19
GARBLED CIRCUITS & SECURE TWO-PARTY COMPUTATION Payman Mohassel Yahoo Labs

Payman Mohassel Yahoo Labs

  • Upload
    awen

  • View
    75

  • Download
    0

Embed Size (px)

DESCRIPTION

GARBLED CIRCUITS & SECURE TWO-PARTY COMPUTATION. Payman Mohassel Yahoo Labs. History of Garbled Circuits. 1982: First oral presentation  [Andrew Yao] - PowerPoint PPT Presentation

Citation preview

Page 1: Payman Mohassel       Yahoo Labs

GARBLED CIRCUITS & SECURE TWO-PARTY COMPUTATION

Payman Mohassel Yahoo Labs

Page 2: Payman Mohassel       Yahoo Labs

History of Garbled Circuits

1982: First oral presentation [Andrew Yao]

1987: First written account [GMW] (public-key)

1990: First use of term ``Garbled circuits” [BMR] (symmetric-key)

1994: First abstraction as a primitive [FKN] (minimal model for sec. comp.)

1999: First PRF-based construction [NPS] (PP-auctions)

2004: First implementation [MNPS] (Fairplay)

2004: First proof of 2PC based on garbled circuits [LP] (double-encryption)

Page 3: Payman Mohassel       Yahoo Labs

A Garbling Scheme

𝐺𝐶seed

𝐺𝐼 𝑥

𝒚

𝐺𝐼 𝑦

𝐺𝐶𝐺 𝐼 𝑦

𝐺 𝐼 𝑥Eval( ) 𝐺𝑂𝐺𝑂

𝐶 (𝑥 , 𝑦 )= 𝑓 (𝑥 , 𝑦 )

𝒙 𝑇𝑇

𝑇𝑇𝒇 (𝒙 ,𝒚 )

Page 4: Payman Mohassel       Yahoo Labs

Basic Properties

Privacy: Knowing , , and does no leak any info

Output Authenticity: Cannot compute another valid output

𝐺𝐶𝐺 𝐼 𝑦

𝐺 𝐼 𝑥

𝐺𝑂 ‘

𝐺𝐶𝐺 𝐼 𝑦

𝐺 𝐼 𝑥 𝑇𝑇 𝒇 (𝒙 ,𝒚 )

𝐺𝐶𝐺 𝐼 𝑦

𝐺 𝐼 𝑥

Page 5: Payman Mohassel       Yahoo Labs

Many Applications

Secure multi-party computation Zero-knowledge proofs Verifiable computation Homomorphic encryption One-time programs Circular-secure encryption Functional encryption ...

Emerged as a powerful building block!

Page 6: Payman Mohassel       Yahoo Labs

Secure Multiparty Computation (MPC)

Parties learn only f(x1,…,xn)

P1, x1

P2, x2

P5, x5

P4, x4

P3, x3

Correctness:honest parties learn the correct output

Privacy:Nothing but the final output is leaked

Fairness, Output Delivery, …

Page 7: Payman Mohassel       Yahoo Labs

Applications of MPC

Data mining Electronic Voting Auctions Exchanges/financial analysis Location privacy Genomic computation Electronic commerce Healthcare

When there is IP, NDA, user consent involved When you need to distribute trust

Page 8: Payman Mohassel       Yahoo Labs

𝑇𝑇

Secure Two-Party Computation (2PC)

Garbler

𝒙Evaluator𝒚

𝐶 (𝑥 , 𝑦 )= 𝑓 (𝑥 , 𝑦 )

𝐺𝐶←𝐺𝑎𝑟𝑏(𝐶 , 𝑠𝑑)𝐺 𝐼 𝑥←𝐺𝐼𝑛(𝑥 ,𝑠𝑑)

Oblivious Transfer

𝐺𝐶𝐺 𝐼 𝑦

𝐺 𝐼 𝑥

𝒇 (𝒙 ,𝒚 )

Page 9: Payman Mohassel       Yahoo Labs

Yao’s Garbled Circuit Protocol

First secure computation protocol Efficient and simple Implementations

› Fairplay, 2004› TASTY, 2010 › FastGarble, 2011› SCAPI, 2013› JustGarble, 2013› …

• Circuits with millions of gates in less than a second

Page 10: Payman Mohassel       Yahoo Labs

Research Directions

Garbling Constructions

Functionality &Security Properties

Secure 2PC

Page 11: Payman Mohassel       Yahoo Labs

Basic Garbling/Evaluation

AND

𝑘01 ,𝑘1

1

𝑘02 ,𝑘1

2

𝑐0,0=𝐸{𝑘01 ,𝑘02 }(𝑘03)

𝑘03 ,𝑘1

3

𝑐0,1=𝐸{𝑘01 ,𝑘12 }(𝑘03)

𝑐1,0=𝐸{𝑘11 ,𝑘02 }(𝑘03)

𝑐1,1=𝐸 {𝑘11 ,𝑘12 }(𝑘13)

Garble Evaluate

𝐷𝑒𝑐 {𝑘𝑎1 ,𝑘𝑏

2 } (𝑐𝑎 ,𝑏)=𝑘𝑎∧𝑏3

AND

 

 

 

Page 12: Payman Mohassel       Yahoo Labs

Constructions (Efficiency)

1990: Point-and-Permute [BMR] 1999: 3-row reduction [NPS] 2008: Free-XOR [KS] 2009: 2-row reduction [PSSW] 2013: Fixed-key block-cipher [BHKR] 2014: FleXor [KMR] 2014: Privacy-free garbling [KNO] 2015: HalfGates [ZRE] (2-row non-XORs, and 0-row XORs) How low can we get? Lower bounds? Fresh ideas for garbling needed?

Page 13: Payman Mohassel       Yahoo Labs

Constructions (Security)

Weak Assumptions PRF double-encryption LPN Free-XOR Correlation-robustness row reduction techniques Correlation-robustness FleXor

Strong Assumptions Circular-security Free-XOR Circular-security Half-Gates Ideal-permutation Fixed-key block-cipher RO Adaptive security Can we achieve these using weak assumptions?

Page 14: Payman Mohassel       Yahoo Labs

Standard Security Properties

Input privacy› Needed in most applications (not in ZK application)

Function privacy› Private function evaluation

Output authentication› Malicious 2PC, dual-execution, verifiable comp., server-aided comp., ZK

Adaptive privacy› Verifiable comp, offline/online batch execution, …

Page 15: Payman Mohassel       Yahoo Labs

New Security Properties?

Only a subset of properties (e.g. privacy-free garbling)

Leaky privacy (e.g. leak a few bits, protect/leak certain functions)

Tunable security! (tunable privacy, authenticity, …)

Leveled privacy (inputs with different sensitivity levels)

Page 16: Payman Mohassel       Yahoo Labs

Functionality?

Standard ones› Garble, encode inputs, evaluate, authenticate outputs

Circuit property enforcing (with Rosulek and Kolesnikov)› Checking circuit properties› Topology, depth, input size, gate types› Useful in limiting malicious behavior

Input property enforcing› Unique input identifier (for input consistency)› Enforcing input formats› Enforce relation between inputs in multiple executions (beyond equality)

Output property enforcing› Enforcing output format

Page 17: Payman Mohassel       Yahoo Labs

𝐺𝐶1

Malicious 2PC

𝐺𝐶1

𝐺𝐶2

𝐺𝐶 4

𝐺𝐶5 𝐺𝐶5

Open Evaluate

𝐺𝐶3

𝐺𝐶6

𝐺𝐶3

𝐺𝐶2

𝐺𝐶 4

𝐺𝐶6

𝑧 2

𝑧 4

𝑧 6

Majority

𝑧= 𝑓 (𝑥 , 𝑦)⋮

𝑥❑

𝑥❑

𝑥❑

𝑧❑

Are all inputs the same?

Is the output correct?

𝑃1

𝒙

Page 18: Payman Mohassel       Yahoo Labs

Secure 2PC

Malicious security› Cut-and-choose (state of the art: Lindell 2013)› Abstracting out cut-and-choose (joint work with Seny Kamara)› A new paradigm?› Lower bounds for cut-and-choose?

RAM programs› Optimizing ORAM for 2PC ([WCS]: Circuit-ORAMs)› Implementation framework (SCVM)› Extending cut-and-choose to RAM programs ([AHMR])› Lots of interesting questions

2PC with relaxed security› Covert security, leaky 2PC, one-sided security› Restricting leakage functions

Page 19: Payman Mohassel       Yahoo Labs

Quest ions?