SlideShare a Scribd company logo
1 of 15
Introduction multiparty computation
Cryptography for secure computation
⮚ Traditional Solution: Decrypt data and process it; extended trust to all collaborating parties.
⮚ Cryptography can however be used securely (and correctly) perform data perform processing and, minimize trust
assumptions.
PPT: Privacy Preserving
Technology
Scenario: doing statistics on big data.
• Machine Learning Technologies have increased the utility of data
• But we would like to process it while preserving privacy of data sources
Privacy preserving technologies
• To provide input privacy: protect against access to sources private input data.
• To provide output privacy: protect from adversaries reverse engineering sources private input data from
statistical inputs
Output privacy protection: differential privacy
Most popular technique: differential privacy
• Mathematical (not cryptographic) technique to protect against reconstructing (private) input data from output data.
•Main idea add noise in a careful, way so that one can carefully select a trade-off between privacy and utility of data.
Via the notion of k anonymity.
• Used in the wild, e.g. Apple to collect usage statistics, US Census Bureau, etc
• Ps: the input privacy techniques we discuss next typically don’t provide output privacy protection.
• i.e.. differential privacy may need to be used on conjunction, to provide input/output privacy
Input privacy
protection
The main cryptographic, techniques to provide input privacy
• Secure Multi-Party Computation (MPC)
• Homomorphic Encryption (HE)
• Zero-Knowledge Proofs (ZKP)
Multi-Party Computation (MPC)
MPC: Cryptographic protocols that allow the secure computation of a function with multiple
inputs
• Parties p1, p2, p n
• Each pi has a private input xi
• Parties wish to jointly compute F (X1, x2,…., xn)
• Secure parties want to perform this computation privately and securely
• Security parties want to perform this computation privately and correctly
• psI: there are other security requirements.
• Ps2: a dedicated security paradigm is used to prove security of MPC protocols
MPC: How it
started
• 2nd Party protocol introduced by Yao in 1986
• Multiparty cases by Goldreich, Micali and Wigderson in 1987
• One can show that any function is computable securely via MPC
Main tools:
• Yao’s Grabbled Circuits
• Shamir Secret Sharing
• Theoretical aspects have been known for 3 decades .. Main problem was efficiency.
MPC: how is it
going?
• After 2-3 decades of research , MPC is a mature cryptographic technique.
• Overheads are now acceptable for several applications
• Although one can use general purpose MPC protocols for any computation, specific functions (e.g. private set intersection) very
efficient protocol now exist.
• Many real world applications
More MPC
Examples
• Private auction several parties want to execute a private auction
• Highest bid winners and only their bid is revealed to the other parties
• Traditional solution use a trusted, auctioneer
• MPC solution replaces trusted auctioneer by an MPC protocol
Private intersection two organisations hold proprietary databases
They would like to find out the intersection and any other information must remain
private
Traditional solution use a third-party
More & more (MPC)
applications
• Several other practical applications
• threshold cryptography
• digital asset custody
• privacy preserving database (private queries, e.g. Jana DB)
• Information sharing and collaborative statistics
• secure analysis (e.g. Sharemind)
• private marketplace
Multi-Party Computation (MPC)
Other aspects of the protocol to be considered
include:
• functionality
• adversarial model
• communication model
Private Set
Intersection
• Private set intersection protocols are now very efficient
• Wide range of real-world applications:
• Collaboration between parties who do not trust each other
• Mobile phone applications
• Financial crime fighting
Homomorphic Encryption
• Not protocols, primitives providing an attractive functionally: we can process ciphertext that will decrypt into processed plaintext (see
‘homomorphism’ in mathematics
• Does not require interaction between parties- processing is on the ciphertext
• Adversarial model is tricker than (MPC)
• Not very efficient
• Main current application: privacy preserving machine learning
Zero-knowledge
proofs
• Protocols that allow computation of a proof of some statement in a correct, sound and private manner
• Can be interactive or non-interactive
• Complex implementations and proofs of security
• Main current application: privacy preserving blockchain applications
• More generally (ZKP) could provide a secure auditing mechanism, but probably not efficient enough
• A lot of ZNP research and development is in the blockchain arena ... Because of high incentives
Secure Computation: the
future
• Research deployment and deployment of privacy preserving technologies will continue to
grow.
• Acceptance is growing
• Solutions are becoming more efficient
• Range of application is growing
Interesting research problem:
• Quantum setting: different adversarial and computational models

More Related Content

Similar to Introduction multiparty computation

Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Security Innovation
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptxSasal6
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in CloudMphasis
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryptionNamit Sinha
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchainUlf Mattsson
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingShantanu Sharma
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteriasabin kafle
 
Is Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionIs Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionSecurity Innovation
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data MiningIJMER
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorialLen Bass
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paperHemanth
 

Similar to Introduction multiparty computation (20)

Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptx
 
cryptography
cryptographycryptography
cryptography
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
 
Is Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionIs Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar Question
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Ccc brochure
Ccc brochureCcc brochure
Ccc brochure
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paper
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 

More from The Cryptography Centre For Excellence (13)

Non-Fungible Token (NFT).pptx
Non-Fungible Token (NFT).pptxNon-Fungible Token (NFT).pptx
Non-Fungible Token (NFT).pptx
 
Cryptography is all we can trust
Cryptography is all we can trustCryptography is all we can trust
Cryptography is all we can trust
 
Joe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum CryptographyJoe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum Cryptography
 
fips140-3compliance
fips140-3compliancefips140-3compliance
fips140-3compliance
 
Exemplar of Cryptography Vulnerabilities
Exemplar of Cryptography VulnerabilitiesExemplar of Cryptography Vulnerabilities
Exemplar of Cryptography Vulnerabilities
 
Poor uses of cryptography
Poor uses of cryptographyPoor uses of cryptography
Poor uses of cryptography
 
Quantum Cryptography
Quantum Cryptography  Quantum Cryptography
Quantum Cryptography
 
Blockchain
BlockchainBlockchain
Blockchain
 
Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Introduction to bitcoin
 
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash SystemBitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System
 
Bitcoins introduction
Bitcoins introduction Bitcoins introduction
Bitcoins introduction
 
Prepare For Post-Quantum Cryptography
Prepare For Post-Quantum CryptographyPrepare For Post-Quantum Cryptography
Prepare For Post-Quantum Cryptography
 
Cryptography Inventory
 Cryptography Inventory Cryptography Inventory
Cryptography Inventory
 

Recently uploaded

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Introduction multiparty computation

  • 2. Cryptography for secure computation ⮚ Traditional Solution: Decrypt data and process it; extended trust to all collaborating parties. ⮚ Cryptography can however be used securely (and correctly) perform data perform processing and, minimize trust assumptions.
  • 3. PPT: Privacy Preserving Technology Scenario: doing statistics on big data. • Machine Learning Technologies have increased the utility of data • But we would like to process it while preserving privacy of data sources Privacy preserving technologies • To provide input privacy: protect against access to sources private input data. • To provide output privacy: protect from adversaries reverse engineering sources private input data from statistical inputs
  • 4. Output privacy protection: differential privacy Most popular technique: differential privacy • Mathematical (not cryptographic) technique to protect against reconstructing (private) input data from output data. •Main idea add noise in a careful, way so that one can carefully select a trade-off between privacy and utility of data. Via the notion of k anonymity. • Used in the wild, e.g. Apple to collect usage statistics, US Census Bureau, etc • Ps: the input privacy techniques we discuss next typically don’t provide output privacy protection. • i.e.. differential privacy may need to be used on conjunction, to provide input/output privacy
  • 5. Input privacy protection The main cryptographic, techniques to provide input privacy • Secure Multi-Party Computation (MPC) • Homomorphic Encryption (HE) • Zero-Knowledge Proofs (ZKP)
  • 6. Multi-Party Computation (MPC) MPC: Cryptographic protocols that allow the secure computation of a function with multiple inputs • Parties p1, p2, p n • Each pi has a private input xi • Parties wish to jointly compute F (X1, x2,…., xn) • Secure parties want to perform this computation privately and securely • Security parties want to perform this computation privately and correctly • psI: there are other security requirements. • Ps2: a dedicated security paradigm is used to prove security of MPC protocols
  • 7. MPC: How it started • 2nd Party protocol introduced by Yao in 1986 • Multiparty cases by Goldreich, Micali and Wigderson in 1987 • One can show that any function is computable securely via MPC Main tools: • Yao’s Grabbled Circuits • Shamir Secret Sharing • Theoretical aspects have been known for 3 decades .. Main problem was efficiency.
  • 8. MPC: how is it going? • After 2-3 decades of research , MPC is a mature cryptographic technique. • Overheads are now acceptable for several applications • Although one can use general purpose MPC protocols for any computation, specific functions (e.g. private set intersection) very efficient protocol now exist. • Many real world applications
  • 9. More MPC Examples • Private auction several parties want to execute a private auction • Highest bid winners and only their bid is revealed to the other parties • Traditional solution use a trusted, auctioneer • MPC solution replaces trusted auctioneer by an MPC protocol Private intersection two organisations hold proprietary databases They would like to find out the intersection and any other information must remain private Traditional solution use a third-party
  • 10. More & more (MPC) applications • Several other practical applications • threshold cryptography • digital asset custody • privacy preserving database (private queries, e.g. Jana DB) • Information sharing and collaborative statistics • secure analysis (e.g. Sharemind) • private marketplace
  • 11. Multi-Party Computation (MPC) Other aspects of the protocol to be considered include: • functionality • adversarial model • communication model
  • 12. Private Set Intersection • Private set intersection protocols are now very efficient • Wide range of real-world applications: • Collaboration between parties who do not trust each other • Mobile phone applications • Financial crime fighting
  • 13. Homomorphic Encryption • Not protocols, primitives providing an attractive functionally: we can process ciphertext that will decrypt into processed plaintext (see ‘homomorphism’ in mathematics • Does not require interaction between parties- processing is on the ciphertext • Adversarial model is tricker than (MPC) • Not very efficient • Main current application: privacy preserving machine learning
  • 14. Zero-knowledge proofs • Protocols that allow computation of a proof of some statement in a correct, sound and private manner • Can be interactive or non-interactive • Complex implementations and proofs of security • Main current application: privacy preserving blockchain applications • More generally (ZKP) could provide a secure auditing mechanism, but probably not efficient enough • A lot of ZNP research and development is in the blockchain arena ... Because of high incentives
  • 15. Secure Computation: the future • Research deployment and deployment of privacy preserving technologies will continue to grow. • Acceptance is growing • Solutions are becoming more efficient • Range of application is growing Interesting research problem: • Quantum setting: different adversarial and computational models