collusion preserving computation
play

Collusion-Preserving Computation Jol Alwen (ETH Zrich) Jonathan - PowerPoint PPT Presentation

Collusion-Preserving Computation Jol Alwen (ETH Zrich) Jonathan Katz (U. Maryland) Ueli Maurer (ETH Zrich) Vassilis Zikas (U. Maryland) Overview l Motivation & Goals l Definition l Fall-back Security l Synchronization


  1. Collusion-Preserving Computation Joël Alwen (ETH Zürich) Jonathan Katz (U. Maryland) Ueli Maurer (ETH Zürich) Vassilis Zikas (U. Maryland)

  2. Overview l Motivation & Goals l Definition l Fall-back Security l Synchronization Pollution l Implications for Game Theory l Future Directions

  3. Goals (1)

  4. Goals (1) l Primary Goal: A realization notion bounding the capabilities of deviating coalitions even in the presence of arbitrary composition.

  5. Goals (1) l Primary Goal: A realization notion bounding the capabilities of deviating coalitions even in the presence of arbitrary composition. “R realizes F” = R can be used in place of F l

  6. Goals (1) l Primary Goal: A realization notion bounding the capabilities of deviating coalitions even in the presence of arbitrary composition. “R realizes F” = R can be used in place of F l “capabilities of deviating coalitions” = such l that even collaborating “dishonest” players can do no more with R then they could with F

  7. Goals (1) l Primary Goal: A realization notion bounding the capabilities of deviating coalitions even in the presence of arbitrary composition. “R realizes F” = R can be used in place of F l “capabilities of deviating coalitions” = such l that even collaborating “dishonest” players can do no more with R then they could with F “arbitrary composition” = regardless of any l concurrent activities in which they may be involved.

  8. Example Use Cases

  9. Example Use Cases l Composable Game Theory. Extreme case of deviating coalitions. l

  10. Example Use Cases l Composable Game Theory. Extreme case of deviating coalitions. l l Collusion-Free (CF) MPC robust in the presence of side-channels. CF (provably) not concurrently composable l

  11. Example Use Cases l Composable Game Theory. Extreme case of deviating coalitions. l l Collusion-Free (CF) MPC robust in the presence of side-channels. CF (provably) not concurrently composable l l Other (intuitive) examples requiring bounds on collaborating dishonest players. Incoercability: Coercer/Informant & Coercee. l Auctions: Bid fixing by corrupt bidders. l Bounded Isolation: Useful for say, poker or bridge l

  12. Goals (2)

  13. Goals (2) Generic definition independent of l communication resource R. Better for comparing different − constructions. Allows investigating minimal properties − for resource R used to realize a given F.

  14. Goals (2) Generic definition independent of l communication resource R. Better for comparing different − constructions. Allows investigating minimal properties − for resource R used to realize a given F. Non-triviality: strong fall-back security even l if R “miss-behaves”.

  15. Goals (2) Generic definition independent of l communication resource R. Better for comparing different − constructions. Allows investigating minimal properties − for resource R used to realize a given F. Non-triviality: strong fall-back security even l if R “miss-behaves”. Concrete communication resource R & l construction for many F.

  16. Goals (2) Generic definition independent of l communication resource R. Better for comparing different − constructions. Allows investigating minimal properties − for resource R used to realize a given F. Non-triviality: strong fall-back security even l if R “miss-behaves”. Concrete communication resource R & l construction for many F. Explore implications for composable Game l

  17. Related Work

  18. Related Work l SFE/MPC [GMW, BGW,...] First generic realization notions. l Not generally composable − Gives deviating coalitions arbitrary (internal) − capabilities (monolithic adversary)

  19. Related Work l SFE/MPC [GMW, BGW,...] First generic realization notions. l Not generally composable − Gives deviating coalitions arbitrary (internal) − capabilities (monolithic adversary) l Arbitrary composition [Can, PW, CLOS, CDPW,...] Exa: UC, GUC, JUC, etc. l But monolithic adversary −

  20. Related Work l SFE/MPC [GMW, BGW,...] First generic realization notions. l Not generally composable − Gives deviating coalitions arbitrary (internal) − capabilities (monolithic adversary) l Arbitrary composition [Can, PW, CLOS, CDPW,...] Exa: UC, GUC, JUC, etc. l But monolithic adversary − l Collusion-Free (CF) computation [LMPS, ILM, ASV, AKLPSV] Bounds deviating coalitions (via split adversaries) l

  21. CF is not Composable

  22. CF is not Composable l = 2-party null functionality (does nothing) F l Define and protocol π = ( , ) π 2 π 1 R

  23. CF is not Composable l = 2-party null functionality (does nothing) F l Define and protocol π = ( , ) π 2 π 1 R R π 2 2k π 1 m ∈ {0,1} k r ← {0,1} (unif. rand.) k r' ∈ {0,1} If r' = r ⇒ a := m a Else ⇒ a := ⊥

  24. CF is not Composable l = 2-party null functionality (does nothing) F l Define and protocol π = ( , ) π 2 π 1 R R π 2 2k π 1 m ∈ {0,1} k r ← {0,1} (unif. rand.) k r' ∈ {0,1} If r' = r ⇒ a := m a Else ⇒ a := ⊥ r is uniform random and allows no communication between F l π 1 simulators. ⇒ Can always simulate for with a = ⊥ . ⇒ CF-realizes via π . R F

  25. CF is not Composable l = 2-party null functionality (does nothing) F l Define and protocol π = ( , ) π 2 π 1 R R π 2 2k π 1 m ∈ {0,1} k r ← {0,1} (unif. rand.) k r' ∈ {0,1} If r' = r ⇒ a := m a Else ⇒ a := ⊥ r is uniform random and allows no communication between F l π 1 simulators. ⇒ Can always simulate for with a = ⊥ . ⇒ CF-realizes via π . R F Now compose with ; a k -bit channel from P2 → P1. Use it transmit r . C l So P2 can learn m from . But using & the simulators can C F R communicate at most k. I.e. π is no longer simulatable!

  26. Composable CF → Collusion-Preservation

  27. Composable CF → Collusion-Preservation l Goal: Add composability to CF.

  28. Composable CF → Collusion-Preservation l Goal: Add composability to CF. l Idea: Add an environment (as in UC-style realization notions) to CF → CP .

  29. Composable CF → Collusion-Preservation l Goal: Add composability to CF. l Idea: Add an environment (as in UC-style realization notions) to CF → CP . l Immediate results: Dummy (adversary) lemma and (G)UC l composition theorems hold essentially unchanged.

  30. Composable CF → Collusion-Preservation l Goal: Add composability to CF. l Idea: Add an environment (as in UC-style realization notions) to CF → CP . l Immediate results: Dummy (adversary) lemma and (G)UC l composition theorems hold essentially unchanged. CP strictly generalizes (G)UC realization l notions.

  31. Construction (1)

  32. Construction (1) l CP Construction for F using resource R: Trivial Idea: Resource R = Functionality F. l

  33. Construction (1) l CP Construction for F using resource R: Trivial Idea: Resource R = Functionality F. l l Issues: R depends on F l We show that to some extent such a − dependency is unavoidable. However at least R must only be − “programmable” but not fully “non-uniform”.

  34. Construction (1) l CP Construction for F using resource R: Trivial Idea: Resource R = Functionality F. l l Issues: R depends on F l We show that to some extent such a − dependency is unavoidable. However at least R must only be − “programmable” but not fully “non-uniform”. If R mis-behaves all bets are off. l Usually we don't care about this case. But trust − is a rare commodity.

  35. Fallback Security

  36. Fallback Security l Def. “Fallback Security” = Security attained when protocol is run using an arbitrary communication resource.

  37. Fallback Security l Def. “Fallback Security” = Security attained when protocol is run using an arbitrary communication resource. l Example: Protocol π CP-realizes R from F with GUC-Fallback Security. If π is run with R then F is CP-realized. l If π is run with any R* then F is GUC-realized. l

  38. Fallback Security l Def. “Fallback Security” = Security attained when protocol is run using an arbitrary communication resource. l Example: Protocol π CP-realizes R from F with GUC-Fallback Security. If π is run with R then F is CP-realized. l If π is run with any R* then F is GUC-realized. l l Now trivial construction no longer works because it achieves no fallback security.

  39. Construction (2)

  40. Construction (2) l Recall CF construction of Mediated Model of [ASV, AKLPSV]. Idea: “assisted SFE in the mediator's head” For functionality F, let protocol π = GMW(F). l “Mediator” resource M runs π on behalf of players “in l her head”. Player Pi's internal state in π shared between Pi and l M. Next protocol msg generated and Pi's state updated l via 2-party SFE between Pi and M.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend