seminar 1 introduction
play

Seminar 1: Introduction Helger Lipmaa Helsinki University of - PowerPoint PPT Presentation

T-79.514 Special Course on Cryptology Seminar 1: Introduction Helger Lipmaa Helsinki University of Technology http://www.tcs.hut.fi/helger T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 1 Overview


  1. T-79.514 Special Course on Cryptology Seminar 1: Introduction Helger Lipmaa Helsinki University of Technology http://www.tcs.hut.fi/˜helger T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 1

  2. Overview of Seminar • Introduction to the area • Practicalities T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 2

  3. Introduction to the Area: Buzzwords Thanks to www.googlism.com! • Datamining is an automated process for discovering information in large data sets to be used in decision, datamining is alive and well on the internet, datamining is all about counting, datamining is per- fectly legal, datamining is using a database to gain more information about your business • Cryptography is related with the communication or computation involv- ing two or more parties who may not trust one another, cryptography is the most powerful single tool that users can use to secure the in- ternet, cryptography is outlawed, cryptography is the art of hiding the meaning of information T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 3

  4. Introduction to the Area: Huh? (by a cryptographer) • Datamining : build models of natural data from available (huge) datasets, without having to store them or having access to all them. Includes ability to predict, classify, cluster, . . . • In many applications, data is owned by a participant (a person or a company, Alice) who might be not willing to reveal it to the evil data- miner, Bob • If Alice suspects that Bob is misusing her information, she will hide information or lie • Result: Bob cannot obtain truthful models T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 4

  5. Solutions (by a cryptographer, mimicking a data-miner) • Assume Bob is honest! — Really?! • Assume there is a trusted third party! — Really?! • Give up, and go to a pub — Why not, but could we. . . introduce cryptography? T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 5

  6. Cryptography: In Its Modern Meaning • Main result for us: all efficiently computable functions can also com- puted securely • Assume there are n participants, and the i th participant has input x i . Assume f is a function f ( x 1 , . . . , x n ) = ( y 1 , . . . , y n ) . • There is a way ( multi-party computation ) to compute f so that at the end of the protocol, the i th participant will get the know value of y i and nothing else, except what she could compute from ( x i , y i ) herself. T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 6

  7. Cryptography: Drawbacks • MPC requires that a majority (often 2 / 3 of the participants) are honest • If there are only two participants, one can guarantee privacy but not fairness: that is, one of the participants may disconnect after obtaining his private output • The general solutions are not very efficient T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 7

  8. Solutions so Far • Avoid cryptography at any cost — lightweight solutions that depend on statistical truths • Use toy cryptography — “our scheme is secure against an underpaid cryptographer” • Devise specific secure cryptographic schemes for concrete problems. For some problems, the protocols are efficient. T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 8

  9. Practicalities: Goals • Goal (minimum): to study existing solutions • Goal (medium): to break weak solutions, to improve upon them • Goal (maximum): conquer the world (start a research program on the PPDM) T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 9

  10. Practicalities: Form • Seminars, every week one or two presentations. (+ written survey) • Every presentation is reviewed by another student. All goes to the Internet (for the maximum impact) • Ideal: every survey done by two students, one data-miner and one cryptographer • If not enough students, we will have one student doing every survey, but the reviewer will represent another community T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 10

  11. Practicalities: Form • One survey + presentation + review is ≈ 1 . 5 credits • Possible to do more than one! • Surveys must be returned a few days before the presentation, so that the reviewer can read and comment on it before the presentation T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 11

  12. Practicalities: Next Lecture • Ella Bingham: data-mining for dummies • Helger Lipmaa: cryptography for smarties T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 12

  13. Questions? ? T-79.514 Special Course in Cryptology, 10.09.2003 Seminar 1: Introduction, Helger Lipmaa 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend