dating + big data user . . . . . . . . dating + big data - - PowerPoint PPT Presentation

dating big data
SMART_READER_LITE
LIVE PREVIEW

dating + big data user . . . . . . . . dating + big data - - PowerPoint PPT Presentation

encrypted computation from lattices Hoeteck Wee ENS, Paris . . . . . . . . dating + big data user . . . . . . . . dating + big data user profile limit access? . . . . . . . . dating + big data user profile tall


slide-1
SLIDE 1

. . . . . . . .

encrypted computation

from lattices

Hoeteck Wee

ENS, Paris

slide-2
SLIDE 2

. . . . . . . .

dating + big data

user

slide-3
SLIDE 3

. . . . . . . .

dating + big data

user profile

limit access?

slide-4
SLIDE 4

. . . . . . . .

dating + big data

user profile tall ∧ dark ∧ handsome

slide-5
SLIDE 5

. . . . . . . .

dating + big data

user profile (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs)

slide-6
SLIDE 6

. . . . . . . .

dating + big data

user me tall dark handsome cs math phd profile (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs)

slide-7
SLIDE 7

. . . . . . . .

dating + big data

user me tall dark handsome cs math phd profile (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs)

slide-8
SLIDE 8

. . . . . . . .

dating + big data

user me tall dark handsome cs math phd (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs)

slide-9
SLIDE 9

. . . . . . . .

dating + big data

user me tall dark handsome cs math phd profile (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs)

slide-10
SLIDE 10

. . . . . . . .

dating + big data

user me tall dark handsome cs math phd

collusion

profile (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs)

slide-11
SLIDE 11

. . . . . . . .

attribute-based encryption

[GPSW06,SW05]

sender receiver f, M x, skx learns M ⇔ f(x) = 1

M

slide-12
SLIDE 12

. . . . . . . .

attribute-based encryption

[GPSW06,SW05]

sender receiver

security against collusions

receiver x′, skx′ + f, M x, skx learns M ⇔ f(x) = 1

M

slide-13
SLIDE 13

. . . . . . . .

attribute-based encryption

[GPSW06,SW05]

sender receiver receiver x′, skx′ + f, M x, skx learns M ⇔ f(x) = 1

M

2001 – 2013. shallow circuits

[BF01, CHK04, BB04, GPSW06, W09, LW10, LOSTW10, OT10, ...]

slide-14
SLIDE 14

. . . . . . . .

attribute-based encryption

[GPSW06,SW05]

sender receiver receiver x′, skx′ + f, M x, skx learns M ⇔ f(x) = 1

M

  • 2013. all circuits from LWE

[Gorbunov Vaikuntanathan W 13, Boneh Gentry Gorbunov Halevi

Nikolaenko Segev Vaikuntanathan Vinayagamurthy 14]

slide-15
SLIDE 15

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

slide-16
SLIDE 16

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

+

M

slide-17
SLIDE 17

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

+

collusion

slide-18
SLIDE 18

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

Rcs, Rphd Rcs, Rmsc Rbio, Rphd

slide-19
SLIDE 19

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

M ⊕ Rcs ⊕ Rphd Rcs, Rphd Rcs, Rmsc Rbio, Rphd

slide-20
SLIDE 20

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

M ⊕ Rcs ⊕ Rphd Rcs, Rphd Rcs, Rmsc Rbio, Rphd

+

M

slide-21
SLIDE 21

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

M ⊕ Rcs ⊕ Rphd Rcs, Rphd Rcs, Rmsc Rbio, Rphd

+ +

slide-22
SLIDE 22

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

M ⊕ Rcs ⊕ Rphd Rcs, Rphd Rcs, Rmsc Rbio, Rphd

+

collusion

slide-23
SLIDE 23

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

M ⊕ Rcs ⊕ Rphd Rcs, Rphd Rcs, Rmsc Rbio, Rphd

+

collusion

M

mix and match

slide-24
SLIDE 24

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

M ⊕ Rcs ⊕ Rphd Rcs, Rphd Rcs, Rmsc Rbio, Rphd

+

collusion

M

mix and match

insecure against

collusions

slide-25
SLIDE 25

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

M ⊕ Rcs ⊕ Rphd Rcs, Rphd Rcs, Rmsc Rbio, Rphd

mix and match

Key Idea.

[GVW13]

strings R → functions φ(·)

  • ne-use → many-use
slide-26
SLIDE 26

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

Rcs, Rphd Rcs, Rmsc Rbio, Rphd φcs(·), φphd(·) φcs(·), φmsc(·) φbio(·), φphd(·)

slide-27
SLIDE 27

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

Rcs, Rphd Rcs, Rmsc Rbio, Rphd φcs(s), φphd(s) φcs(t), φmsc(t) φbio(u), φphd(u)

slide-28
SLIDE 28

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

Rcs, Rphd Rcs, Rmsc Rbio, Rphd φcs(s), φphd(s) φcs(t), φmsc(t) φbio(u), φphd(u)

+

M

slide-29
SLIDE 29

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

Rcs, Rphd Rcs, Rmsc Rbio, Rphd φcs(s), φphd(s) φcs(t), φmsc(t) φbio(u), φphd(u) φcs(s′), φphd(s′)

+

M

slide-30
SLIDE 30

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

Rcs, Rphd Rcs, Rmsc Rbio, Rphd φcs(s), φphd(s) φcs(t), φmsc(t) φbio(u), φphd(u)

+

collusion

mix and match

φcs(t), φmsc(t) φbio(u), φphd(u)

slide-31
SLIDE 31

. . . . . . . .

attribute-based encryption (I)

M

phd ∧ cs cs phd cs msc bio phd

Rcs, Rphd Rcs, Rmsc Rbio, Rphd φcs(s), φphd(s) φcs(t), φmsc(t) φbio(u), φphd(u)

+

collusion

mix and match

φcs(t), φmsc(t) φbio(u), φphd(u)

theorem.

[GVW13]

secure against collusions

works for general circuits

slide-32
SLIDE 32

. . . . . . . .

attribute-based encryption (I)

theorem.

[GVW13]

secure against collusions

works for general circuits ∧ φcs φphd ∨ φ1 φ2 ∧ φ4 φ3 φout

slide-33
SLIDE 33

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

lemma II .

Ai x f

small Hf x

A x G An xnG Hf x Af f x G

slide-34
SLIDE 34

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

slide-35
SLIDE 35

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A A1, . . . , An, P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

slide-36
SLIDE 36

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

slide-37
SLIDE 37

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M Af · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

slide-38
SLIDE 38

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M Af · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

  • correctness. f(x) = 0 ⇒ learns M
slide-39
SLIDE 39

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M Af · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

  • correctness. f(x) = 0 ⇒ learns M

s[A1 − x1G | · · · | An − xnG]Hf,x skf = s(Af − f(x)G)

slide-40
SLIDE 40

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M Af · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

  • correctness. f(x) = 0 ⇒ learns M

s[A1 − x1G | · · · | An − xnG]Hf,x skf = sAf

slide-41
SLIDE 41

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M Af · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

  • correctness. f(x) = 0 ⇒ learns M

s[A1 − x1G | · · · | An − xnG]Hf,x · skf = sAf · skf

slide-42
SLIDE 42

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M Af · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

  • correctness. f(x) = 0 ⇒ learns M

s[A1 − x1G | · · · | An − xnG]Hf,x · skf = sP

slide-43
SLIDE 43

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A, A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M, sA + e′ Af · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

slide-44
SLIDE 44

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A, A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M, sA + e′ [A | Af] · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

slide-45
SLIDE 45

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A, A1, . . . , An, P s[A1 − x1G | · · · | An − xnG] + e, sP + M, sA + e′ [A | Af] · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x [A1 − x1G | · · · | An − xnG]·Hf,x = Af − f(x)G

  • security. M hidden given ciphertext, skf, f(x) ̸= 0
slide-46
SLIDE 46

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A, A1, . . . , An, P sAR + e, sP + M, sA + e′ [A | Af] · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x AR·Hf,x = Af − f(x)G

  • security. M hidden given ciphertext, skf, f(x) ̸= 0
slide-47
SLIDE 47

. . . . . . . .

attribute-based encryption (II)

sender receiver x, M f, skf learns M ⇔ f(x) = 0

M

A, A1, . . . , An, P sAR + e, sP + M, sA + e′ [A | Af] · skf = P

lemma II∗.

∀Ai, ∀x, ∀f, ∃ small Hf,x AR·Hf,x = Af − f(x)G

  • security. M hidden given ciphertext, skf =

(−RHf,x

I

) G−1( 1

f(x)P)

slide-48
SLIDE 48

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f learns f(x)

  • security. semi-honest Bob learns f x and nothing else about x

efficiency.

  • NOTE. naive solution with FHE requires additional interaction
slide-49
SLIDE 49

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f digest learns f(x)

  • security. semi-honest Bob learns f x and nothing else about x

efficiency.

  • NOTE. naive solution with FHE requires additional interaction
slide-50
SLIDE 50

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f digest ciphertext learns f(x)

  • security. semi-honest Bob learns f x and nothing else about x

efficiency.

  • NOTE. naive solution with FHE requires additional interaction
slide-51
SLIDE 51

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f digest ciphertext learns f(x)

  • security. hides x
  • efficiency. ≈ Alice sends x
  • NOTE. naive solution with FHE requires additional interaction
slide-52
SLIDE 52

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f digest ciphertext learns f(x)

  • security. semi-honest Bob learns f(x) and nothing else about x
  • efficiency. ≈ Alice sends x
  • NOTE. naive solution with FHE requires additional interaction
slide-53
SLIDE 53

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f digest ciphertext learns f(x)

  • security. semi-honest Bob learns f(x) and nothing else about x
  • efficiency. Alice’s computation independent of f
  • NOTE. naive solution with FHE requires additional interaction
slide-54
SLIDE 54

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f digest ciphertext learns f(x)

  • security. semi-honest Bob learns f(x) and nothing else about x
  • efficiency. Alice’s computation independent of f
  • NOTE. naive solution with FHE requires additional interaction
slide-55
SLIDE 55

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f digest ciphertext learns f(x)

construction.

digest = A1, . . . , An, Af

slide-56
SLIDE 56

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f digest ciphertext learns f(x)

construction.

digest = A1, . . . , An, Af ciphertext ≈ s[A1 − x1G | · · · | An − xnG], sAf

slide-57
SLIDE 57

. . . . . . . .

laconic function evaluation

[Quach W Wichs 18, CDGGMP17]

alice bob x f digest ciphertext learns f(x)

construction.

digest = A1, . . . , An, Aˆ

f

where ˆ f = fhe.eval(f, ·) [GKPVZ13, GVW12, GVW15, ...]

slide-58
SLIDE 58

. . . . . . . .

conclusion

  • today. lattices ⇒ encrypted computation

[A1 − x1G | · · · | An − xnG] · Hf,x = Af − f(x)G

  • tomorrow. another way to encode computation into lattices

[GGH15, CC17, GKW17, WZ17, CVW18]

slide-59
SLIDE 59

. . . . . . . .

conclusion

  • today. lattices ⇒ encrypted computation

[A1 − x1G | · · · | An − xnG] · Hf,x = Af − f(x)G

  • tomorrow. another way to encode computation into lattices

[GGH15, CC17, GKW17, WZ17, CVW18]

slide-60
SLIDE 60

communication

// thank you

. . . . . . . .

slide-61
SLIDE 61

internet

// thank you

. . . . . . . .

slide-62
SLIDE 62

communication computation

// thank you

. . . . . . . .

slide-63
SLIDE 63

big data internet

// thank you

. . . . . . . .

slide-64
SLIDE 64

big data internet

// thank you

. . . . . . . .