MPC Complexity Manoj Prabhakaran :: IIT Bombay The World of - - PowerPoint PPT Presentation

mpc complexity
SMART_READER_LITE
LIVE PREVIEW

MPC Complexity Manoj Prabhakaran :: IIT Bombay The World of - - PowerPoint PPT Presentation

MPC Complexity Manoj Prabhakaran :: IIT Bombay The World of Functionalities The World of Functionalities Distributed functions display interesting features the are not apparent when they are not distributed The World of Functionalities


slide-1
SLIDE 1

MPC Complexity

Manoj Prabhakaran :: IIT Bombay

slide-2
SLIDE 2

The World of Functionalities

slide-3
SLIDE 3

The World of Functionalities

Distributed functions display interesting features the are not apparent when they are not distributed

slide-4
SLIDE 4

The World of Functionalities

Distributed functions display interesting features the are not apparent when they are not distributed Classical example: Communication Complexity [Yao]

slide-5
SLIDE 5

The World of Functionalities

Distributed functions display interesting features the are not apparent when they are not distributed Classical example: Communication Complexity [Yao] MPC provides another lens to look at the complexity

  • f functions
slide-6
SLIDE 6

Complexity w.r.t. MPC

slide-7
SLIDE 7

Complexity w.r.t. MPC

We saw OT is complete for MPC Any other functionality can be reduced to OT Under all notions of reduction (passive-secure, or UC secure)

slide-8
SLIDE 8

Complexity w.r.t. MPC

We saw OT is complete for MPC Any other functionality can be reduced to OT Under all notions of reduction (passive-secure, or UC secure) The Cryptographic Complexity question: Can F be reduced to G (for different reductions)?

slide-9
SLIDE 9

Complexity w.r.t. MPC

We saw OT is complete for MPC Any other functionality can be reduced to OT Under all notions of reduction (passive-secure, or UC secure) The Cryptographic Complexity question: Can F be reduced to G (for different reductions)? G complete if everything reduces to G

slide-10
SLIDE 10

Complexity w.r.t. MPC

We saw OT is complete for MPC Any other functionality can be reduced to OT Under all notions of reduction (passive-secure, or UC secure) The Cryptographic Complexity question: Can F be reduced to G (for different reductions)? G complete if everything reduces to G F trivial if F reduces to everything (in particular, to NULL)

slide-11
SLIDE 11

Quiz

slide-12
SLIDE 12

Quiz

What’ s the complexity of the following 3 functions, w.r.t, IT passive secure MPC?

slide-13
SLIDE 13

Quiz

What’ s the complexity of the following 3 functions, w.r.t, IT passive secure MPC? max(x,y)

slide-14
SLIDE 14

Quiz

What’ s the complexity of the following 3 functions, w.r.t, IT passive secure MPC? max(x,y) [x < y]

slide-15
SLIDE 15

Quiz

What’ s the complexity of the following 3 functions, w.r.t, IT passive secure MPC? max(x,y) [x < y] (max(x,y), [x < y] )

slide-16
SLIDE 16

Complexity w.r.t. MPC

Several notions of reductions Passive, Active/Standalone or Active/UC Information-theoretic (IT) or PPT If PPT, also specify any computational assumptions used Will restrict to 2-party functionalities (mostly SFE) In particular, omitting honest majority security

slide-17
SLIDE 17

Is MPC Possible?

Can we securely realize every functionality? No & Yes!

All subsets corruptible Honest
 Majority Computationally Unbounded (IT) No Yes Computationally Bounded (PPT)

  • Univ. Composable

Angel-UC Standalone Passive

No Yes Yes Yes

RECALL

slide-18
SLIDE 18

Is MPC Possible?

Can we securely realize every functionality? No & Yes!

All subsets corruptible Honest
 Majority Computationally Unbounded (IT) No Yes Computationally Bounded (PPT)

  • Univ. Composable

Angel-UC Standalone Passive

No Yes Yes Yes

RECALL

Yes means all are trivial.
 No is more interesting!

slide-19
SLIDE 19

Is MPC Possible?

Can we securely realize every functionality? No & Yes!

All subsets corruptible Honest
 Majority Computationally Unbounded (IT) No Yes Computationally Bounded (PPT)

  • Univ. Composable

Angel-UC Standalone Passive

No Yes Yes Yes

RECALL

Yes means all are trivial.
 No is more interesting!

In fact interesting: What computational hardness assumption makes it switch from No to Yes?

slide-20
SLIDE 20

Is MPC Possible?

Can we securely realize every functionality? No & Yes!

All subsets corruptible Honest
 Majority Computationally Unbounded (IT) No Yes Computationally Bounded (PPT)

  • Univ. Composable

Angel-UC Standalone Passive

No Yes Yes Yes

RECALL

Yes ⇔ sh-OT assumption

Yes means all are trivial.
 No is more interesting!

slide-21
SLIDE 21

Is MPC Possible?

Can we securely realize every functionality? No & Yes!

All subsets corruptible Honest
 Majority Computationally Unbounded (IT) No Yes Computationally Bounded (PPT)

  • Univ. Composable

Angel-UC Standalone Passive

No Yes Yes Yes

RECALL

Yes ⇔ sh-OT assumption

Yes means all are trivial.
 No is more interesting!

Trivial ones are 
 really trivial
 (called Splittable)

slide-22
SLIDE 22

An example

Protocol: Count down from 100 At each even round Alice announces whether her bid equals the current count; at each odd round Bob does the same Stop if a party says yes Dutch flower auction

RECALL

slide-23
SLIDE 23

An example

Protocol: Count down from 100 At each even round Alice announces whether her bid equals the current count; at each odd round Bob does the same Stop if a party says yes Dutch flower auction

RECALL

Perfect Standalone Security
 But doesn’ t compose!

slide-24
SLIDE 24

Attack on 
 Dutch Flower Auction

slide-25
SLIDE 25

Attack on 
 Dutch Flower Auction

Alice and Bob are taking part in two auctions

slide-26
SLIDE 26

Attack on 
 Dutch Flower Auction

Alice and Bob are taking part in two auctions Alice’ s goal: ensure that Bob wins at least one auction and the winning bids in the two auctions are within ±1 of each other

slide-27
SLIDE 27

Attack on 
 Dutch Flower Auction

Alice and Bob are taking part in two auctions Alice’ s goal: ensure that Bob wins at least one auction and the winning bids in the two auctions are within ±1 of each other Easy in the protocol: run the two protocols lockstep. Wait till Bob says yes in one. Done if Bob says yes in the other simultaneously. Else Alice will say yes in the next round.

slide-28
SLIDE 28

Attack on 
 Dutch Flower Auction

Alice and Bob are taking part in two auctions Alice’ s goal: ensure that Bob wins at least one auction and the winning bids in the two auctions are within ±1 of each other Easy in the protocol: run the two protocols lockstep. Wait till Bob says yes in one. Done if Bob says yes in the other simultaneously. Else Alice will say yes in the next round. Why is this an attack?

slide-29
SLIDE 29

Attack on 
 Dutch Flower Auction

Alice and Bob are taking part in two auctions Alice’ s goal: ensure that Bob wins at least one auction and the winning bids in the two auctions are within ±1 of each other Easy in the protocol: run the two protocols lockstep. Wait till Bob says yes in one. Done if Bob says yes in the other simultaneously. Else Alice will say yes in the next round. Why is this an attack? Impossible to ensure this in IDEAL!

slide-30
SLIDE 30

Attack on 
 Dutch Flower Auction

Alice’ s goal: ensure that the outcome in the two auctions are within ±1 of each other, and Bob wins at least one auction Impossible to ensure this in IDEAL!

slide-31
SLIDE 31

Attack on 
 Dutch Flower Auction

Alice’ s goal: ensure that the outcome in the two auctions are within ±1 of each other, and Bob wins at least one auction Impossible to ensure this in IDEAL! Alice could get a result in one session, before running the other. But what should she submit as her input in the first one?

slide-32
SLIDE 32

Attack on 
 Dutch Flower Auction

Alice’ s goal: ensure that the outcome in the two auctions are within ±1 of each other, and Bob wins at least one auction Impossible to ensure this in IDEAL! Alice could get a result in one session, before running the other. But what should she submit as her input in the first one? If a high bid, in trouble if she wins now, but Bob has a very low bid in the other session (which he must win).

slide-33
SLIDE 33

Attack on 
 Dutch Flower Auction

Alice’ s goal: ensure that the outcome in the two auctions are within ±1 of each other, and Bob wins at least one auction Impossible to ensure this in IDEAL! Alice could get a result in one session, before running the other. But what should she submit as her input in the first one? If a high bid, in trouble if she wins now, but Bob has a very low bid in the other session (which he must win). If a low bid (so Bob may win with a low bid), in trouble if Bob has a high bid in the other session.

slide-34
SLIDE 34
  • UC-trivial: “Splittable” [CKL’03,PR’08]
  • Literally trivial ones!



 
 
 
 
 


  • Extends to reactive, randomized functionalities, both PPT and IT

UC Triviality:

Splittability

F F

T

F

slide-35
SLIDE 35

Is MPC Possible?

Can we securely realize every functionality? No & Yes!

All subsets corruptible Honest
 Majority Computationally Unbounded (IT) No Yes Computationally Bounded (PPT)

  • Univ. Composable

Angel-UC Standalone Passive

No Yes Yes Yes

RECALL

Yes ⇔ sh-OT assumption

Yes means all are trivial.
 No is more interesting!

Trivial ones are 
 really trivial
 (called Splittable) 
 Under sh-OT, 
 everything else complete! 
 
 (Zero-One-Law)

slide-36
SLIDE 36

Information-Theoretic Passive security Deterministic SFE: Trivial ⇔ Decomposable

IT Setting: Trivial Functionality

slide-37
SLIDE 37

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable Undecomposable

1 1 1 1 1 2 3 4 4 1 1 2 2 3 4 4 3 1 1 2 4 5 2 4 3 3 1 1 4 2 4 3 3 2 4 2 1 1

slide-38
SLIDE 38

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable Undecomposable

1 1 1 1 1 2 3 4 4 1 1 2 2 3 4 4 3 1 1 2 4 5 2 4 3 3 1 1 4 2 4 3 3 2 4 2 1 1

slide-39
SLIDE 39

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable Undecomposable

1 1 1 1 1 2 3 4 4 1 1 2 2 3 4 4 3 1 1 2 4 5 2 4 3 3 1 1 4 2 4 3 3 2 4 2 1 1

slide-40
SLIDE 40

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable Undecomposable

1 1 1 1 1 2 3 4 4 1 1 2 2 3 4 4 3 1 1 2 4 5 2 4 3 3 1 1 4 2 4 3 3 2 4 2 1 1

slide-41
SLIDE 41

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable Undecomposable

1 1 1 1 1 2 3 4 4 1 1 2 2 3 4 4 3 1 1 2 4 5 2 4 3 3 1 1 4 2 4 3 3 2 4 2 1 1

slide-42
SLIDE 42

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable Undecomposable

1 1 1 1 1 2 3 4 4 1 1 2 2 3 4 4 3 1 1 2 4 5 2 4 3 3 1 1 4 2 4 3 3 2 4 2 1 1

slide-43
SLIDE 43

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable Undecomposable

1 1 1 1 1 2 3 4 4 1 1 2 2 3 4 4 3 1 1 2 4 5 2 4 3 3 1 1 4 2 4 3 3 2 4 2 1 1

slide-44
SLIDE 44

Information-Theoretic Passive security Deterministic SFE: Trivial ⇔ Decomposable

IT Setting: Trivial Functionality

slide-45
SLIDE 45

Information-Theoretic Passive security Deterministic SFE: Trivial ⇔ Decomposable Open for randomized SFE!

IT Setting: Trivial Functionality

slide-46
SLIDE 46

Information-Theoretic Passive security Deterministic SFE: Trivial ⇔ Decomposable Open for randomized SFE! Information-Theoretic Standalone security

IT Setting: Trivial Functionality

slide-47
SLIDE 47

Information-Theoretic Passive security Deterministic SFE: Trivial ⇔ Decomposable Open for randomized SFE! Information-Theoretic Standalone security Deterministic SFE: 
 Trivial ⇔ Uniquely Decomposable and Saturated

IT Setting: Trivial Functionality

slide-48
SLIDE 48

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable

1 1 2 3 4 4 1 1 2 2 3 4 4 3

slide-49
SLIDE 49

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable

1 1 2 3 4 4 1 1 2 2 3 4 4 3

Not Uniquely Decomposable

slide-50
SLIDE 50

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable

1 1 2 3 4 4 1 1 2 2 3 4 4 3

Not Uniquely Decomposable Not Saturated

slide-51
SLIDE 51

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable

1 1 2 3 4 4 1 1 2 2 3 4 4 3

Not Uniquely Decomposable Not Saturated

  • 3

2 1 4

slide-52
SLIDE 52

Decomposable Function

1 3 1 3 2 2 3 1 1 1 1

Decomposable

1 1 2 3 4 4 1 1 2 2 3 4 4 3

Not Uniquely Decomposable Not Saturated

  • 3

2 1 4

This strategy doesn’ t correspond to an input

slide-53
SLIDE 53

Information-Theoretic Passive security Deterministic SFE: Trivial ⇔ Decomposable Open for randomized SFE! Information-Theoretic Standalone security Deterministic SFE: 
 Trivial ⇔ Uniquely Decomposable and Saturated

IT Setting: Trivial Functionality

slide-54
SLIDE 54

Information-Theoretic Passive security Deterministic SFE: Trivial ⇔ Decomposable Open for randomized SFE! Information-Theoretic Standalone security Deterministic SFE: 
 Trivial ⇔ Uniquely Decomposable and Saturated

IT Setting: Trivial Functionality

Information-Theoretic UC security Trivial ⇔ Splittable

slide-55
SLIDE 55

IT Setting: Completeness

slide-56
SLIDE 56

Information-Theoretic Passive security (Randomized) SFE: Complete ⇔ Not Simple

IT Setting: Completeness

slide-57
SLIDE 57

Information-Theoretic Passive security (Randomized) SFE: Complete ⇔ Not Simple What is Simple?

IT Setting: Completeness

slide-58
SLIDE 58

Simple vs. Non-Simple

1 3 1 3 2 2 3 1 1 1

(0,1) (2,2) (0,3) (2,3) (1,1) (1,2) (3,3) (0,0) (1,0) (1,1) (0,0) (1,0) (1,1)

slide-59
SLIDE 59

Simple vs. Non-Simple

1 3 1 3 2 2 3 1 1 1

(0,1) (2,2) (0,3) (2,3) (1,1) (1,2) (3,3) (0,0) (1,0) (1,1) (0,0) (1,0) (1,1)

Simple:
 Each connected component is a biclique

slide-60
SLIDE 60

Information-Theoretic Passive security (Randomized) SFE: Complete ⇔ Not Simple What is Simple? Deterministic SFE: In the characteristic bipartite graph, each connected component is a biclique More generally, using a weighted characteristic graph, with w(u,v) = Pr[outputs | inputs] Simple: w(u,v) = wA(u) ⨉ wB(v)

“Isomorphic” to the “common information”

IT Setting: Completeness

slide-61
SLIDE 61

Information-Theoretic Passive security (Randomized) SFE: Complete ⇔ Not Simple

IT Setting: Completeness

slide-62
SLIDE 62

Information-Theoretic Passive security (Randomized) SFE: Complete ⇔ Not Simple Information-Theoretic Standalone & UC security

IT Setting: Completeness

slide-63
SLIDE 63

Information-Theoretic Passive security (Randomized) SFE: Complete ⇔ Not Simple Information-Theoretic Standalone & UC security (Randomized) SFE: Complete ⇔ Core is not Simple

IT Setting: Completeness

slide-64
SLIDE 64

Information-Theoretic Passive security (Randomized) SFE: Complete ⇔ Not Simple Information-Theoretic Standalone & UC security (Randomized) SFE: Complete ⇔ Core is not Simple What is the core of an SFE?

IT Setting: Completeness

slide-65
SLIDE 65

Information-Theoretic Passive security (Randomized) SFE: Complete ⇔ Not Simple Information-Theoretic Standalone & UC security (Randomized) SFE: Complete ⇔ Core is not Simple What is the core of an SFE? SFE obtained by removing “redundancies” in the input and output space

IT Setting: Completeness

slide-66
SLIDE 66

Quiz

What’ s the complexity of the following 
 3 functions, w.r.t, IT passive secure MPC? max(x,y) [x < y] (max(x,y), [x < y] )

slide-67
SLIDE 67

Quiz

What’ s the complexity of the following 
 3 functions, w.r.t, IT passive secure MPC? max(x,y) [x < y] (max(x,y), [x < y] )

1 2 3 1 2 3 1 1 1 2 3 2 2 2 2 3 3 3 3 3 3 1 2 3 1 2 3 1 1’ 1 2 3 2 2’ 2’ 2 3 3 3’ 3’ 3’ 3 1 2 3 1 1 2 1 1 3 1 1 1

slide-68
SLIDE 68

Quiz

What’ s the complexity of the following 
 3 functions, w.r.t, IT passive secure MPC? max(x,y) [x < y] (max(x,y), [x < y] )

1 2 3 1 2 3 1 1 1 2 3 2 2 2 2 3 3 3 3 3 3 1 2 3 1 2 3 1 1’ 1 2 3 2 2’ 2’ 2 3 3 3’ 3’ 3’ 3 1 2 3 1 1 2 1 1 3 1 1 1

Complete

slide-69
SLIDE 69

Quiz

What’ s the complexity of the following 
 3 functions, w.r.t, IT passive secure MPC? max(x,y) [x < y] (max(x,y), [x < y] )

1 2 3 1 2 3 1 1 1 2 3 2 2 2 2 3 3 3 3 3 3 1 2 3 1 2 3 1 1’ 1 2 3 2 2’ 2’ 2 3 3 3’ 3’ 3’ 3 1 2 3 1 1 2 1 1 3 1 1 1

Complete Complete

slide-70
SLIDE 70

Quiz

What’ s the complexity of the following 
 3 functions, w.r.t, IT passive secure MPC? max(x,y) [x < y] (max(x,y), [x < y] )

1 2 3 1 2 3 1 1 1 2 3 2 2 2 2 3 3 3 3 3 3 1 2 3 1 2 3 1 1’ 1 2 3 2 2’ 2’ 2 3 3 3’ 3’ 3’ 3 1 2 3 1 1 2 1 1 3 1 1 1

Complete Complete Trivial (Passive and Standalone/Active)

slide-71
SLIDE 71

Quiz

What’ s the complexity of the following 
 3 functions, w.r.t, IT passive secure MPC? max(x,y) [x < y] (max(x,y), [x < y] )

1 2 3 1 2 3 1 1 1 2 3 2 2 2 2 3 3 3 3 3 3 1 2 3 1 2 3 1 1’ 1 2 3 2 2’ 2’ 2 3 3 3’ 3’ 3’ 3 1 2 3 1 1 2 1 1 3 1 1 1

Complete Complete Trivial (Passive and Standalone/Active)

slide-72
SLIDE 72

Between Trivial & Complete?

slide-73
SLIDE 73

Between Trivial & Complete?

In the PPT setting, assuming sh-OT, there can be only

  • ne or two classes (two for UC security)
slide-74
SLIDE 74

Between Trivial & Complete?

In the PPT setting, assuming sh-OT, there can be only

  • ne or two classes (two for UC security)

In the IT setting, infinitely many levels!

slide-75
SLIDE 75

Between Trivial & Complete?

In the PPT setting, assuming sh-OT, there can be only

  • ne or two classes (two for UC security)

In the IT setting, infinitely many levels! Question: Do these levels yield infinitely many “distinct” complexity assumptions corresponding to which levels collapse in the PPT setting?

slide-76
SLIDE 76

Between Trivial & Complete?

In the PPT setting, assuming sh-OT, there can be only

  • ne or two classes (two for UC security)

In the IT setting, infinitely many levels! Question: Do these levels yield infinitely many “distinct” complexity assumptions corresponding to which levels collapse in the PPT setting? Maybe not for UC security reductions

slide-77
SLIDE 77

Between Trivial & Complete?

In the PPT setting, assuming sh-OT, there can be only

  • ne or two classes (two for UC security)

In the IT setting, infinitely many levels! Question: Do these levels yield infinitely many “distinct” complexity assumptions corresponding to which levels collapse in the PPT setting? Maybe not for UC security reductions Only two such assumptions known so far:
 shOT & OWF

slide-78
SLIDE 78

Between Trivial & Complete?

In the PPT setting, assuming sh-OT, there can be only

  • ne or two classes (two for UC security)

In the IT setting, infinitely many levels! Question: Do these levels yield infinitely many “distinct” complexity assumptions corresponding to which levels collapse in the PPT setting? Maybe not for UC security reductions Only two such assumptions known so far:
 shOT & OWF Conjecture: Yes, for passive security reductions

slide-79
SLIDE 79

Between Trivial & Complete?

In the PPT setting, assuming sh-OT, there can be only

  • ne or two classes (two for UC security)

In the IT setting, infinitely many levels! Question: Do these levels yield infinitely many “distinct” complexity assumptions corresponding to which levels collapse in the PPT setting? Maybe not for UC security reductions Only two such assumptions known so far:
 shOT & OWF Conjecture: Yes, for passive security reductions

Few Worlds Conjecture

slide-80
SLIDE 80

Between Trivial & Complete?

In the PPT setting, assuming sh-OT, there can be only

  • ne or two classes (two for UC security)

In the IT setting, infinitely many levels! Question: Do these levels yield infinitely many “distinct” complexity assumptions corresponding to which levels collapse in the PPT setting? Maybe not for UC security reductions Only two such assumptions known so far:
 shOT & OWF Conjecture: Yes, for passive security reductions

Few Worlds Conjecture Many Worlds Conjecture

slide-81
SLIDE 81

Summary

2-Party: PPT, assuming sh-OT: 3 complexity classes.
 UC-trivial, UC-complete, All (= Passive/Standalone trivial/complete) IT: Infinitely many complexity classes. Several open problems. Computational assumptions related to collapse of classes in the PPT setting (so far OWF , shOT) m-Party (m>2): Non-Honest-Majority: largely open

slide-82
SLIDE 82

Quantitative Complexity

Qualitative question: Does F reduce to G? Quantitative question: How many instances of G are needed to implement one instance of F (amortized)? G-complexity of F Upto constants, G-complexity remains the same for all complete G “Cryptographic Complexity” of F Cryptographic Complexity is a lower bound on Circuit Complexity

slide-83
SLIDE 83

Conclusion

A detailed picture of deterministic 2-party SFE, under various MPC reductions Completeness characterised for randomised SFE too But complexity questions largely open for randomised SFE, m-party SFE for m > 2 Computational hardness related to MPC reductions We know that OWF is one of the “F reduces to G” assumptions, and sh-OT is the “maximal” assumption Few Worlds Conjecture & Many Worlds Conjecture Quantitative Complexity Crypto complexity is a lower bound on circuit complexity