communication locality in c i i l li i secure multi party
play

Communication Locality in C i i L li i Secure Multi Party - PowerPoint PPT Presentation

Communication Locality in C i i L li i Secure Multi Party Secure Multi-Party Computation Computation How to Run Sublinear Algorithms in a Distributed Algorithms in a Distributed Setting Elette Boyle Shafi Goldwasser Stefano Tessaro


  1. Communication Locality in C i i L li i Secure Multi Party Secure Multi-Party Computation Computation How to Run Sublinear Algorithms in a Distributed Algorithms in a Distributed Setting Elette Boyle Shafi Goldwasser Stefano Tessaro MIT MIT & Weizmann MIT

  2. Secure Multi-Party Computation (MPC) (MPC) [Goldreich-Micali-Wigderson87]

  3. Selection of Prior MPC Work Selection of Prior MPC Work

  4. Secure Multi-Party Computation (MPC)

  5. Secure Multi-Party Computation (MPC)

  6. Today: Communication Locality in MPC Communication L Locality: Total # parties lit : T l # i each party communicates with throughout protocol lifetime

  7. Prior Work Prior Work “Everywhere” MPC not possible Isolated honest party party

  8. This Work: This Work:

  9. General MPC General MPC

  10. Special Focus: Sublinear Algorithms • Example applications: Transactions of 20-30 yr Transactions of 30-40 yr olds olds olds olds Distribution testing Testing for trends

  11. Securely Evaluating Sublinear Algorithms In principle: requires much less communication Main Challenge: Must hide which inputs are used!

  12. Related Work: Sublinear Two-Party Setting • Communication-Preserving MPC [Naor-Nissim01] – Sublinear communication Sublinear communication – Super-polynomial computation • MPC on RAM programs [Ostrovsky-Shoup97, Damgard-Meldgard-Nielsen11, Gordon-Katz- Kolesnikov+12, Lu-Ostrovsky13] K l ik 12 L O k 13] • Sublinear MPC for specific functions p [Feigenbaum-Ishai-Malkin+01, Indyk-Woodruff06, …]

  13. MPC for Sublinear Algorithms MPC for Sublinear Algorithms

  14. Protocol for Sublinear Algorithms: Overview of Algorithms: Overview of Nonadaptive Case p 3. Oblivious Input 1. Committee Setup Shuffling Shuffling 2. Input Commitment 2 I t C it t “Supreme” committee Input committees

  15. P HASE 1: C OMMITTEE S ETUP Committee Setup Input Input Input Input Shuffling Commitment

  16. Starting Point: Almost Everywhere Committee Almost-Everywhere Committee Election [King-Saia-Sanwalani-Vee06] [King Saia Sanwalani Vee06] “Good” path up tree “Good” node >2/3 node >2/3 honest

  17. Toward Full Agreement Toward Full Agreement This is where signatures (Starting point) come in “Certified” Almost- almost- Full everywhere everywhere everywhere All parties agree All parties agree

  18. Supreme & Input Committees Supreme & Input Committees • Supreme Committee S C i • Input Committees I C i D fi Defined using PRF d i PRF …

  19. P HASE 2: I NPUT C OMMITMENT Input Commitment p Committee Committee Input Input Setup Shuffling [Chor-Goldwasser-Micali-Awerbuch85]

  20. P HASE 3: I NPUT S HUFFLING Input Shuffling Input Shuffling Committee Committee Input Input Setup Commitment

  21. Switching Networks Switching Networks

  22. Oblivious Shuffling Oblivious Shuffling

  23. Committee Committee Input Input Input Input Setup Shuffling Commitment

  24. Summary of Contributions Summary of Contributions

  25. Our Model Our Model Setup (eg, PKI) Corruptions Protocol begins begins

  26. Phase 1 Overview: Committee Setup Starting point: a.e. agreement agreement “C “Certified” tifi d” a.e. agreement Full Full agreement

  27. Phase 1 Overview: Committee Setup Starting point: a.e. agreement agreement “C “Certified” tifi d” a.e. agreement Full Full All parties agree on value All parties agree on value agreement

  28. Protocol for Sublinear Algorithms: Overview 1. Communication Graph 3. Input Shuffling + Committee Setup + Committee Setup 2 2. Input Commitment I t C it t “Supreme” committee Input committees

  29. Combining Signatures into Certificate • Option 1: Append as list • Option 2: Use Multisignatures [***] Multisigs: Multisigs: Can combine sigs on same msg into short object

  30. Step 2: Input Commitment Step 2: Input Commitment FHE-Encrypted NIZK Proof of CT input validity Second Encryption NIZK Proof of of input Consistency

  31. PHASE 1: COMMITTEE SETUP COMMITTEE SETUP Committee Input Input Setup Shuffling Commitment

  32. Analyzing Communication Analyzing Communication Protocol Step Protocol Step Comm Locality Comm Locality Comm cxy Comm cxy # Rounds # Rounds A.e. leader election Certifying a.e. To full agreement Input commitment For adaptive For adaptive Gen shuffle perm algorithms Implementing shuffle h ffl Choosing inputs

  33. This Talk: This Talk: Protocol for sublinear algorithms (Thm Protocol for sublinear algorithms (Thm 2) + Complexity Analysis Extension to general functions (Thm 1) Sanjam Garg Abhishek Jain Amit Sahai Stefano Tessaro Shafi Goldwasser Yael Tauman Gil Segev Daniel Wichs

  34. Achieving Full Agreement Achieving Full Agreement “Certified” Almost- Full Full almost almost- everywhere everywhere What about isolated honest parties?? . . . . . … To be used later! Can achieve with Pseudorandom Function Family:

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend