dating big data
play

dating + big data user . . . . . . . . dating + big data - PowerPoint PPT Presentation

encrypted computation from lattices Hoeteck Wee ENS, Paris . . . . . . . . dating + big data user . . . . . . . . dating + big data user profile limit access? . . . . . . . . dating + big data user profile tall


  1. encrypted computation from lattices Hoeteck Wee ENS, Paris . . . . . . . .

  2. dating + big data user . . . . . . . .

  3. dating + big data user profile limit access? . . . . . . . .

  4. dating + big data user profile tall ∧ dark ∧ handsome . . . . . . . .

  5. dating + big data user profile (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs) . . . . . . . .

  6. dating + big data me tall dark user profile handsome cs (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs) math phd . . . . . . . .

  7. dating + big data me tall dark user profile handsome cs (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs) math phd . . . . . . . .

  8. dating + big data me tall dark user handsome cs (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs) math phd . . . . . . . .

  9. dating + big data me tall dark user profile handsome cs (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs) math phd . . . . . . . .

  10. dating + big data me tall dark user profile handsome cs (tall ∧ dark ∧ handsome) ∨ (phd ∧ cs) math phd collusion . . . . . . . .

  11. attribute-based encryption [ GPSW06,SW05 ] sender receiver M f , M x , sk x learns M ⇔ f ( x ) = 1 . . . . . . . .

  12. attribute-based encryption [ GPSW06,SW05 ] + sender receiver receiver M f , M x , sk x x ′ , sk x ′ learns M ⇔ f ( x ) = 1 security against collusions . . . . . . . .

  13. attribute-based encryption [ GPSW06,SW05 ] + sender receiver receiver M f , M x , sk x x ′ , sk x ′ learns M ⇔ f ( x ) = 1 2001 – 2013. shallow circuits [ BF01, CHK04, BB04, GPSW06, W09, LW10, LOSTW10, OT10, ... ] . . . . . . . .

  14. attribute-based encryption [ GPSW06,SW05 ] + sender receiver receiver M f , M x , sk x x ′ , sk x ′ learns M ⇔ f ( x ) = 1 2013. all circuits from LWE [ Gorbunov Vaikuntanathan W 13, Boneh Gentry Gorbunov Halevi Nikolaenko Segev Vaikuntanathan Vinayagamurthy 14 ] . . . . . . . .

  15. attribute-based encryption (I) M cs phd phd ∧ cs cs msc bio phd . . . . . . . .

  16. attribute-based encryption (I) + M M cs phd phd ∧ cs cs msc bio phd . . . . . . . .

  17. attribute-based encryption (I) M cs phd phd ∧ cs cs msc + bio phd collusion . . . . . . . .

  18. attribute-based encryption (I) R cs , R phd M cs phd phd ∧ cs R cs , R msc cs msc R bio , R phd bio phd . . . . . . . .

  19. attribute-based encryption (I) M ⊕ R cs ⊕ R phd R cs , R phd M cs phd phd ∧ cs R cs , R msc cs msc R bio , R phd bio phd . . . . . . . .

  20. attribute-based encryption (I) + M M ⊕ R cs ⊕ R phd R cs , R phd M cs phd phd ∧ cs R cs , R msc cs msc R bio , R phd bio phd . . . . . . . .

  21. attribute-based encryption (I) M ⊕ R cs ⊕ R phd R cs , R phd M cs phd phd ∧ cs + R cs , R msc cs msc + R bio , R phd bio phd . . . . . . . .

  22. attribute-based encryption (I) M ⊕ R cs ⊕ R phd R cs , R phd M cs phd phd ∧ cs R cs , R msc cs msc + R bio , R phd bio phd collusion . . . . . . . .

  23. attribute-based encryption (I) M M ⊕ R cs ⊕ R phd R cs , R phd M cs phd phd ∧ cs mix and match R cs , R msc cs msc + R bio , R phd bio phd collusion . . . . . . . .

  24. attribute-based encryption (I) M M ⊕ R cs ⊕ R phd R cs , R phd M cs phd phd ∧ cs mix and match R cs , R msc ⇒ cs msc + insecure against collusions R bio , R phd bio phd collusion . . . . . . . .

  25. attribute-based encryption (I) M ⊕ R cs ⊕ R phd R cs , R phd M Key Idea. [ GVW13 ] cs phd strings R → functions φ ( · ) phd ∧ cs one-use → many-use mix and match R cs , R msc cs msc R bio , R phd bio phd . . . . . . . .

  26. attribute-based encryption (I) R cs , R phd M φ cs ( · ) , φ phd ( · ) cs phd phd ∧ cs R cs , R msc φ cs ( · ) , φ msc ( · ) cs msc R bio , R phd φ bio ( · ) , φ phd ( · ) bio phd . . . . . . . .

  27. attribute-based encryption (I) φ cs ( s ) , φ phd ( s ) R cs , R phd M cs phd phd ∧ cs φ cs ( t ) , φ msc ( t ) R cs , R msc cs msc R bio , R phd φ bio ( u ) , φ phd ( u ) bio phd . . . . . . . .

  28. attribute-based encryption (I) + M φ cs ( s ) , φ phd ( s ) R cs , R phd M cs phd phd ∧ cs φ cs ( t ) , φ msc ( t ) R cs , R msc cs msc R bio , R phd φ bio ( u ) , φ phd ( u ) bio phd . . . . . . . .

  29. attribute-based encryption (I) + M φ cs ( s ) , φ phd ( s ) R cs , R phd M cs phd φ cs ( s ′ ) , φ phd ( s ′ ) phd ∧ cs φ cs ( t ) , φ msc ( t ) R cs , R msc cs msc R bio , R phd φ bio ( u ) , φ phd ( u ) bio phd . . . . . . . .

  30. attribute-based encryption (I) φ cs ( s ) , φ phd ( s ) R cs , R phd M cs phd phd ∧ cs φ cs ( t ) , φ msc ( t ) φ cs ( t ) , φ msc ( t ) R cs , R msc cs msc mix and match + R bio , R phd φ bio ( u ) , φ phd ( u ) φ bio ( u ) , φ phd ( u ) bio phd collusion . . . . . . . .

  31. attribute-based encryption (I) φ cs ( s ) , φ phd ( s ) R cs , R phd M theorem. [ GVW13 ] cs phd secure against collusions phd ∧ cs works for general circuits φ cs ( t ) , φ msc ( t ) φ cs ( t ) , φ msc ( t ) R cs , R msc cs msc mix and match + R bio , R phd φ bio ( u ) , φ phd ( u ) φ bio ( u ) , φ phd ( u ) bio phd collusion . . . . . . . .

  32. attribute-based encryption (I) φ cs φ phd theorem. [ GVW13 ] ∧ secure against collusions works for general circuits φ 1 φ 2 ∨ φ 3 φ 4 ∧ φ out . . . . . . . .

  33. A i x f small H f x lemma II . A x G A n x n G H f x A f f x G attribute-based encryption (II) receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 . . . . . . . .

  34. attribute-based encryption (II) receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 ∀ A i , ∀ x , ∀ f , ∃ small H f , x lemma II ∗ . [ A 1 − x 1 G | · · · | A n − x n G ] · H f , x = A f − f ( x ) G . . . . . . . .

  35. A attribute-based encryption (II) A 1 , . . . , A n , P receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 ∀ A i , ∀ x , ∀ f , ∃ small H f , x lemma II ∗ . [ A 1 − x 1 G | · · · | A n − x n G ] · H f , x = A f − f ( x ) G . . . . . . . .

  36. A attribute-based encryption (II) A 1 , . . . , A n , P receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 s [ A 1 − x 1 G | · · · | A n − x n G ] + e , sP + M ∀ A i , ∀ x , ∀ f , ∃ small H f , x lemma II ∗ . [ A 1 − x 1 G | · · · | A n − x n G ] · H f , x = A f − f ( x ) G . . . . . . . .

  37. A attribute-based encryption (II) A 1 , . . . , A n , P A f · sk f = P receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 s [ A 1 − x 1 G | · · · | A n − x n G ] + e , sP + M ∀ A i , ∀ x , ∀ f , ∃ small H f , x lemma II ∗ . [ A 1 − x 1 G | · · · | A n − x n G ] · H f , x = A f − f ( x ) G . . . . . . . .

  38. A attribute-based encryption (II) A 1 , . . . , A n , P A f · sk f = P receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 s [ A 1 − x 1 G | · · · | A n − x n G ] + e , sP + M ∀ A i , ∀ x , ∀ f , ∃ small H f , x lemma II ∗ . [ A 1 − x 1 G | · · · | A n − x n G ] · H f , x = A f − f ( x ) G correctness. f ( x ) = 0 ⇒ learns M . . . . . . . .

  39. A sk f attribute-based encryption (II) A 1 , . . . , A n , P A f · sk f = P receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 s [ A 1 − x 1 G | · · · | A n − x n G ] + e , sP + M ∀ A i , ∀ x , ∀ f , ∃ small H f , x lemma II ∗ . [ A 1 − x 1 G | · · · | A n − x n G ] · H f , x = A f − f ( x ) G correctness. f ( x ) = 0 ⇒ learns M s [ A 1 − x 1 G | · · · | A n − x n G ] H f , x = s ( A f − f ( x ) G ) . . . . . . . .

  40. A sk f attribute-based encryption (II) A 1 , . . . , A n , P A f · sk f = P receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 s [ A 1 − x 1 G | · · · | A n − x n G ] + e , sP + M ∀ A i , ∀ x , ∀ f , ∃ small H f , x lemma II ∗ . [ A 1 − x 1 G | · · · | A n − x n G ] · H f , x = A f − f ( x ) G correctness. f ( x ) = 0 ⇒ learns M s [ A 1 − x 1 G | · · · | A n − x n G ] H f , x = sA f . . . . . . . .

  41. A attribute-based encryption (II) A 1 , . . . , A n , P A f · sk f = P receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 s [ A 1 − x 1 G | · · · | A n − x n G ] + e , sP + M ∀ A i , ∀ x , ∀ f , ∃ small H f , x lemma II ∗ . [ A 1 − x 1 G | · · · | A n − x n G ] · H f , x = A f − f ( x ) G correctness. f ( x ) = 0 ⇒ learns M s [ A 1 − x 1 G | · · · | A n − x n G ] H f , x · sk f = sA f · sk f . . . . . . . .

  42. A attribute-based encryption (II) A 1 , . . . , A n , P A f · sk f = P receiver sender M x , M f , sk f learns M ⇔ f ( x ) = 0 s [ A 1 − x 1 G | · · · | A n − x n G ] + e , sP + M ∀ A i , ∀ x , ∀ f , ∃ small H f , x lemma II ∗ . [ A 1 − x 1 G | · · · | A n − x n G ] · H f , x = A f − f ( x ) G correctness. f ( x ) = 0 ⇒ learns M s [ A 1 − x 1 G | · · · | A n − x n G ] H f , x · sk f = sP . . . . . . . .

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend