , 𝒔 𝟕

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend