Your SlideShare is downloading. ×
0
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment

475

Published on

This thesis presentation introduces a web based system for secure evaluation of economic function, named Secure Business Computation (SBC), in the manner suggested by Yao 1982

This thesis presentation introduces a web based system for secure evaluation of economic function, named Secure Business Computation (SBC), in the manner suggested by Yao 1982

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
475
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Sistema web basato sul paradigma di Secure Business Computation
  • Example of Bob = Recaro, Alice = Benz – Seats for C-Class and E-Class dilemma Optimal supply chain result not reachable by locally optimal production plans
  • Collaborative supply chain planning ensures global optimum Danger: loss of information superiority – Example: Recaro cooperates with Benz and BMW
  • I valori potrebbero essere I messagi
  • Bob holds messages, willing to disclose one Alice wants message, not willing to disclose which one
  • Every function can be represented by a Boolean circuit One pass circuits
  • TT: plain text GTT: wire codes to garble wire values EGTT: only one line can be decrypted PEGGT: position of entry in TT reveals nothing
  • Alice receives wire codes to decrypt his own output Result can be public or split
  • Function variabes: Input (single, multi) Output (multi) Arithmetic operations: Addition, Subtraction, Multiplication and Division
  • Ingressi (wire identification, name) Gates (input wires and one output wire) Truth tables (AND, OR, NOT, XOR, …) Uscite (wire identification, name) Proprietari (for all variables)
  • Sistema web basato sul paradigma di SC per realizzare forme di Secure Business Computation in accordo al protocollo proposto da Yao
  • Sistema web basato sul paradigma di SC per realizzare forme di Secure Business Computation in accordo al protocollo proposto da Yao
  • d – negoziata quantità fissa del ordine (publico) f B – costo per produzione del lotto h B – costo del stoccaggio dell’unità per periodo c – capacità di produzione per periodo f A – costo fisso per ordine h A – costo del stoccaggio dell’unità per periodo
  • Sistema web basato sul paradigma di SC per realizzare forme di Secure Business Computation in accordo al protocollo proposto da Yao
  • Transcript

    • 1. Secure Business Computation by using Garbled Circuits in a Web Environment da ILIĆ Dejan svolta a SAP Research CEC Karlsruhe Germania Supervisori: [UNITS] DR. BARTOLI Alberto [SAP] M.Sc. SCHRÖPFER Axel Universit à degli Studi di Trieste Italia CDLS in Ingegneria dell’Informazione
    • 2. Agenda <ul><li>Motivazione </li></ul><ul><li>Preliminari sul Secure Computation </li></ul><ul><li>Construzione del circuito binario </li></ul><ul><ul><li>Secure Business Computation Language </li></ul></ul><ul><ul><li>Binary Circuit Description Language </li></ul></ul><ul><li>Web based Secure Business Computation </li></ul><ul><ul><li>Funzione Joint Economic Lot Size </li></ul></ul><ul><li>Conclusione </li></ul>
    • 3. Agenda <ul><li>Motivazione </li></ul><ul><li>Preliminari sul Secure Computation </li></ul><ul><li>Construzione del circuito binario </li></ul><ul><ul><li>Secure Business Computation Language </li></ul></ul><ul><ul><li>Binary Circuit Description Language </li></ul></ul><ul><li>Web based Secure Business Computation </li></ul><ul><ul><li>Funzione Joint Economic Lot Size </li></ul></ul><ul><li>Conclusione </li></ul>
    • 4. Pianificazione Della Produzione Pian. della produzione Ordine Ordine Pian. della produzione [Parziale] spedizione [Parziale] spedizione Repian. della produzione Spedizione al mercato Fornitore Acquirente
    • 5. Pianificazione Della Produzione Pianificazione della produzione collaborativa Ordine Ordine Spedizione Spedizione Spedizione al mercato Pianificazione della produzione collaborativa [Hosoda e Disney, 2006] [Simatupang e Sridharan, 2002] Fornitore Un altro acquirente Acquirente
    • 6. Agenda <ul><li>Motivazione </li></ul><ul><li>Preliminari sul Secure Computation </li></ul><ul><li>Construzione del circuito binario </li></ul><ul><ul><li>Secure Business Computation Language </li></ul></ul><ul><ul><li>Binary Circuit Description Language </li></ul></ul><ul><li>Web based Secure Business Computation </li></ul><ul><ul><li>Funzione Joint Economic Lot Size </li></ul></ul><ul><li>Conclusione </li></ul>
    • 7. Oblivious Transfer (OT) <ul><li>Bob posiede n valori, ma vuole condividerne solo uno </li></ul><ul><ul><li>M 0 , M 1 ... M n </li></ul></ul><ul><li>Alice pu ò sceglie solo un valore senza rivelazione della sua scelta c </li></ul><ul><ul><li>M c </li></ul></ul>
    • 8. Oblivious Transfer (OT) E(k) x 0 x 1 random messages random message k encrypted x C q k 0 = k 1 = M 0 M 1 - k c M c = M 0 M 1 c D(q – x c ) D(q – x 0 ) q D(q – x 1 ) [Catrina, 2008]
    • 9. Secure Circuit Evaluation I Codifica bit Crea PEGTT Bob Alice
    • 10. Permuted Encrypted Garbled Truth Table (PEGTT) (1) Truth table: (2) Garbled TT: (3) Encrypted GTT: (4) Permuted EGTT: x 0 x 1 y 0 0 0 0 1 1 1 0 1 1 1 0 x 0 x 1 y w 0 0 w 1 0 w 2 0 w 0 0 w 1 1 w 2 1 w 0 1 w 1 0 w 2 1 w 0 1 w 1 1 w 2 0 x 0 x 1 y w 0 0 w 1 0 E w 0 0 (E w 1 0 (w 2 0 )) w 0 0 w 1 1 E w 0 0 (E w 1 1 (w 2 1 )) w 0 1 w 1 0 E w 0 1 (E w 1 0 (w 2 1 )) w 0 1 w 1 1 E w 0 1 (E w 1 1 (w 2 0 )) x 0 x 1 y w 0 0 w 1 1 E w 0 0 (E w 1 1 (w 2 1 )) w 0 1 w 1 1 E w 0 1 (E w 1 1 (w 2 0 )) w 0 0 w 1 0 E w 0 0 (E w 1 0 (w 2 0 )) w 0 1 w 1 0 E w 0 1 (E w 1 0 (w 2 1 ))
    • 11. Secure Circuit Evaluation II Codificazione fili Crea PEGTT Encritta input Circuito e Bob input Receive input con OT Valutare circuito Circuito e Bob input Risultato Risultato [Yao, 1982] Risultato Bob Alice
    • 12. Agenda <ul><li>Motivazione </li></ul><ul><li>Preliminari sul Secure Computation </li></ul><ul><li>Construzione del circuito binario </li></ul><ul><ul><li>Secure Business Computation Language </li></ul></ul><ul><ul><li>Binary Circuit Description Language </li></ul></ul><ul><li>Web based Secure Business Computation </li></ul><ul><ul><li>Funzione Joint Economic Lot Size </li></ul></ul><ul><li>Conclusione </li></ul>
    • 13. Construzione Del Circuito Binario <ul><li>(SBCL) Descrizione della formula </li></ul><ul><li>La formula in struttura di albero con radice </li></ul><ul><li>(BCDL) Oggetto descrittore del circuito </li></ul>
    • 14. Secure Business Computation Language (SBCL) <ul><li>Linguaggio specifico ad alto livello </li></ul><ul><ul><li>Dimensione delle variabili d’ingresso </li></ul></ul><ul><ul><li>Variabili e i loro proprietari </li></ul></ul><ul><ul><li>Formula </li></ul></ul><ul><li>Quattro operazioni aritmetiche </li></ul><ul><li>SBCL Parser ad albero con radice </li></ul><ul><li>1: default-bits:32 </li></ul><ul><li>2: </li></ul><ul><li>3: a:Alice </li></ul><ul><li>4: b:Bob </li></ul><ul><li>5: c:Bob </li></ul><ul><li>6: d:Alice </li></ul><ul><li>7: x:Bob, Alice </li></ul><ul><li>8: </li></ul><ul><li>9: x = d/c – (a+b) </li></ul>
    • 15. Binary Circuit Description Language (BCDL) <ul><li>Circuito combinatorio </li></ul><ul><li>BCDL composto da : </li></ul><ul><ul><li>Ingressi </li></ul></ul><ul><ul><li>Porte logice </li></ul></ul><ul><ul><li>Tabella di verit à </li></ul></ul><ul><ul><li>Uscite </li></ul></ul><ul><ul><li>Proprietari </li></ul></ul><ul><li>Quattro blocchi aritmetichi di construzione </li></ul><ul><li>Compilato da un albero con radice </li></ul>/ + – d c a b x = (d/c) – a+b
    • 16. Agenda <ul><li>Motivazione </li></ul><ul><li>Preliminari sul Secure Computation </li></ul><ul><li>Construzione del circuito binario </li></ul><ul><ul><li>Secure Business Computation Language </li></ul></ul><ul><ul><li>Binary Circuit Description Language </li></ul></ul><ul><li>Web based Secure Business Computation </li></ul><ul><ul><li>Funzione Joint Economic Lot Size </li></ul></ul><ul><li>Conclusione </li></ul>
    • 17. Web Based Secure Business Computation <ul><li>Computazione sicura tra due parti </li></ul><ul><li>Sistema web based sul paradigma di SC che segue il protocollo proposto da Yao </li></ul><ul><ul><li>Scambio dei messagi tra i browser </li></ul></ul><ul><ul><li>Librerie crittografiche </li></ul></ul><ul><ul><li>Struttura della web applicazione SBC </li></ul></ul><ul><li>Funzione Joint Economic Lot Size </li></ul><ul><ul><li>Construzione dell’oggetto BCDL </li></ul></ul><ul><ul><li>Benchmark </li></ul></ul>
    • 18. Scambio Dei Messagi Tra i Browser <ul><li>Host/Join la sessione per lo scambio </li></ul><ul><li>Message Box sul web server </li></ul><ul><ul><li>I comandi gestionali dello message box </li></ul></ul><ul><li>Multiple sessioni sullo web server </li></ul>ses.ID Host Guest
    • 19. Librerie Crittografiche (JavaScript) <ul><li>Oblivious Transfer </li></ul><ul><li>Protocollo Yao </li></ul><ul><li>Le librerie svolte di RSA: </li></ul><ul><ul><li>Chiave privata </li></ul></ul><ul><ul><li>Chiave publica </li></ul></ul><ul><li>La libreria svolta per la tecnica 1 -out-of- n </li></ul><ul><ul><li>1-out-of-2 </li></ul></ul><ul><li>La libreria svolta per OT in parallelo </li></ul><ul><li>Basato su Secure Hash Algorithm </li></ul><ul><li>E stata svolta la libreria SHA-1 </li></ul><ul><li>Le librerie svolte per Garbled Circuits: </li></ul><ul><ul><li>Generale </li></ul></ul><ul><ul><li>Host (encritta circuito) </li></ul></ul><ul><ul><li>Guest (valuta circuito) </li></ul></ul>
    • 20. Struttura Della Web Applicazione SBC <ul><li>Colorate: sviluppate come parte di questa tesi </li></ul><ul><li>Jsbn.js – JavaScript BigInteger Numeri </li></ul>Logica UI Service jsbn.js jsbn.js Browser AJAX object Bw AJAX obj AppYao Host AppHost AppOt Host appAjaxReq.js appDemo.jsp App Bw2bw Ot AppGuest Yao appAjaxReq.js appDemo.jsp Bw
    • 21. Web Based Secure Business Computation <ul><li>Sistema web based sul paradigma di SC che segue il protocollo proposto da Yao </li></ul><ul><ul><li>Scambio dei messagi tra i browser </li></ul></ul><ul><ul><li>Librerie crittografiche </li></ul></ul><ul><ul><li>Struttura della web applicazione SBC </li></ul></ul><ul><li>Funzione Joint Economic Lot Size </li></ul><ul><ul><li>Construzione dell’oggetto BCDL </li></ul></ul><ul><ul><li>Benchmark </li></ul></ul>
    • 22. Joint Economic Lot Size (JELS) <ul><li>Produzione collaborativa (d publico) </li></ul><ul><li>Fornitore tende a dimensione del lotto più economico (f B ,h B ,c privati) </li></ul><ul><li>Aquirente tende a quantità più economica dell ’ordine (f A ,h A privati) </li></ul>
    • 23. Costi Del Supply Chain Contro La Dimensione Del Lotto
    • 24. Construzione Dell’Oggetto BCDL <ul><li>Descrizione SBCL </li></ul><ul><li>Oggetto BCDL </li></ul><ul><li>1: default-bits:32 </li></ul><ul><li>2: </li></ul><ul><li>3: _2dfA: Alice </li></ul><ul><li>4: hA:Alice </li></ul><ul><li>5: _2dfB: Bob </li></ul><ul><li>6: dhB_c:Bob </li></ul><ul><li>7: qJstar2 :Bob, Alice </li></ul><ul><li>8: </li></ul><ul><li>9: qJstar2= </li></ul><ul><li>(_2dfA+_2dfB)/(hA+dhB_c) </li></ul>+ + / 2df A 2df B h A dh B /c q J 2
    • 25. Dimensioni Dell’Oggetto BCDL Porte logice Dimensione dei variabili Un blocco di: (2*A[i]+D[i+1])
    • 26. Web Based Secure Business Computation <ul><li>Sistema web based sul paradigma di SC che segue il protocollo proposto da Yao </li></ul><ul><ul><li>Scambio dei messagi tra i browser </li></ul></ul><ul><ul><li>Librerie crittografiche </li></ul></ul><ul><ul><li>Struttura della web applicazione SBC </li></ul></ul><ul><li>Funzione Joint Economic Lot Size </li></ul><ul><ul><li>Construzione dell’oggetto BCDL </li></ul></ul><ul><ul><li>Benchmark </li></ul></ul>
    • 27. Impostazioni <ul><li>Work station </li></ul><ul><ul><li>Windows Vista Enterprise SP1 32bit </li></ul></ul><ul><ul><li>Intel Core Duo T7300 2.0GHz </li></ul></ul><ul><ul><li>2.00GB RAM </li></ul></ul><ul><li>I browser </li></ul><ul><ul><li>Mozilla FireFox 3.6 </li></ul></ul><ul><ul><li>Google Chrome 4.0 </li></ul></ul><ul><ul><li>Google Chrome 4.0 su macchina virtuale Linux Ubuntu 8.4 </li></ul></ul><ul><li>Calcolare il tempo effettivo totale minimo </li></ul><ul><ul><li>Sul tempo effettivo spento fra i passi (host+guest) </li></ul></ul><ul><ul><li>Attorno a 10 prove </li></ul></ul>
    • 28. JELS Benchmark Sul Tempo Effettivo s
    • 29. Agenda <ul><li>Motivazione </li></ul><ul><li>Preliminari sul Secure Computation </li></ul><ul><li>Construzione del circuito binario </li></ul><ul><ul><li>Secure Business Computation Language </li></ul></ul><ul><ul><li>Binary Circuit Description Language </li></ul></ul><ul><li>Web based Secure Business Computation </li></ul><ul><ul><li>Funzione Joint Economic Lot Size </li></ul></ul><ul><li>Conclusione </li></ul>
    • 30. Conclusione <ul><li>SC è un argomento molto interessante per la crittografia moderna </li></ul><ul><li>Dimonstrazione della paradigma SC come il sistema basato sul web (DEMO) </li></ul><ul><li>Modello JELS estremamente rilevante dal punto di vista dell'industria </li></ul><ul><li>Lavoro futuro </li></ul><ul><ul><li>Secure Multi-Party Computation (SMC) </li></ul></ul>
    • 31. Grazie per l’attenzione <ul><li>Le domande? </li></ul>

    ×