privacy preservation through secure multi party
play

Privacy Preservation through Secure Multi-party Computation: - PowerPoint PPT Presentation

Privacy Preservation through Secure Multi-party Computation: Towards Implementation Paolo Palmieri , Olivier Pereira UCL Crypto Group Universit e Catholique de Louvain (Belgium) Provable Privacy Workshop July 2012 UCL Crypto Group


  1. Privacy Preservation through Secure Multi-party Computation: Towards Implementation Paolo Palmieri , Olivier Pereira UCL Crypto Group Universit´ e Catholique de Louvain (Belgium) Provable Privacy Workshop – July 2012 UCL Crypto Group Privacy with SMC: Implementation? - July 2012 1 Microelectronics Laboratory

  2. Outline of the Talk 1. Secure Multi-party Computation 2. New channel models 3. Towards implementation UCL Crypto Group Privacy with SMC: Implementation? - July 2012 2 Microelectronics Laboratory

  3. Outline of the Talk 1. Secure Multi-party Computation 2. New channel models 3. Towards implementation UCL Crypto Group Privacy with SMC: Implementation? - July 2012 2 Microelectronics Laboratory

  4. Secure 2-party computation Problem suggested by Yao in 1982 [Yao82]. Cryptography for mutually distrusting parties. UCL Crypto Group Privacy with SMC: Implementation? - July 2012 3 Microelectronics Laboratory

  5. Secure 2-party computation Problem suggested by Yao in 1982 [Yao82]. Cryptography for mutually distrusting parties. The parties. . . ◮ . . . want to jointly compute some value based on individually held secret bits of information; ◮ . . . do not wish to reveal their secrets to one another in the process. UCL Crypto Group Privacy with SMC: Implementation? - July 2012 3 Microelectronics Laboratory

  6. Secure 2-party computation Problem suggested by Yao in 1982 [Yao82]. Cryptography for mutually distrusting parties. The parties. . . ◮ . . . want to jointly compute some value based on individually held secret bits of information; ◮ . . . do not wish to reveal their secrets to one another in the process. Our focus is on security against computationally unbounded adversaries, in the information theoretic model. UCL Crypto Group Privacy with SMC: Implementation? - July 2012 3 Microelectronics Laboratory

  7. Oblivious Transfer Oblivious Transfer [Rab81] is a fundamental primitive for multi-party computation. ◮ many fashions of OT, all proved to be equivalent [Cr´ e87]. UCL Crypto Group Privacy with SMC: Implementation? - July 2012 4 Microelectronics Laboratory

  8. Oblivious Transfer Oblivious Transfer [Rab81] is a fundamental primitive for multi-party computation. ◮ many fashions of OT, all proved to be equivalent [Cr´ e87]. 1-out-of-2 OT : the sender (Sam) has two bits b 0 , b 1 and wants to transmit only one to the receiver (Rachel), while she wants to select the desired bit s without Sam knowing her choice. s b 0 , b 1 S OT R b s UCL Crypto Group Privacy with SMC: Implementation? - July 2012 4 Microelectronics Laboratory

  9. The Importance of Noise Oblivious Transfer cannot be achieved on a clear channel in the information theoretic model. Even a quantum channel proved to be useless for the purpose [May97]. Solution: noisy channels . UCL Crypto Group Privacy with SMC: Implementation? - July 2012 5 Microelectronics Laboratory

  10. The Importance of Noise Oblivious Transfer cannot be achieved on a clear channel in the information theoretic model. Even a quantum channel proved to be useless for the purpose [May97]. Solution: noisy channels . Open questions: ◮ most efficient/realistic channel models? ◮ what properties should noise have? UCL Crypto Group Privacy with SMC: Implementation? - July 2012 5 Microelectronics Laboratory

  11. Outline of the Talk 1. Secure Multi-party Computation 2. New channel models 3. Towards implementation UCL Crypto Group Privacy with SMC: Implementation? - July 2012 6 Microelectronics Laboratory

  12. Traditional constructions OT can be built on almost any noisy channel [CMW04]. However most constructions are based on the Binary Symmetric Channel (BSC). 1 − p 0 0 p p 1 1 1 − p UCL Crypto Group Privacy with SMC: Implementation? - July 2012 7 Microelectronics Laboratory

  13. Traditional constructions OT can be built on almost any noisy channel [CMW04]. However most constructions are based on the Binary Symmetric Channel (BSC). 1 − p 0 0 p p 1 1 1 − p ◮ First protocol proposed in 1988 [CK88]. ◮ Unfair Noisy Channel (UNC) [DKS99, DFMS04]. ◮ Weak Binary Symmetric Channel (WBSC) [Wul09]. UCL Crypto Group Privacy with SMC: Implementation? - July 2012 7 Microelectronics Laboratory

  14. Delays & Packet Loss In [PP10] we proposed to build OT over channels that model real network characteristics: ◮ packet delays (wireless) and reorderings (wired); ◮ lost packets. UCL Crypto Group Privacy with SMC: Implementation? - July 2012 8 Microelectronics Laboratory

  15. Delays & Packet Loss In [PP10] we proposed to build OT over channels that model real network characteristics: ◮ packet delays (wireless) and reorderings (wired); ◮ lost packets. ◮ Binary Discrete-time t Channel u Delaying Channel t 0 (BDDC); c 1 , c 2 u 0 c 2 ◮ Delaying-Erasing Channel t 1 Pr ( p ) c 3 , c 4 (DEC). u 1 c 1 , c 3 , c 4 UCL Crypto Group Privacy with SMC: Implementation? - July 2012 8 Microelectronics Laboratory

  16. Outline of the Talk 1. Secure Multi-party Computation 2. New channel models 3. Towards implementation UCL Crypto Group Privacy with SMC: Implementation? - July 2012 9 Microelectronics Laboratory

  17. Protocol - preparation Protocol inspired by the one proposed in [CK88]. Preliminary work Sam creates two sets of bit strings C and C ′ . | C | = | C ′ | = n UCL Crypto Group Privacy with SMC: Implementation? - July 2012 10 Microelectronics Laboratory

  18. Protocol - preparation Protocol inspired by the one proposed in [CK88]. Preliminary work Sam creates two sets of bit strings C and C ′ . | C | = | C ′ | = n Each string in any of the two sets is composed of: c i ∈ C = ��� . . . ����� . . . �� UCL Crypto Group Privacy with SMC: Implementation? - July 2012 10 Microelectronics Laboratory

  19. Protocol - preparation Protocol inspired by the one proposed in [CK88]. Preliminary work Sam creates two sets of bit strings C and C ′ . | C | = | C ′ | = n Each string in any of the two sets is composed of: ◮ the string identifier e : e i in c i ∈ C is unique in { C ∪ C ′ } . e i � �� � c i ∈ C = ��� . . . �� ��� . . . �� UCL Crypto Group Privacy with SMC: Implementation? - July 2012 10 Microelectronics Laboratory

  20. Protocol - preparation Protocol inspired by the one proposed in [CK88]. Preliminary work Sam creates two sets of bit strings C and C ′ . | C | = | C ′ | = n Each string in any of the two sets is composed of: ◮ the string identifier e : e i in c i ∈ C is unique in { C ∪ C ′ } . ◮ the sequence number i : i in c i ∈ C is unique in C and shared by c ′ i ∈ C ′ ; e i i � �� � � �� � c i ∈ C = ��� . . . �� ��� . . . �� UCL Crypto Group Privacy with SMC: Implementation? - July 2012 10 Microelectronics Laboratory

  21. Protocol - communication 1 1. At time t 0 Sam sends to Rachel C over a BDDC; C S R BDDC UCL Crypto Group Privacy with SMC: Implementation? - July 2012 11 Microelectronics Laboratory

  22. Protocol - communication 1 1. At time t 0 Sam sends to Rachel C over a BDDC; 2. At t 1 Sam sends the set C ′ ; C ′ S R BDDC UCL Crypto Group Privacy with SMC: Implementation? - July 2012 11 Microelectronics Laboratory

  23. Protocol - communication 1 1. At time t 0 Sam sends to Rachel C over a BDDC; 2. At t 1 Sam sends the set C ′ ; 3. At u 0 Rachel receives the strings of C not delayed; ??? S R BDDC UCL Crypto Group Privacy with SMC: Implementation? - July 2012 11 Microelectronics Laboratory

  24. Protocol - communication 1 1. At time t 0 Sam sends to Rachel C over a BDDC; 2. At t 1 Sam sends the set C ′ ; 3. At u 0 Rachel receives the strings of C not delayed; 4. At u 1 Rachel receives the strings of C delayed once and those of C ′ not delayed. Then she keeps listening; ??? S R BDDC UCL Crypto Group Privacy with SMC: Implementation? - July 2012 11 Microelectronics Laboratory

  25. Protocol - communication 1 1. At time t 0 Sam sends to Rachel C over a BDDC; 2. At t 1 Sam sends the set C ′ ; 3. At u 0 Rachel receives the strings of C not delayed; 4. At u 1 Rachel receives the strings of C delayed once and those of C ′ not delayed. Then she keeps listening; 5. Rachel divides the sequence numbers received into two sets I s and I 1 − s . For all those in I s , the corresponding c has not been delayed; I s , I 1 − s S R clear channel UCL Crypto Group Privacy with SMC: Implementation? - July 2012 11 Microelectronics Laboratory

  26. Protocol - communication 2 6. Sam receives I s and I 1 − s and chooses a universal hash function f . For each set I j he computes g j : � � e j 1 � . . . � e j with e j 1 , . . . , e j g j = 2 ∈ E j . n n 2 where e i ∈ E j ⇔ i ∈ I j . f , ( f ( g 0 ) ⊕ b 0 ) , ( f ( g 1 ) ⊕ b 1 ) S R clear channel UCL Crypto Group Privacy with SMC: Implementation? - July 2012 12 Microelectronics Laboratory

  27. Protocol - communication 2 6. Sam receives I s and I 1 − s and chooses a universal hash function f . For each set I j he computes g j : � � e j 1 � . . . � e j with e j 1 , . . . , e j g j = 2 ∈ E j . n n 2 where e i ∈ E j ⇔ i ∈ I j . 7. Rachel computes her guess for b s : b s = f ( g s ) ⊕ ( f ( g s ) ⊕ b s ) S The End! R UCL Crypto Group Privacy with SMC: Implementation? - July 2012 12 Microelectronics Laboratory

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend