1 / 43

Active Secure MPC under 1-bit leakage

This talk explores the use of leakage in achieving active security in Multi-Party Computation (MPC). The goal is to achieve scalable MPC for big data without compromising security. The talk presents various theorems and examples to illustrate the overhead and efficiency of achieving active security with leakage.

cdutton
Download Presentation

Active Secure MPC under 1-bit leakage

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Active Secure MPC under 1-bit leakage Muthu Venkitasubramaniam (U Rochester) Based on joint works with Carmit Hazay, Yuval Ishai, abhishelat

  2. Active Secure MPC under 1-bit leakage Muthu Venkitasubramaniam (U Rochester) Based on joint works with Carmit Hazay, Yuval Ishai, abhishelat

  3. What we have seen so far? Many applications have DP algorithms • Some have local DP solutions in the multiparty setting • Centralized DP be combined with MPC generically Leaking helps improve MPC performance • Protect leakage by modifying the guarantee to DP Most protocols are only passive secure This talk: Does leakage help achieve active security?

  4. Secure Computation Concrete Question: What is the overhead of achieving active security over passive security? • Boolean: Yao-style protocols in O(1) rounds [LP11,….] • Communication efficiency: Bits transmitted in OT-hybrid • Computational efficiency: #BBcalls to a PRG

  5. Yao’s 2PC OT

  6. Yao’s 2PC Yao

  7. Yao’s 2PC Yao

  8. State-of-the-art Yao-style Active 2PC Theorem [HIV17]: Active Secure 2PC with constant overhead O(Passive Yao) + low-order terms.

  9. Active Secure 2PC Lots of work in 1980s, 1990s on theoretical MPC 2009: Pinkas, Schneider, Smart, Williams 2PC: Malicious: 1148 seconds 2PC: SH: 7 seconds 2010: SH: 4500 ms 2011: SH: 211 ms 2013: SH: 16 ms 2015: SH: 5 ms 2017: SH: 1.4 ms 2017: Malicious: 65 ms 2017: Malicious: 37ms

  10. Active Secure 2PC Lots of work in 1980s, 1990s on theoretical MPC 2009: Pinkas, Schneider, Smart, Williams 2PC: Malicious: 1148 seconds 2PC: SH: 7 seconds 2010: SH: 4500 ms 2011: SH: 211 ms 2013: SH: 16 ms 2015: SH: 5 ms 2017: SH: 1.4 ms 2017: Malicious: 65 ms 2017: Malicious: 37ms

  11. Why concede to leakage? Goal: Active security with constant overhead over passive security with leakage Want: Scalable MPC for big data Overheadof active over passive still exorbitant

  12. What we do? Active security at the cost of passive with leakage • What we don’t do but would really like to do? • Show leakage is DP

  13. Dual Execution [MF06] Yao

  14. Dual Execution [MF06] Yao Yao

  15. Dual Execution [MF06] Yao Yao

  16. Dual Execution [MF06] Yao Yao EQ? Overhead 2 and leaks 1 bit Only Boolean Requires multiple rounds of interaction

  17. Why concede to leakage? Goal: Active security with constant overhead over passive security with leakage Want: Scalable MPC for big data Overheadof active over passive still exorbitant

  18. Why concede to leakage? Goal: Active security with constant overhead over passive security with leakage Want: Scalable MPC for big data Overheadof active over passive still exorbitant

  19. Our Results - Active secure 2PC with 1-bit leakage Theorem 1[sV18]: Boolean f that is g-efficiently verifiable overhead = Yao(f)+Yao(g) Theorem 2 [sV18]: Arbitrary f that is g-efficiently verifiable overhead = GMW(f) + active-protocol(g) Theorem 3 [HIV17]: Arbitrary f overhead = (1+c) Yao(f)

  20. Efficiently Verifiable Functions • We say that is efficiently verifiable by if • and Examples Matrix multiplication requires O(n3), can be checked O(n2) Max-flow requires O(E2V), can be checked in O(E+V) LP can be checked by complementary slackness condition Convex hull requires O(nlogn), checked in O(n)

  21. Theorem 1 [sV18]: Boolean f

  22. Theorem 1 [sV18]: Boolean f Yao Yao EQ?

  23. Theorem 1 [sV18]: Boolean f Yao Yao

  24. Theorem 1 [sV18]: Boolean f Yao Yao

  25. Theorem 1 [sV18]: Boolean f Yao Yao Yes/No

  26. Theorem 1 [sV18]: Boolean f Yao Yao Yes/No overhead = Yao(f)+Yao(g)

  27. Theorem 2 [sV18]: Arbitrary f GMW

  28. Theorem 2 [sV18]: Arbitrary f GMW Yes/No overhead = GMW(f) + (g)

  29. Theorem 2 [sV18]: Arbitrary f Yes/No overhead = (f) + (g) • Instantiate with anyweakly private prot. [GIPST14] • Examples include GMW, BGW, CCD, DI • Extends to the multiparty setting!

  30. Application: Perfect Matching A B C2 C1 C1+C2 = A+B [Harvey06] Algebraic Algorithms for Matching and Matroid Problems Cast Harvey’s algorithm as a passive protocol in matrix-multiplication hybrid

  31. Application: Perfect Matching [Harvey06] Algebraic Algorithms for Matching and Matroid Problems Cast Harvey’s algorithm as a passive protocol in matrix-multiplication hybrid

  32. Application: Perfect Matching • [Harvey06] Algebraic Algorithms for Matching and Matroid Problems • Perfect matching in • Cast Harvey’s algorithm as a passive protocol in matrix-multiplication hybrid • Communication complexity is • Checking perfect matching is • Protocol is weakly private • Amplify to active security with 1-bit leakage • Observation: Realize with weakly private protocol and compose • [Harvey06] Algebraic Algorithms for Matching and Matroid Problems • Perfect matching in • Cast Harvey’s algorithm as a passive protocol in matrix-multiplication hybrid • Communication complexity is • Checking perfect matching is • Protocol is weakly private • Amplify to active security with 1-bit leakage • Observation: Realize with weakly private protocol and compose

  33. Theorem 3 [HIV17]: Arbitrary f

  34. Theorem 3 [HIV17]: Arbitrary f Yao

  35. Theorem 3 [HIV17]: Arbitrary f Garble

  36. Theorem 3 [HIV17]: Arbitrary f Idea: Authenticated Garbling [IKOPS11,WRK17a/b,HIV17,WRRK18] Garble

  37. Theorem 3 [HIV17]: Arbitrary f Idea: Authenticated Garbling [IKOPS11,WRK17a/b,HIV17,WRRK18] Auth.Garble • Deal with selective abort: • [IKOPS11] – Use certified OT • [WRK17a/b,WRRK18] – Use distributed garbling • [HIV17] – Use doubly-certified OT polylog overhead O(s) overhead O(1) overhead, uses AG codes

  38. Theorem 3 [HIV17]: Arbitrary f Idea: Authenticated Garbling [IKOPS11,WRK17a/b,HIV17,WRRK18] Simple insight: Selective abort can cause 1-bit leakage Auth.Garble • Deal with selective abort: • [IKOPS11] – Use certified OT • [WRK17a/b,WRRK18] – Use distributed garbling • [HIV17] – Use doubly-certified OT polylog overhead O(s) overhead O(1) overhead, uses AG codes

  39. Theorem 3 [HIV17]: Arbitrary f Idea: Authenticated Garbling [IKOPS11,WRK17a/b,HIV17,WRRK18] Simple insight: Selective abort can cause 1-bit leakage Auth.Garble • [HIV17] Design lean MAC • Adds s bit auth. information with every ciphertext overhead = (1+s/k) Yao(f)

  40. Certified OT [IKOPS11] Cert –OT Global NP Predicate R Sender Receiver Witness If [HIV17] Design concretely efficient protocol for Cert-OT Use MPC-in-the-head [IKOS07,IKOPS11] Communication overhead = parallel-OT + low order terms

  41. Our Results - Active secure 2PC with 1-bit leakage Theorem 1[sV18]: Boolean f that is g-efficiently verifiable overhead = Yao(f)+Yao(g) Theorem 2 [sV18]: Arbitrary f that is g-efficiently verifiable overhead = GMW(f) + active-protocol(g) Theorem 3 [HIV17]: Arbitrary f overhead = (1+c) Yao(f)

  42. Secure greedy algorithms [sV15] • Iterative approach • Reduce to secure comparison • “Leak” partial result in each iteration • Examples: Median [AMP10], Minimum spanning tree[BS11], job scheduling, convex full, combinatorial optimizations • Communication = O(Input+Output) • Active secure 2PC for medians with simple checks • Can we extend to greedy algorithms?

  43. Thank You

More Related