Secure Multi-party Computation

Embed Size (px)

Citation preview

  • 7/26/2019 Secure Multi-party Computation

    1/28

    Secure Multi-party

    ComputationWhat it is, and why youd care

    Manoj Prabhakaran

    University of Illinois, Urbana-Champaign

  • 7/26/2019 Secure Multi-party Computation

    2/28

    SMC

  • 7/26/2019 Secure Multi-party Computation

    3/28

    SMC

    SMC conceived more than 30 years back

  • 7/26/2019 Secure Multi-party Computation

    4/28

    SMC

    SMC conceived more than 30 years back

    A very general concept that subsumes the bulk of

    theoretical cryptography

  • 7/26/2019 Secure Multi-party Computation

    5/28

    SMC

    SMC conceived more than 30 years back

    A very general concept that subsumes the bulk of

    theoretical cryptography

    Largely a well-kept secret

  • 7/26/2019 Secure Multi-party Computation

    6/28

    SMC: the question

  • 7/26/2019 Secure Multi-party Computation

    7/28

    SMC: the question

    Collaboration without trust?

  • 7/26/2019 Secure Multi-party Computation

    8/28

  • 7/26/2019 Secure Multi-party Computation

    9/28

    SMC: the question

    Collaboration without trust?

    Collaboration: compute on collective data belonging to

    different parties

    e.g. query with me, database with you

  • 7/26/2019 Secure Multi-party Computation

    10/28

  • 7/26/2019 Secure Multi-party Computation

    11/28

    SMC: the question

    Collaboration without trust?

    Collaboration: compute on collective data belonging to

    different parties

    e.g. query with me, database with you

    e.g. query with me, encrypted database with you, key

    with someone else

    Goal: Nothing should be revealed beyond the result

  • 7/26/2019 Secure Multi-party Computation

    12/28

    SMC: the question

    Collaboration without trust?

    Collaboration: compute on collective data belonging to

    different parties

    e.g. query with me, database with you

    e.g. query with me, encrypted database with you, key

    with someone else

    Goal: Nothing should be revealed beyond the result

    Ideally: Use a trusted third party

  • 7/26/2019 Secure Multi-party Computation

    13/28

    SMC: the question

    Collaboration without trust?

    Collaboration: compute on collective data belonging to

    different parties

    e.g. query with me, database with you

    e.g. query with me, encrypted database with you, key

    with someone else

    Goal: Nothing should be revealed beyond the result

    Ideally: Use a trusted third party

    Really: Cant agree on a trusted party. So...

  • 7/26/2019 Secure Multi-party Computation

    14/28

    SMC: the answer

  • 7/26/2019 Secure Multi-party Computation

    15/28

    SMC: the answer

    SMC protocol: among mutually distrusting parties, to

    emulate the presence of a globally trusted party

  • 7/26/2019 Secure Multi-party Computation

    16/28

  • 7/26/2019 Secure Multi-party Computation

    17/28

    SMC: the answer

    SMC protocol: among mutually distrusting parties, to

    emulate the presence of a globally trusted party

    Numerous protocols in literature for various functionalities,

    in various settings

    Tools: Verifiable secret-sharing, homomorphic encryptions,

    commitments, ZK proofs, oblivious transfer, ...

  • 7/26/2019 Secure Multi-party Computation

    18/28

  • 7/26/2019 Secure Multi-party Computation

    19/28

    SMC: the answer

    SMC protocol: among mutually distrusting parties, to

    emulate the presence of a globally trusted party

    Numerous protocols in literature for various functionalities,

    in various settings

    Tools: Verifiable secret-sharing, homomorphic encryptions,

    commitments, ZK proofs, oblivious transfer, ...

    Simpler protocols if some trust already present

    Honest-but-curious

  • 7/26/2019 Secure Multi-party Computation

    20/28

    SMC: the answer

    SMC protocol: among mutually distrusting parties, to

    emulate the presence of a globally trusted party

    Numerous protocols in literature for various functionalities,

    in various settings

    Tools: Verifiable secret-sharing, homomorphic encryptions,

    commitments, ZK proofs, oblivious transfer, ...

    Simpler protocols if some trust already present

    Honest-but-curious

    Honest-majority

  • 7/26/2019 Secure Multi-party Computation

    21/28

    SMC: the answer

    SMC protocol: among mutually distrusting parties, to

    emulate the presence of a globally trusted party

    Numerous protocols in literature for various functionalities,

    in various settings

    Tools: Verifiable secret-sharing, homomorphic encryptions,

    commitments, ZK proofs, oblivious transfer, ...

    Simpler protocols if some trust already present

    Honest-but-curious

    Honest-majority

    Simple (offline) trusted sources

  • 7/26/2019 Secure Multi-party Computation

    22/28

    SMC in GENI?

  • 7/26/2019 Secure Multi-party Computation

    23/28

    SMC in GENI?

    Where privacy is needed

  • 7/26/2019 Secure Multi-party Computation

    24/28

    SMC in GENI?

    Where privacy is needed

    e.g. Measurement archives held by a virtualtrusted party

  • 7/26/2019 Secure Multi-party Computation

    25/28

    SMC in GENI?

    Where privacy is needed

    e.g. Measurement archives held by a virtualtrusted party

    Secure distributed storage and computation (secure

    unless servers corrupt)

  • 7/26/2019 Secure Multi-party Computation

    26/28

    SMC in GENI?

    Where privacy is needed

    e.g. Measurement archives held by a virtualtrusted party

    Secure distributed storage and computation (secure

    unless servers corrupt)

    May use honest majority in a federation

  • 7/26/2019 Secure Multi-party Computation

    27/28

    SMC in GENI?

    Where privacy is needed

    e.g. Measurement archives held by a virtualtrusted party

    Secure distributed storage and computation (secure

    unless servers corrupt)

    May use honest majority in a federation

    Provide SMC as an experiment support service?

  • 7/26/2019 Secure Multi-party Computation

    28/28

    SMC in GENI?

    Where privacy is needed

    e.g. Measurement archives held by a virtualtrusted party

    Secure distributed storage and computation (secure

    unless servers corrupt)

    May use honest majority in a federation

    Provide SMC as an experiment support service?

    SMC offers a whole range of novel applications