secure multi party computation
play

Secure Multi-party Computation What it is, and why youd care Manoj - PowerPoint PPT Presentation

Secure Multi-party Computation What it is, and why youd care Manoj Prabhakaran University of Illinois, Urbana-Champaign SMC SMC SMC conceived more than 30 years back SMC SMC conceived more than 30 years back A very general concept that


  1. Secure Multi-party Computation What it is, and why you’d care Manoj Prabhakaran University of Illinois, Urbana-Champaign

  2. SMC

  3. SMC SMC conceived more than 30 years back

  4. SMC SMC conceived more than 30 years back A very general concept that subsumes the bulk of theoretical cryptography

  5. SMC SMC conceived more than 30 years back A very general concept that subsumes the bulk of theoretical cryptography Largely a well-kept secret

  6. SMC: the question

  7. SMC: the question Collaboration without trust?

  8. SMC: the question Collaboration without trust? Collaboration: compute on collective data belonging to different parties

  9. SMC: the question Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you

  10. SMC: the question Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you e.g. query with me, encrypted database with you, key with someone else

  11. SMC: the question Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you e.g. query with me, encrypted database with you, key with someone else Goal: Nothing should be revealed “beyond the result”

  12. SMC: the question Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you e.g. query with me, encrypted database with you, key with someone else Goal: Nothing should be revealed “beyond the result” “Ideally”: Use a trusted third party

  13. SMC: the question Collaboration without trust? Collaboration: compute on collective data belonging to different parties e.g. query with me, database with you e.g. query with me, encrypted database with you, key with someone else Goal: Nothing should be revealed “beyond the result” “Ideally”: Use a trusted third party “Really”: Can’t agree on a trusted party. So...

  14. SMC: the answer

  15. SMC: the answer SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party

  16. SMC: the answer SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings

  17. SMC: the answer SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ...

  18. SMC: the answer SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ... Simpler protocols if some trust already present

  19. SMC: the answer SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ... Simpler protocols if some trust already present “Honest-but-curious”

  20. SMC: the answer SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ... Simpler protocols if some trust already present “Honest-but-curious” “Honest-majority”

  21. SMC: the answer SMC protocol: among mutually distrusting parties, to emulate the presence of a globally trusted party Numerous protocols in literature for various functionalities, in various settings Tools: Verifiable secret-sharing, homomorphic encryptions, commitments, ZK proofs, oblivious transfer, ... Simpler protocols if some trust already present “Honest-but-curious” “Honest-majority” Simple (offline) trusted sources

  22. SMC in GENI?

  23. SMC in GENI? Where privacy is needed

  24. SMC in GENI? Where privacy is needed e.g. Measurement archives held by a virtual trusted party

  25. SMC in GENI? Where privacy is needed e.g. Measurement archives held by a virtual trusted party Secure distributed storage and computation (secure unless all servers corrupt)

  26. SMC in GENI? Where privacy is needed e.g. Measurement archives held by a virtual trusted party Secure distributed storage and computation (secure unless all servers corrupt) May use “honest majority” in a federation

  27. SMC in GENI? Where privacy is needed e.g. Measurement archives held by a virtual trusted party Secure distributed storage and computation (secure unless all servers corrupt) May use “honest majority” in a federation Provide SMC as an “experiment support service”?

  28. SMC in GENI? Where privacy is needed e.g. Measurement archives held by a virtual trusted party Secure distributed storage and computation (secure unless all servers corrupt) May use “honest majority” in a federation Provide SMC as an “experiment support service”? SMC offers a whole range of novel applications

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend