Topology-Hiding Computation for Large Diameter Graphs Adi Akavia - - PowerPoint PPT Presentation

topology hiding computation for large diameter graphs
SMART_READER_LITE
LIVE PREVIEW

Topology-Hiding Computation for Large Diameter Graphs Adi Akavia - - PowerPoint PPT Presentation

Topology-Hiding Computation for Large Diameter Graphs Adi Akavia Tal Moran The Academic College IDC Herzliya of Tel-Aviv Jaffa MPC [Yao 86 , GMW 87]: multiple parties can jointly compute a function of their private inputs, while


slide-1
SLIDE 1

Topology-Hiding Computation for Large Diameter Graphs

Tal Moran

IDC Herzliya

Adi Akavia

The Academic College

  • f Tel-Aviv Jaffa
slide-2
SLIDE 2

MPC [Yao’86, GMW’87]: multiple parties can jointly compute a function of their private inputs, while revealing nothing beyond the output

slide-3
SLIDE 3

MPC [Yao’86, GMW’87]: multiple parties can jointly compute a function of their private inputs, while revealing nothing beyond the output Many applications

slide-4
SLIDE 4

MPC [Yao’86, GMW’87]: multiple parties can jointly compute a function of their private inputs, while revealing nothing beyond the output Many applications

Today: protect also meta-data!

slide-5
SLIDE 5

Motivation: Private social network

Today: Facebook = “trusted third party”.

  • Holds:

personal data & “social graph”

  • Computes:

functions on data & graph

slide-6
SLIDE 6

Motivation: Private social network

Today: Facebook = “trusted third party”.

  • Holds:

personal data & “social graph”

  • Computes:

functions on data & graph

Goal: Privacy preserving social network

No trusted third party!

Privacy for data & graph

slide-7
SLIDE 7

MPC does NOT Suffice

slide-8
SLIDE 8

MPC does NOT Suffice

  • MPC:

Communication topology is public

slide-9
SLIDE 9

MPC does NOT Suffice

  • MPC:

Communication topology is public

– Typically: Complete graph – Also: General topologies (publicly known)

[ …. Halevi-Ishai-Jain-Kushilevitz-Rabin’2016]

slide-10
SLIDE 10

MPC does NOT Suffice

  • MPC:

Communication topology is public

– Typically: Complete graph – Also: General topologies (publicly known)

[ …. Halevi-Ishai-Jain-Kushilevitz-Rabin’2016]

  • Social network:

Communication topology ≈ social graph

slide-11
SLIDE 11

MPC does NOT Suffice

  • MPC:

Communication topology is public

– Typically: Complete graph – Also: General topologies (publicly known)

[ …. Halevi-Ishai-Jain-Kushilevitz-Rabin’2016]

  • Social network:

Communication topology ≈ social graph

 topology is private

slide-12
SLIDE 12

MPC does NOT Suffice

  • MPC:

Communication topology is public

– Typically: Complete graph – Also: General topologies (publicly known)

[ …. Halevi-Ishai-Jain-Kushilevitz-Rabin’2016]

  • Social network:

Communication topology ≈ social graph

 topology is private Not protected by MPC!

slide-13
SLIDE 13

Want: Topology Hiding MPC [MOR’15]

Topology hiding MPC is MPC that hides both inputs and communication graph.

slide-14
SLIDE 14

More Motivation: Private Topology

  • Mobile Networks
  • Vehicle-to-Vehicle communication
  • Mesh networks
  • Internet-of-things
slide-15
SLIDE 15

Topology Hiding MPC [MOR’15]

Settings:

  • Parties (=nodes) have private inputs,
  • Parties know their neighbors,

communicate directly only with neighbors.

d e f b c a g h

slide-16
SLIDE 16

Topology Hiding MPC [MOR’15]

Settings:

  • Parties (=nodes) have private inputs,
  • Parties know their neighbors,

communicate directly only with neighbors.

The Goal: Compute any function of the inputs while revealing nothing beyond function’s output Reveal no info about the graph*

d e f b c a g h

slide-17
SLIDE 17

Topology Hiding MPC [MOR’15]

Settings:

  • Parties (=nodes) have private inputs,
  • Parties know their neighbors,

communicate directly only with neighbors.

The Goal: Compute any function of the inputs while revealing nothing beyond function’s output Reveal no info about the graph*

*Need minimal info about the graph (e.g. bounds on diameter / #nodes)

d e f b c a g h

slide-18
SLIDE 18

Topology Hiding MPC [MOR’15]

Settings:

  • Parties (=nodes) have private inputs,
  • Parties know their neighbors,

communicate directly only with neighbors.

The Goal: Compute any function of the inputs while revealing nothing beyond function’s output Reveal no info about the graph*

*Need minimal info about the graph (e.g. bounds on diameter / #nodes)

d e f b c a g h

Broadcast suffices

slide-19
SLIDE 19

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

d e f b c a g h

slide-20
SLIDE 20

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

d e f b c a g h

slide-21
SLIDE 21

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

d e f b c a g h

slide-22
SLIDE 22

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

d e f b c a g h

slide-23
SLIDE 23

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

  • Not topology hiding

– E.g. reveals distance to broadcaster

d e f b c a g h

slide-24
SLIDE 24

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

  • Not topology hiding

– E.g. reveals distance to broadcaster

d e f b c a g h

slide-25
SLIDE 25

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

  • Not topology hiding

– E.g. reveals distance to broadcaster

d e f b c a g h

slide-26
SLIDE 26

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

  • Not topology hiding

– E.g. reveals distance to broadcaster

d e f b c a g h

slide-27
SLIDE 27

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

  • Not topology hiding

– E.g. reveals distance to broadcaster – Not hiding even with encrypted messages

d e f b c a g h

slide-28
SLIDE 28

Is Topology Hiding MPC Possible?

Some Challenges:

  • Consider Naïve protocol:

“OR and forward”

  • Not topology hiding

– E.g. reveals distance to broadcaster – Not hiding even with encrypted messages

  • Who has the private key?

d e f b c a g h

slide-29
SLIDE 29

Impossible against Active Adversary

slide-30
SLIDE 30

Impossible against Active Adversary

Active (=malicious) adversary: Can deviate from the protocol (e.g., abort).

Theorem [MOR’15]: Against an active adversary, Topology-hiding broadcast is impossible

slide-31
SLIDE 31

Impossible against Active Adversary

Active (=malicious) adversary: Can deviate from the protocol (e.g., abort).

Theorem [MOR’15]: Against an active adversary, Topology-hiding broadcast is impossible Impossible already for simple graphs (chains) weak adversary (fail-stop)

slide-32
SLIDE 32

Feasible against Passive Adversary

slide-33
SLIDE 33

Feasible against Passive Adversary

Passive (=honest-but-curious) adversary: Follows the protocol (but tries to learn secrets).

Small diameter network graph: Distance between nodes at most logarithmic.

slide-34
SLIDE 34

Feasible against Passive Adversary

Passive (=honest-but-curious) adversary: Follows the protocol (but tries to learn secrets).

Small diameter network graph: Distance between nodes at most logarithmic. Theorem [MOR’15, HMTZ’16]: Topology-hiding broadcast exists

  • n small-diameter network graphs

against passive adversary

(assuming trapdoor permutations exist / DDH)

slide-35
SLIDE 35

Feasible against Passive Adversary

Passive (=honest-but-curious) adversary: Follows the protocol (but tries to learn secrets).

Small diameter network graph: Distance between nodes at most logarithmic. Theorem [MOR’15, HMTZ’16]: Topology-hiding broadcast exists

  • n small-diameter network graphs

against passive adversary

(assuming trapdoor permutations exist / DDH) given bounds on diameter & degree

slide-36
SLIDE 36

This Work

Our question: Is small-diameter necessary?

slide-37
SLIDE 37

This Work

Our question: Is small-diameter necessary? Our Main Result: Topology-hiding broadcast exists

  • n large-diameter network graphs

against passive adversary

(under standard assumptions, e.g., DDH)

slide-38
SLIDE 38

This Work

Our question: Is small-diameter necessary? Our Main Result: Topology-hiding broadcast exists

  • n large-diameter network graphs

against passive adversary

(under standard assumptions, e.g., DDH)

given number

  • f nodes*
slide-39
SLIDE 39

This Work: Results

Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:

slide-40
SLIDE 40

This Work: Results

Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:

d e f c

chains

slide-41
SLIDE 41

This Work: Results

Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:

d e b a g d e f c

chains cycles

slide-42
SLIDE 42

This Work: Results

Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:

d e b a g d e f b c a g h d e f c

chains cycles trees

slide-43
SLIDE 43

This Work: Results

Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:

d e b a g d e f b c a g h d e f c

chains cycles trees Small- circumference graphs

d e f b c a g h

slide-44
SLIDE 44

This Work: Results

Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:

d e b a g d e f b c a g h d e f c

chains cycles trees Small- circumference graphs

d e f b c a g h

slide-45
SLIDE 45

This Work: Results

Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:

d e b a g d e f b c a g h d e f c

chains cycles trees Small- circumference graphs

d e f b c a g h

slide-46
SLIDE 46

This Work: Results

Result 2: Topology hiding broadcast on cycles Topology hiding broadcast on trees

slide-47
SLIDE 47

This Work: Results

Result 3: Topology hiding broadcast for 1) cycles and 2) small-diameter graphs Topology hiding broadcast for small-circumference graphs

slide-48
SLIDE 48

This Work: Results

Result 3: Topology hiding broadcast for 1) cycles and 2) small-diameter graphs Topology hiding broadcast for small-circumference graphs Extensions:

We define: A distributed algorithm is “info-local” if output

  • f each party depends only on k-local neighborhood

We show: Our reductions hold for arbitrary graph with “info-local” algorithm for spanning-tree neighbors

slide-49
SLIDE 49

Remarks

  • Even with known overall topology,

topology-hiding is still non-trivial

– Example – Cycles: nodes order may be sensitive.

slide-50
SLIDE 50

Remarks

  • Even with known overall topology,

topology-hiding is still non-trivial

– Example – Cycles: nodes order may be sensitive.

  • Voting  parallel broadcast:

– voting & mix-networks inspiration

slide-51
SLIDE 51

Tool: PKCR-encryption

Public key encryption, which is:

  • 1. Rerandomizable:

Given pk and c  [m]k Can produce fresh ciphertext c’  [m]k.

  • 2. Privately key-commutative:
slide-52
SLIDE 52

Tool: PKCR-encryption

Public key encryption, which is:

  • 1. Rerandomizable:

Given pk and c  [m]k Can produce fresh ciphertext c’  [m]k.

  • 2. Privately key-commutative:

PKCR-enc exists under DDH assumption.

slide-53
SLIDE 53

Tool: PKCR-encryption

Public key encryption, which is:

  • 1. Rerandomizable:

Given pk and c  [m]k Can produce fresh ciphertext c’  [m]k.

  • 2. Privately key-commutative:

Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.

slide-54
SLIDE 54

Tool: PKCR-encryption

Public key encryption, which is:

  • 1. Rerandomizable:

Given pk and c  [m]k Can produce fresh ciphertext c’  [m]k.

  • 2. Privately key-commutative:

– Public keys are a group with efficiently computable k1*k2, k–1 Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.

slide-55
SLIDE 55

Tool: PKCR-encryption

Public key encryption, which is:

  • 1. Rerandomizable:

Given pk and c  [m]k Can produce fresh ciphertext c’  [m]k.

  • 2. Privately key-commutative:

– Public keys are a group with efficiently computable k1*k2, k–1 – Given secret key sk can efficiently: Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.

slide-56
SLIDE 56

Tool: PKCR-encryption

Public key encryption, which is:

  • 1. Rerandomizable:

Given pk and c  [m]k Can produce fresh ciphertext c’  [m]k.

  • 2. Privately key-commutative:

– Public keys are a group with efficiently computable k1*k2, k–1 – Given secret key sk can efficiently: a) Computed corresponding public-key pk(sk).

b)

Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.

slide-57
SLIDE 57

Tool: PKCR-encryption

Public key encryption, which is:

  • 1. Rerandomizable:

Given pk and c  [m]k Can produce fresh ciphertext c’  [m]k.

  • 2. Privately key-commutative:

– Public keys are a group with efficiently computable k1*k2, k–1 – Given secret key sk can efficiently: a) Computed corresponding public-key pk(sk).

b) AddLayer( [m]k , sk ) = [m]k*pk(sk)

Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.

slide-58
SLIDE 58

Tool: PKCR-encryption

Public key encryption, which is:

  • 1. Rerandomizable:

Given pk and c  [m]k Can produce fresh ciphertext c’  [m]k.

  • 2. Privately key-commutative:

– Public keys are a group with efficiently computable k1*k2, k–1 – Given secret key sk can efficiently: a) Computed corresponding public-key pk(sk).

b) AddLayer( [m]k , sk ) = [m]k*pk(sk) c) DelLayer ( [m]k , sk ) = [m]k*pk(sk)

  • 1

Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.

slide-59
SLIDE 59

Our Techniques: Topology-Hiding Voting on Cycles

Phase 1. Aggregate Encrypted Votes: Phase 2. Mix & Decrypt:

4 3 5 1 2

slide-60
SLIDE 60

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

slide-61
SLIDE 61

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

v1

slide-62
SLIDE 62

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k1 , v1

slide-63
SLIDE 63

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k1 , [v1]k1

slide-64
SLIDE 64

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k1 , [v1]k1

slide-65
SLIDE 65

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k1 , [v1]k1 *k2

slide-66
SLIDE 66

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k1*k2, [v1]k1*k2

slide-67
SLIDE 67

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k1*k2, [v1]k1*k2 [v2]k1*k2

slide-68
SLIDE 68

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k1*k2, [v1]k1*k2 [v2]k1*k2

slide-69
SLIDE 69

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k=k1*k2*k3, [v1]k [v2]k [v3]k

slide-70
SLIDE 70

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k=k1*…*k4*k5, [v1]k … [v5]k

slide-71
SLIDE 71

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 1. Aggregate Encrypted Votes:

4 3 5 1 2

k=k1*…*k4*k5, [v1]k … [v5]k

slide-72
SLIDE 72

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 2. Mix & Decrypt:

4 3 5 1 2

k=k1*…*k4*k5, [v1]k … [v5]k

slide-73
SLIDE 73

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 2. Mix & Decrypt:

4 3 5 1 2

k=k1*…*k4*k5, [v1]k … [v5]k [v(1)]k … [v (5)]k

slide-74
SLIDE 74

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 2. Mix & Decrypt:

4 3 5 1 2

k’=k1*…*k4, [v(1)]k’ … [v (5)]k’

slide-75
SLIDE 75

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 2. Mix & Decrypt:

4 3 5 1 2

k’=k1*…*k4, [v(1)]k’ … [v (5)]k’

slide-76
SLIDE 76

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 2. Mix & Decrypt:

4 3 5 1 2

k‘=k1*…*k4, [v(1)]k’ … [v (5)]k’

slide-77
SLIDE 77

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 2. Mix & Decrypt:

4 3 5 1 2

k‘=k1*…*k4, [v(1)]k’ … [v (5)]k’ k1, [v’(1)]k1 … [v’(5)]k1

slide-78
SLIDE 78

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 2. Mix & Decrypt:

4 3 5 1 2

k1, [v’(1)]k1 … [v’(5)]k1

slide-79
SLIDE 79

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 2. Mix & Decrypt:

4 3 5 1 2

k1, [v’(1)]k1 … [v’(5)]k1

slide-80
SLIDE 80

Our Techniques: Topology-Hiding Voting on Cycles

Protocol Phase 2. Mix & Decrypt:

4 3 5 1 2

v’’(1) … v’’(5)

slide-81
SLIDE 81

Toy Problem:

Our Techniques: Reductions

slide-82
SLIDE 82

Toy Problem: Settings: Arbitrary graph,

Our Techniques: Reductions

4 3 5 1 2

slide-83
SLIDE 83

Toy Problem: Settings: Arbitrary graph, with cycle traversing the nodes.

Our Techniques: Reductions

4 3 5 1 2

slide-84
SLIDE 84

Toy Problem: Settings: Arbitrary graph, with cycle traversing the nodes. Nodes know their local-view on cycle.

Our Techniques: Reductions

4 3 5 1 2 4

slide-85
SLIDE 85

Toy Problem: Settings: Arbitrary graph, with cycle traversing the nodes. Nodes know their local-view on cycle. Observe: Topology-hiding voting on cycle-traversal Topology-hiding voting on underlying graph.

Our Techniques: Reductions

4 3 5 1 2 4

slide-86
SLIDE 86

Toy Problem: Settings: Arbitrary graph, with cycle traversing the nodes. Nodes know their local-view on cycle. Observe: Topology-hiding voting on cycle-traversal Topology-hiding voting on underlying graph.

Our Techniques: Reductions

4 3 5 1 2

Reductions Outline (simplified):

  • 1. Find cycle-traversal (local views) while hiding topology
  • 2. Run topology-hiding voting on this cycle-traversal

4

slide-87
SLIDE 87

Finding Cycle-Traversal

Questions: Does a cycle-traversal always exist?

slide-88
SLIDE 88

Finding Cycle-Traversal

Questions: Does a cycle-traversal always exist? Can it be found efficiently?

slide-89
SLIDE 89

Finding Cycle-Traversal

Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding?

slide-90
SLIDE 90

Finding Cycle-Traversal

Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding? Yes, in every

(connected) graph.

slide-91
SLIDE 91

Finding Cycle-Traversal

Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding? Yes, in every

(connected) graph.

Yes, in every

(connected) graph.

slide-92
SLIDE 92

Finding Cycle-Traversal

Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding? Yes, in every

(connected) graph.

Yes, in every

(connected) graph.

Yes, in trees.

slide-93
SLIDE 93

Finding Cycle-Traversal

Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding? Yes, in every

(connected) graph.

Yes, in every

(connected) graph.

Yes, in trees. Roughly, in small-circ.

slide-94
SLIDE 94

Finding Cycle-Traversal in Trees

Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1

slide-95
SLIDE 95

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1

slide-96
SLIDE 96

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-97
SLIDE 97

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-98
SLIDE 98

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-99
SLIDE 99

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-100
SLIDE 100

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-101
SLIDE 101

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-102
SLIDE 102

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-103
SLIDE 103

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-104
SLIDE 104

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-105
SLIDE 105

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3

slide-106
SLIDE 106

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 d e f b c a g h a g d e e e 1 2 4 3

slide-107
SLIDE 107

Finding Cycle-Traversal in Trees

d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 d e f b c a g h a g d e e e 1 2 4 3

slide-108
SLIDE 108

Finding Cycle-Traversal in Trees

d e f b c a g h d e f b c a g h a g d e e e

What’s the cycle’s length?

1 2 4 3

slide-109
SLIDE 109

Finding Cycle-Traversal in Trees

d e f b c a g h d e f b c a g h a g d e e e

What’s the cycle’s length?

  • #(copies of v) = deg(v)

1 2 4 3

slide-110
SLIDE 110

Finding Cycle-Traversal in Trees

d e f b c a g h d e f b c a g h a g d e e e

What’s the cycle’s length?

  • #(copies of v) = deg(v)
  • Cycle’s length = sum of degrees

1 2 4 3

slide-111
SLIDE 111

Finding Cycle-Traversal in Trees

d e f b c a g h d e f b c a g h a g d e e e

What’s the cycle’s length?

  • #(copies of v) = deg(v)
  • Cycle’s length = sum of degrees

= 2|E|

1 2 4 3

slide-112
SLIDE 112

Finding Cycle-Traversal in Trees

d e f b c a g h d e f b c a g h a g d e e e

What’s the cycle’s length?

  • #(copies of v) = deg(v)
  • Cycle’s length = sum of degrees

= 2|E| = 2(n-1) (for trees)

1 2 4 3

slide-113
SLIDE 113

Finding Cycle-Traversal in k-Circumference Graphs

Main Steps:

  • I. Devise info-local algorithm for finding cycle-traversal.
slide-114
SLIDE 114

Finding Cycle-Traversal in k-Circumference Graphs

Main Steps:

  • I. Devise info-local algorithm for finding cycle-traversal.
  • 1. Find spanning-tree T, info-locally
  • 2. Find cycle-traversal on T.
slide-115
SLIDE 115

Finding Cycle-Traversal in k-Circumference Graphs

Main Steps:

  • I. Devise info-local algorithm for finding cycle-traversal.
  • 1. Find spanning-tree T, info-locally
  • 2. Find cycle-traversal on T.
  • II. Hide-topology:
slide-116
SLIDE 116

Finding Cycle-Traversal in k-Circumference Graphs

Main Steps:

  • I. Devise info-local algorithm for finding cycle-traversal.
  • 1. Find spanning-tree T, info-locally
  • 2. Find cycle-traversal on T.
  • II. Hide-topology:

Run “under-the-hood” using topology-hiding MPC: “find cycle-traversal & topology-hiding voting on it”

slide-117
SLIDE 117

Finding Cycle-Traversal in k-Circumference Graphs

Main Steps:

  • I. Devise info-local algorithm for finding cycle-traversal.
  • 1. Find spanning-tree T, info-locally
  • 2. Find cycle-traversal on T.
  • II. Hide-topology:

Run “under-the-hood” using topology-hiding MPC: “find cycle-traversal & topology-hiding voting on it”

On k-neighborhood  k-diameter graph

slide-118
SLIDE 118

Conclusions & Subsequent Works

This work: Topology-hiding broadcast is feasible for large-diameter graphs, including:

cycles, trees, low-circumference graphs.

slide-119
SLIDE 119

Conclusions & Subsequent Works

This work: Topology-hiding broadcast is feasible for large-diameter graphs, including:

cycles, trees, low-circumference graphs.

Open Questions (summer 2016): –Fail-stop / Active Adversary? –Other large-diameter graphs?

slide-120
SLIDE 120

Peek Preview: Subsequent Works

  • Ball-Boyle-Malkin-Moran (to appear):

Topology-hiding computation against fail-stop adversary for all graphs* using secure hardware

*with (unavoidable) bounded leakage

  • Akavia-LaVigne-Moran (to appear):

Topology-hiding computation against passive adversary for all graphs without secure hardware!

slide-121
SLIDE 121

Open Questions

Spring 2017

  • Fail-stop / Active Adversary

without secure hardware?

  • Dynamic graphs?

(work in progress)

slide-122
SLIDE 122

T h a n k Y

  • u

!

slide-123
SLIDE 123

T u