• No results found

Linear Functions

N/A
N/A
Protected

Academic year: 2022

Share "Linear Functions"

Copied!
21
0
0

Loading.... (view fulltext now)

Full text

(1)

Advanced Tools from Modern Cryptography

Lecture 4

Secure Multi-Party Computation:

Passive Corruption,

Linear Functions

(2)

Can we have an auction without an auctioneer?!

Declared winning bid should be correct

Only the winner and winning bid should be revealed

/WUV9G6TWUV!

(3)

Hospitals which can’t share their patient records with anyone

But want to data-mine on combined data

7UKPIFCVCYKVJQWVUJCTKPI!

Data Mining

Tool

(4)

A general problem

To compute a function of private inputs without revealing

information about the inputs Beyond what is

revealed by the function

X1

X4

X3

X2

f

(X1, X2, X3, X4)

5GEWTG(WPEVKQP'XCNWCVKQP

(5)

Need to ensure

Cards are shuffled and dealt correctly

Complete secrecy

No “cheating” by players, even if

they collude

No universally trusted dealer

2QMGT9KVJ0Q&GCNGT!

(6)

Without any trusted party, securely do

Distributed Data mining E-commerce

Network Games E-voting

Secure function evaluation ....

6JG#ODKVKQWU)QCN

#P[VCUMVJCV WUGUCVTWUVGF

RCTV[

5GEWTG

/WNVK2CTV[%QORWVCVKQP /2%

(7)
(8)

Emulating Trusted Computation

Encryption/Authentication allow us to emulate a trusted channel

Secure MPC: to emulate a source of trusted computation

Trusted means it will not “leak” a party’s information to others

And it will not cheat in the computation

A tool for mutually distrusting parties to collaborate

(9)

Is it for Real?

Getting there! Many implementations/platforms Fairplay, VIFF

Sharemind SCAPI

Obliv-C

JustGarble

SPDZ/MASCOT ObliVM

multipartycomputation.com/mpc-software

(10)

Is it for Real?

And many practical systems using some form of MPC

Danish company Partisia with real-life deployments (since 2008)

sugar beet auction, electricity auction, spectrum auction, key management

A prototype for credit rating, supported by Danish banks A proposal to the Estonian Tax & Customs Board

A proposal for Satellite Collision Analysis

Legislation in the US to use MPC for applications like a

“higher education data system”

(11)

MPC

Several dimensions

Passive (Semi-Honest) vs. Active corruption

Passive: corrupt parties still follow the protocol Honest-Majority vs. Unrestricted corruption

Information-theoretic vs. Computational security

(12)

Security Definition

Simplest case: Passive corruption, Information-theoretic security In general, need honest-majority (or similar restriction)

In passive corruption, the adversary can see the internals of all the corrupt parties, but cannot control their actions

Main concern will be secrecy (correctness is automatic,

provided the protocol is corrupt in the absence of corruption) Will ask for Perfect Secrecy

Similar to secret-sharing

(13)

Security Definition

Multiple parties in a protocol could be corrupt Collusion

Modelled using a single adversary who corrupts the parties Its view contains all the corrupt parties’ views

Security guarantee given against an “adversary structure”

Sets of parties that could be corrupt together

(14)

Security Definition

For secret sharing we needed to formalise “x is secret”

Now want to say: x is secret except for f(x) which is revealed

∀ x, x’ s.t. f(x)=f(x’), { view | input=x} ≡ { view | input=x’ }

Include in f(x) also the coordinates of x that correspond to corrupted parties

Later: More complicated when considering active corruption and/or computational security

(15)

MPC for Linear Functions

Client-server setting

Clients with inputs

Clients with outputs Servers

May be same parties x3

x1 x2 x4 x5

f1(x1,…,x5) f2(x1,…,x5)

(16)

Share

Linearly Combine

Reconstruct

Clients with inputs

Clients with outputs Servers

MPC for Linear Functions:

Using Linear Secret-Sharing

f1(x1,…,x5) f2(x1,…,x5) x3

x1 x2 x4 x5

(17)

W

x1

c11

c12 :

c1,u

= x2

c21

c22 :

c2,u

xv

cv1

cv2 :

cv,u

Q Q

:

σ1n σ11

:

σvn σv1

:

σ2n σ21

Each row given to a server

π11 :

π1n

=

π21 :

π2n

Each column sent to an output client Each column with

an input client

MPC for Linear Functions:

Using Linear Secret-Sharing

(18)

W

x1

c11

c12 :

c1,u

= x2

c21

c22 :

c2,u

xv

cv1

cv2 :

cv,u

Q Q

:

σ1n σ11

:

σvn σv1

:

σ2n σ21

Each row given to a server

π11 :

π1n

=

π21 :

π2n

Each column sent to an output client Each column with

an input client

MPC for Linear Functions:

Using Linear Secret-Sharing

View of the adversary (corrupt parties) View of the adversary (corrupt parties) View of the adversary (corrupt parties)

(19)

Security

Adversary allowed to corrupt any set of input and output clients and any subset T of servers s.t. T is not a privileged set (i.e., not in the access structure) for the secret-sharing scheme

View of adversary should reveal nothing beyond the inputs and outputs of the corrupted clients

Claim: Consider any input y of corrupt clients. If x, x’ of

uncorrupted clients such that for each corrupt output client i fi(x,y)=fi(x’,y), then the view of the adversary in the two cases are identically distributed

Because for any given view of the adversary, in each of the two cases, the solution space of randomness is non-empty and then it has the same dimension

Exercise

(20)

So far: a 2-round protocol for any linear function Could use additive secret-sharing

How about other functions?

Any function over a finite field can be computed using addition and multiplication

Interested in functions which are efficiently computable

Arithmetic circuit: representation of the computation using addition and multiplication

Goal: MPC Protocol for f, which is efficient if we are given an efficient arithmetic circuit for f

MPC for General Functions?

(21)

MPC from Shamir Secret-Sharing:

Overview

Locally multiplying degree d shares of M1 and M2 gives a degree 2d share of M1M2 . Then switch back to a degree d share (involves

communicating deg. d shares of deg. 2d shares)

A function f given as a program with linear steps and multiplications:

arithmetic circuit (over a finite field)

Share

Linear steps

Reconstruct

Clients with inputs

Client with output

Servers

Mult. Mult.

Mult.

Need n > 2d parties.

Security against d colluding parties

References

Related documents

Requests the Global Environment Facility to continue to provide, as appropriate, financial resources to Parties not included in Annex I to the Convention (non-Annex I Parties), in

all stakeholders would be regulated by such Notification and the uncertainty as contended by all parties would automatically come to an end. The other contention is in

• A common course of conduct or behavior involving some sort of communications or exchange of views between the parties, each of whom expects that the other party will act in

a) Each of the Parties hereby acknowledges that the Escrow Agent has been appointed under this Escrow Agreement and that it shall discharge its functions in accordance

The learned amicus has classified the matters pending before the Green Bench under different heads such as : i) matters relating to wood based industries,

Almost all Parties provided quantified mitigation targets, expressed as clear numerical targets, while a few included strategies, plans and actions as referred to in Article

38 While reaffirming the article does not introduce any new commitments for non-Annex I parties, Article 10(c) states that all parties shall ‘cooperate in the promotion of

The first challenge faced by political parties is lack of internal democracy within parties.. What do you understand by