Privacy-Preserving Distributed Information Sharing
Lea Kissner leak@cs.cmu.edu Advisor: Dawn Song dawnsong@cmu.edu
Privacy-Preserving Distributed Information Sharing Lea Kissner - - PowerPoint PPT Presentation
Privacy-Preserving Distributed Information Sharing Lea Kissner leak@cs.cmu.edu Advisor: Dawn Song dawnsong@cmu.edu Why Share? Many applications require mutually distrustful parties to share information Many examples in two major
Lea Kissner leak@cs.cmu.edu Advisor: Dawn Song dawnsong@cmu.edu
2
distrustful parties to share information
cancer patients on welfare, distributed network monitoring
list, catching people who fill prescriptions twice
3
surrounding the use of many kinds of information
compromise data
sharing many types of information
4
which passengers cannot fly
cannot disclose their lists
Flight List Do-Not-Fly List Intersection Revealed
5
recipients who have cancer
who have cancer, must compute private union and intersection
Patient Lists Union of Patient Lists Number of Cancer Patients on Welfare are Revealed Welfare Roll
6
behaviors
probably a false positive, and should be filtered
compute the element reduction and union operations
in S, a appears t-1 times in the reduction of S
Anomalous Behaviors Per Node Behaviors That Appear t Times Are Revealed Union of All Anomalous Behaviors
7
preserving information sharing, but:
(TTP)
8
privacy-preserving distributed information sharing such that:
9
10
calculating multiset operations:
b>0 times in S, appears b-1 times in Rd(S))
11
to a wide variety of practical problems:
12
with coefficients from a ring R, compute
the roots of f of a certain form
(x − a)
Elements not of the special form Elements that represent elements of P
y || h(y)
13
information but the result
preservation) for the techniques we present as follows:
third party (TTP) can be transformed in probabilistic polynomial time to be identically distributed to a TTP using
TTP OUR TTP
TRANSLATION
SAME DISTRIBUTION
14
each coefficient chosen uniformly at random
the polynomial representation calculated by
(length depends on previous operations, size of
(x − a)
15
polynomials f, g. Let r, s be uniformly distributed polynomials.
and masks other information about S, T
16
f(d)(a)=0 ⇔ (x-a)d+1 | f
polynomial f. Let r, s be uniformly distributed polynomials, and F a random public polynomial of degree d.
f(d)*F*r + f*s
17
threshold additively homomorphic cryptosystem
(examples use Paillier cryptosystem)
h = f + g hi = fi + gi E(hi) = E(fi) ∗ E(gi)
18
h = f hi = (i + 1)fi+1 E(hi) = E(fi)i+1
h = f ∗ g hi =
k
fj ∗ gi−j E(hi) =
k
E(fj)gi−j
19
their private input set and broadcasts E(fi)
distributed polynomial ri,j, and broadcasts
then a appears b times in the result
E(fi ∗ ri,j)
E
n
fi ∗
n
ri,j = E(p) (x − a)b | p
20
be constructed for any function described by (let s be a privately held set):
E(g) are encrypted polynomial representations of A, B
compute E(f*g1 + ... + f*gn) = E(f*g)
21
22
items that appear often in players’ private input sets
set operation techniques
many applications
23
preserving protocols
24
collaborative filtering
represent his private input set
hi(a) as `hit’
filter 1 filter 2 filter 3 h1(a) = 2 h2(a) = 4 h3(a) = 1
25
marked as `hot’
filter 1 h1(·) filter 2 h2(·) filter 3 h3(·) S1 = {Alice,Bob} S3 = {Alice,Dave} S2 = {Alice,Charlie} 3 1 1 1 1 3 3 1 1 1 Exact Global Filters 4 1 2 1 1 3 3 1 1
26
determine whether at least t players hit it
approximate counting scheme
uniformly distributed elements
distributed element per bucket
modified group signature scheme
27
α∈(0,1], then we estimate that |S|=k/α
players try to collect these k items
28
29
the following areas, relating to privacy- preserving distributed information sharing:
protocols for many situations
compute on sets or multisets
structures, such as graphs, junction trees, etc.
30
adversaries are inefficient
can make many protocols more efficient
in our set operation protocols)
expensive tools for more efficient ones
31
indistinguishable can be substituted in almost all protocols secure against malicious parties, even when these substituted tools are composed
Normal Commitment
Commit Decommit
Equivocal Commitment
Commit Decommit
Cheating
32
like’ the ideal functionality
intuitively, they all show security
Efficient Functionality A Ideal Functionality I Useful Functionality B
Simulatably Secure Left-or-right Indistinguishable
33
between workalikes A and B (commitments, ciphertexts)
for tool B if
send a non-identity function of a handle
34
communication between parties using the
proof
Real model (Substituted protocol) Real model (Original protocol) Ideal TTP
Simulator Translation Tool Translation
35
36
37
substitution
substitution
problems
38
secure protocols for privacy-preserving distributed information sharing
practical and secure use of many important applications.