Secure Multi-party Computation What it is, and why youd care Manoj - - PowerPoint PPT Presentation

secure multi party computation
SMART_READER_LITE
LIVE PREVIEW

Secure Multi-party Computation What it is, and why youd care Manoj - - PowerPoint PPT Presentation

Secure Multi-party Computation What it is, and why youd care Manoj Prabhakaran University of Illinois, Urbana-Champaign SMC SMC SMC conceived more than 30 years back SMC SMC conceived more than 30 years back A very general concept that


slide-1
SLIDE 1

Secure Multi-party Computation

What it is, and why you’d care Manoj Prabhakaran University of Illinois, Urbana-Champaign

slide-2
SLIDE 2

SMC

slide-3
SLIDE 3

SMC

SMC conceived more than 30 years back

slide-4
SLIDE 4

SMC

SMC conceived more than 30 years back A very general concept that subsumes the bulk of theoretical cryptography

slide-5
SLIDE 5

SMC

SMC conceived more than 30 years back A very general concept that subsumes the bulk of theoretical cryptography Largely a well-kept secret

slide-6
SLIDE 6

SMC: the question

slide-7
SLIDE 7

SMC: the question

Collaboration without trust?

slide-8
SLIDE 8

SMC: the question

Collaboration without trust? Collaboration: compute on collective data belonging to different parties

slide-9
SLIDE 9

SMC: the question

Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you

slide-10
SLIDE 10

SMC: the question

Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you e.g. query with me, encrypted database with you, key with someone else

slide-11
SLIDE 11

SMC: the question

Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you e.g. query with me, encrypted database with you, key with someone else Goal: Nothing should be revealed “beyond the result”

slide-12
SLIDE 12

SMC: the question

Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you e.g. query with me, encrypted database with you, key with someone else Goal: Nothing should be revealed “beyond the result” “Ideally”: Use a trusted third party

slide-13
SLIDE 13

SMC: the question

Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you e.g. query with me, encrypted database with you, key with someone else Goal: Nothing should be revealed “beyond the result” “Ideally”: Use a trusted third party “Really”: Can’t agree on a trusted party. So...

slide-14
SLIDE 14

SMC: the answer

slide-15
SLIDE 15

SMC: the answer

SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party

slide-16
SLIDE 16

SMC: the answer

SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings

slide-17
SLIDE 17

SMC: the answer

SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ...

slide-18
SLIDE 18

SMC: the answer

SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ... Simpler protocols if some trust already present

slide-19
SLIDE 19

SMC: the answer

SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ... Simpler protocols if some trust already present “Honest-but-curious”

slide-20
SLIDE 20

SMC: the answer

SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ... Simpler protocols if some trust already present “Honest-but-curious” “Honest-majority”

slide-21
SLIDE 21

SMC: the answer

SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ... Simpler protocols if some trust already present “Honest-but-curious” “Honest-majority” Simple (offline) trusted sources

slide-22
SLIDE 22

SMC in GENI?

slide-23
SLIDE 23

SMC in GENI?

Where privacy is needed

slide-24
SLIDE 24

SMC in GENI?

Where privacy is needed e.g. Measurement archives held by a virtual trusted party

slide-25
SLIDE 25

SMC in GENI?

Where privacy is needed e.g. Measurement archives held by a virtual trusted party Secure distributed storage and computation (secure unless all servers corrupt)

slide-26
SLIDE 26

SMC in GENI?

Where privacy is needed e.g. Measurement archives held by a virtual trusted party Secure distributed storage and computation (secure unless all servers corrupt) May use “honest majority” in a federation

slide-27
SLIDE 27

SMC in GENI?

Where privacy is needed e.g. Measurement archives held by a virtual trusted party Secure distributed storage and computation (secure unless all servers corrupt) May use “honest majority” in a federation Provide SMC as an “experiment support service”?

slide-28
SLIDE 28

SMC in GENI?

Where privacy is needed e.g. Measurement archives held by a virtual trusted party Secure distributed storage and computation (secure unless all servers corrupt) May use “honest majority” in a federation Provide SMC as an “experiment support service”? SMC offers a whole range of novel applications