SlideShare a Scribd company logo
1 of 28
Download to read offline
Secure Multi-party Computation
Deep Dive
Knowledge Discovery without Sharing Data
Kyoungil Bae, Ph.D
Data Privacy
Data as Liability
“control over users’ data and digital possessions
and activity is rapidly moving from an asset to a
liability.” - Vitalik Buterin, 2019
“Data is a toxic asset” - Bruce Schneier, 2016
Self-sovereignty
“You are the product of Facebook”
- John Lanchester, 2017
“Cambridge Analytica illicitly procured the data of
50 million Facebook users” - Todd Spangler, 2018
“일부 ‘지식인’ 들의 고집으로 전 국민을
피곤하게 만드는거 아닐까?
지금이 편하고 좋은데 …”
Data Sharing
• Genome analytics
• Government policy making
• Smart city – public safety
• and Blockchain
Knowledge Discovery
Without Data Sharing
f(xa, xb, xc)
- Privacy-preserving
- Verifiable output
Alice Bob
Carol
Xa
Xb
Xc
Secure MPC
Trusted Computing
between Trustless Parties
Inventors
Andrew Yao, Millionaires’ Problem1982
Andrew Yao’s GC (Garbled Circuits)1986
GMW (Goldreich-Micali-Wigderson) Protocol1987
BGW (Ben-Or, Goldwasser, Wigderson) Protocol, CCD (Chaum, Crépeau, Damgård) Protocol1988
China
Physics
Computer Science
Israel
Computer Science
Italia
Computer Science
Israel
Computer Science
Israel
Mathematics
U.S (Israeli)
Computer Science
(Mathematics)
Israel
Computer Science
U.S
Computer Science
Denmark
Mathematics
Canada
Computer Science
Generic Secure MPC
Boolean Circuit Arithmetic Circuit
Yao’ GC
GMW
BGW (CCD)
2 Party
Constant Round
Multi-party
Secret Sharing
Multi-party
Shamir Secret Sharing
Honest majority
Building Knowledge Discovery Functions
Boolean
Circuit
Arithmetic
Circuit
Gates Example
XOR
AND
NOT
Addition
Multiplication
Adder 4-bit Parallel Adder
Xa XbXc
×
+
Output
f(xa, xb, xc) = xa + xb × xc
Comparison (A > B)
A
B NOT
AND (A>B)
A B ¬B A ⋀ ¬B
0 0 1 0
0 1 0 0
1 0 1 1
1 1 0 0
Alice Bob
$A
millions
$B
millions
f(A, B) = (A > B)
B-2 B-1 B B+1 B+2 B+3 B+4
B-2 B-1 B B+1 B+2
= A
B+3 B+4
X OTRUE FALSEResult
X X X X O O O
Millionaires’ Problem for Dummies
B-2 B-1 B B+1 B+2
= A
B+3 B+4
X X X X O O O
Basic Idea of GC (Garbled Circuit)
1 2 3 4
1
2
3
4
BA
1 1 10
0 1 10
0 0 10
0 0 00
Alice Bob
$3
millions
$2
millions
f(A, B) = (A > B)
k1
k2
k3
k4
Permutation (Garbling)
Basic Idea of GC (Garbled Circuit)
1 1 10
0 1 10
0 0 10
0 0 00
Alice Bob
$3
millions
$2
millions
f(A, B) = (A > B)
k1
k2
k3
k4
1 out of 4 OT (Oblivious Transfer)
Alice does not know B=2, Bob does not know kj (j≠B)
Basic Idea of GC
1 1 10
0 1 10
0 0 10
0 0 00
Alice Bob
$3
millions
$2
millions
f(A, B) = (A > B)
k2
Open
Basic Idea of OT
Alice (Sender) Bob (Receiver)
Has secrets Want to know xb where b ∈ {0,1}
Bob does not know x0Alice does not know b
0 b=1
0 1
x0 x1
x0 x1
0 b=1
x0
x1
Bob이 열쇠 두 개를
다 가지고 있다면?
More Secure OT
Alice (Sender) Bob (Receiver)
• G: cyclic group where
DH problem is hard
• g: generator of G
Pick C ∈R G C
Has secrets, x0 and x1 Want to know x1 (let b = 1)
Pick a ∈R [0..|G|-1]
h1 = ga, h0 = C∙h1
-1
h0, h1
Check h0h1 = C
Pick r0, r1 ∈R G
c0 = H(h0
r0) ⊕ x0
c1 = H(h1
r1) ⊕ x1
gr0, gr1, c0, c1
Compute x1 = c1 ⊕ H((gr1)a)
Bob cannot compute x0Alice does not know b
Circuit: Multiple Gates
1 2 3 4
1
2
3
4
BA
1 1 10
0 1 10
0 0 10
0 0 00
Alice Bob
$3
millions
$2
millions
f(A, B)
0 1
0
1
00
10
Domains of A, B
are very small
Generally, …
Gate
Fairplay (2004)
Alice Bob
A =
10 of
16-bit
numbers
(sorted)
B =
10 of
16-bit
numbers
(sorted)
f(A, B)
= median(A ∪ B)
4383 Gates,
7 seconds
(over LAN)
Basic Idea of GMW: Secret Sharing
G
wi wj
wk
x y
Alice Bob
x y
1) ⊕	secret sharing: (xi ⊕ ri) ⊕ ri = xi
∴	= xi ⊕ (ri ⊕ ri) = xi ⊕ zero = xi
si
1 = x ⊕ r
si
2 = r
⊕	secret sharing of x,
P1’s secret1)
r ∈R {0,1}
è sj
2 = y ⊕ q
sj
1 = q
⊕	secret sharing of y,
P2’s secret
ç
q ∈R {0,1}Alice’s
knowledge
Bob’s
knowledge
Basic Idea of GMW: Gate Evaluation
XOR1)
wi wj
wk
x y
si
1
si
2 sj
2
sj
1
NOT
wi
wk
x
si
1
si
2
Alice’s knowledge
Bob’s knowledge
AND
wi wj
wk
x y
si
1
si
2 sj
2
sj
1
without any interaction
sk
1 = ¬	si
1
sk
2 = si
2
sk
1 = si
1 ⊕ sj
1
sk
2 = si
2 ⊕ sj
2
1) sk
1 ⊕ sk
2 = (si
1 ⊕ sj
1) ⊕ (si
2 ⊕ sj
2) = (si
1 ⊕ si
2) ⊕ (sj
1 ⊕ sj
2) = x ⊕ y
use 1-out-of-4 OT
1-out-of-4 OT
Alice’s knowledge
Bob’s knowledge
Alice’s knowledge
Bob’s knowledge
Alice’s knowledge
Bob’s knowledge
Alice’s knowledge
Bob’s knowledge
BGW: Shamir’s Secret Sharing
f(x) = a*x + S (random a)
S = 3
Sa
= (1, f(1))
Sb
= (2, f(2))
Sc
= (3, f(3))
[2,3]-SS: Two of three
can jointly find f(x) and S.
BGW: Shamir’s Secret Sharing
f(x) = x2 + x * 4 - 3 f(x) = x3 * 0.02 + x2 * 0.05 + x * 1 - 3
S = 3
S = 3
Sa
= (1, f(1))
Sb
= (2, f(2))
Sc
= (3, f(3))
[3,4]-SS: Three of four
can jointly find f(x) and S.
Sd
= (4, f(4))
[4,5]-SS: Four of five
can jointly find f(x) and S.
Secure Addition: Voting
1
1
0
Generate Shares Secret-share&Compute
4
-2
-2
-2
1
2
2
-4
3
Send&Compute
Sum
2
Sum
2
Sum
2
2 -2 1
3 -4 2
4 -2 -2
1 = 2 + (-2) + 1
1 = 3 + (-4) + 2
0 = 4 + (-2) + (-2)
Alice
Bob
Carol
S2b
S2b
S1c
S1c
S3a
S3a
Sum
S2b=-8
Sum
S3a=1
Sum
S1c=9
S2b
S1c
S3a
xi = 1 (agree) or 0 (disagree)
Secure Addition: Voting
1
1
0
Generate Shares Secret-share&Compute
4
-2
-2
-2
1
2
2
-4
3
Send&Compute
Sum
1
Sum
1
Sum
1
2 -2 1
3 -4 2
4 -2 -2
1 = 2 + (-2) + 1
1 = 3 + (-4) + 2
0 = 4 + (-2) + (-2)
Alice
Bob
Carol
S2b
S2b
S1c
S1c
S3a
S3a
Sum
S2b=-8
Sum
S3a=1
Sum
S1c=9 è 8 (cheat!)
S2b
S1c
S3a
xi = 1 (agree) or 0 (disagree)
Secure and Verifiable Addition: Voting
1
1
0
Generate Shares Secret-share&Compute
4
-2
-2
-2
1
2
2
-4
3
Send&Compute
Sum
2
Sum
2
Sum
2
2 -2 1
3 -4 2
4 -2 -2
1 = 2 + (-2) + 1
1 = 3 + (-4) + 2
0 = 4 + (-2) + (-2)
Alice
Bob
Carol
S2b
S2b
S1c
S1c
S3a
S3a
Sum
S2b=-8
Sum
S3a=1
Sum
S1c=9
S2b
S1c
S3a
-2
-2
4
1
2
-2
3
2
-4
Sum
S3b=1
Sum
S1a=9
Sum
S2c=-8
S3b
S3b
S3b
S2c
S2c
S2c
S1a
S1a
S1a
Verify
Verify
Verify
xi = 1 (agree) or 0 (disagree)
Secure Multiplication: Dating
A = 1
B = 1
Generate Shares
Secret-Share
&Compute
Send&Compute
B1 B3
B1 B2
B2 B3
A2 A3
A1 A2
A1 A3
B1 B2 B3
A1 A2 A3
B = B1+B2+B3
A = A1+A2+A3
Sb
= A2*B2+A2*B3+A3*B2
Sa
= A3*B3+A1*B3+A3*B1
Sc
= A1*B1+A1*B2+A2*B1
Secure
Addition
of
Sb, Sa, Sc
A * B
= 1
Alice
Bob
Carol
xi = 1 (interest) or 0 (not interest)
Performance Improvement
2-party AES Encryption Benchmarking
1 E+01
1 E+02
1 E+03
1 E+04
1 E+05
1 E+06
1 E+07
1 E+08
1 E+09
1 E+10
2011 2013 2015 2017
Throughput(bytes/sec)
Clear
MPC
Our Project
Typical Setup with Key
•Single point of failure
•Not recoverable
Private Key
Keyless Setup with Custody
Custody
•No single point of failure
- Threshold Signature (2,3)1)
•Recoverable
Shares
1) Any 2 shares of 3 can restore the associated private key or sign transactions
Knowledge Discovery Function:
ECDSA (Elliptic Curve Digital Signing Algorithm)
Privacy-preserving
Learning/Prediction/Testing

More Related Content

What's hot

1 4 homework
1 4 homework1 4 homework
1 4 homework
math123b
 
March 13, 2015
March 13, 2015March 13, 2015
March 13, 2015
khyps13
 
Day 3 subtracting polynomials
Day 3 subtracting polynomialsDay 3 subtracting polynomials
Day 3 subtracting polynomials
Erik Tjersland
 
09 Trial Penang S1
09 Trial Penang S109 Trial Penang S1
09 Trial Penang S1
guest9442c5
 
สมการเชิงเส้นตัวแปรเดียว
สมการเชิงเส้นตัวแปรเดียวสมการเชิงเส้นตัวแปรเดียว
สมการเชิงเส้นตัวแปรเดียว
Destiny Nooppynuchy
 

What's hot (19)

C6 6.6
C6 6.6C6 6.6
C6 6.6
 
1 4 homework
1 4 homework1 4 homework
1 4 homework
 
Tricky log graphs
Tricky log graphsTricky log graphs
Tricky log graphs
 
Sketching parabolas
Sketching parabolasSketching parabolas
Sketching parabolas
 
March 13, 2015
March 13, 2015March 13, 2015
March 13, 2015
 
Combined operation
Combined operationCombined operation
Combined operation
 
SPECIAL PRODUCTS
SPECIAL PRODUCTSSPECIAL PRODUCTS
SPECIAL PRODUCTS
 
C6 6.5
C6 6.5C6 6.5
C6 6.5
 
Writing quadratic equation
Writing quadratic equationWriting quadratic equation
Writing quadratic equation
 
Day 3 subtracting polynomials
Day 3 subtracting polynomialsDay 3 subtracting polynomials
Day 3 subtracting polynomials
 
E3 f1 bộ binh
E3 f1 bộ binhE3 f1 bộ binh
E3 f1 bộ binh
 
drill
drilldrill
drill
 
Ejercicios resueltos
Ejercicios resueltosEjercicios resueltos
Ejercicios resueltos
 
09 Trial Penang S1
09 Trial Penang S109 Trial Penang S1
09 Trial Penang S1
 
Squaring a binomial
Squaring a binomialSquaring a binomial
Squaring a binomial
 
Exponential and logarithmic graphs
Exponential and logarithmic graphsExponential and logarithmic graphs
Exponential and logarithmic graphs
 
Special Products Tutorial
Special Products TutorialSpecial Products Tutorial
Special Products Tutorial
 
สมการเชิงเส้นตัวแปรเดียว
สมการเชิงเส้นตัวแปรเดียวสมการเชิงเส้นตัวแปรเดียว
สมการเชิงเส้นตัวแปรเดียว
 
Divisors quotients and remainders
Divisors quotients and remaindersDivisors quotients and remainders
Divisors quotients and remainders
 

Similar to [ETHCon Korea 2019] Bae kyungil 배경일

Demystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptxDemystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptx
RedWhite12
 
2 Combinational Logic Circuit 01
2 Combinational Logic Circuit 012 Combinational Logic Circuit 01
2 Combinational Logic Circuit 01
guestde204e
 

Similar to [ETHCon Korea 2019] Bae kyungil 배경일 (16)

Demystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptxDemystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptx
 
2 Combinational Logic Circuit 01
2 Combinational Logic Circuit 012 Combinational Logic Circuit 01
2 Combinational Logic Circuit 01
 
Crypto Economics @ Pantalks 24. April 2018
Crypto Economics @ Pantalks 24. April 2018Crypto Economics @ Pantalks 24. April 2018
Crypto Economics @ Pantalks 24. April 2018
 
Enforcing Web security and privacy with zero-knowledge protocols
Enforcing Web security and privacy with zero-knowledge protocolsEnforcing Web security and privacy with zero-knowledge protocols
Enforcing Web security and privacy with zero-knowledge protocols
 
Elliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proofElliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proof
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
M3 PPT 22ESC143.docx
M3 PPT 22ESC143.docxM3 PPT 22ESC143.docx
M3 PPT 22ESC143.docx
 
M3 PPT 22ESC143.docx
M3 PPT 22ESC143.docxM3 PPT 22ESC143.docx
M3 PPT 22ESC143.docx
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
 
Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!
 
Proofs of Work
Proofs of WorkProofs of Work
Proofs of Work
 
Algebra formulas
Algebra formulasAlgebra formulas
Algebra formulas
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
 
Vedic Mathematics- 3x3 multiplication
Vedic Mathematics- 3x3 multiplicationVedic Mathematics- 3x3 multiplication
Vedic Mathematics- 3x3 multiplication
 
數學是否能擊敗金融市場? 從控制理論觀點
數學是否能擊敗金融市場? 從控制理論觀點數學是否能擊敗金融市場? 從控制理論觀點
數學是否能擊敗金融市場? 從控制理論觀點
 
Introduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve Cryptography
 

More from ethconkr

More from ethconkr (20)

[ETHCon Korea 2019] Jang Byeongkook 장병국
[ETHCon Korea 2019] Jang Byeongkook 장병국[ETHCon Korea 2019] Jang Byeongkook 장병국
[ETHCon Korea 2019] Jang Byeongkook 장병국
 
[ETHCon Korea 2019] Jason lee 이진호
[ETHCon Korea 2019] Jason lee 이진호[ETHCon Korea 2019] Jason lee 이진호
[ETHCon Korea 2019] Jason lee 이진호
 
[ETHCon Korea 2019] Kim Taekgyun 김택균
[ETHCon Korea 2019] Kim Taekgyun 김택균[ETHCon Korea 2019] Kim Taekgyun 김택균
[ETHCon Korea 2019] Kim Taekgyun 김택균
 
[ETHCon Korea 2019] Kang Hyungseok 강형석
[ETHCon Korea 2019] Kang Hyungseok 강형석[ETHCon Korea 2019] Kang Hyungseok 강형석
[ETHCon Korea 2019] Kang Hyungseok 강형석
 
[ETHCon Korea 2019] Lim Dohyung 임도형
[ETHCon Korea 2019] Lim Dohyung 임도형[ETHCon Korea 2019] Lim Dohyung 임도형
[ETHCon Korea 2019] Lim Dohyung 임도형
 
[ETHCon Korea 2019] Seo Gijoon 서기준
[ETHCon Korea 2019] Seo Gijoon 서기준[ETHCon Korea 2019] Seo Gijoon 서기준
[ETHCon Korea 2019] Seo Gijoon 서기준
 
[ETHCon Korea 2019] Kim hyojun 김효준
[ETHCon Korea 2019] Kim hyojun 김효준[ETHCon Korea 2019] Kim hyojun 김효준
[ETHCon Korea 2019] Kim hyojun 김효준
 
[ETHCon Korea 2019] Park Chanhyun 박찬현
[ETHCon Korea 2019] Park Chanhyun 박찬현[ETHCon Korea 2019] Park Chanhyun 박찬현
[ETHCon Korea 2019] Park Chanhyun 박찬현
 
[ETHCon Korea 2019] Cha Seounghun 차승훈
[ETHCon Korea 2019] Cha Seounghun 차승훈[ETHCon Korea 2019] Cha Seounghun 차승훈
[ETHCon Korea 2019] Cha Seounghun 차승훈
 
[ETHCon Korea 2019] Aiden Park 박정원
[ETHCon Korea 2019] Aiden Park 박정원[ETHCon Korea 2019] Aiden Park 박정원
[ETHCon Korea 2019] Aiden Park 박정원
 
[ETHCon Korea 2019] Park Sieun 박시은
[ETHCon Korea 2019] Park Sieun 박시은[ETHCon Korea 2019] Park Sieun 박시은
[ETHCon Korea 2019] Park Sieun 박시은
 
[ETHCon Korea 2019] Hong taeoh 홍태오
[ETHCon Korea 2019] Hong taeoh 홍태오[ETHCon Korea 2019] Hong taeoh 홍태오
[ETHCon Korea 2019] Hong taeoh 홍태오
 
[ETHCon Korea 2019] Hyun sooyoung 현수영
[ETHCon Korea 2019] Hyun sooyoung 현수영[ETHCon Korea 2019] Hyun sooyoung 현수영
[ETHCon Korea 2019] Hyun sooyoung 현수영
 
[ETHCon Korea 2019] Choi jihyuk 최지혁
[ETHCon Korea 2019] Choi jihyuk 최지혁[ETHCon Korea 2019] Choi jihyuk 최지혁
[ETHCon Korea 2019] Choi jihyuk 최지혁
 
[ETHCon Korea 2019] Choi yunsung 최윤성
[ETHCon Korea 2019] Choi yunsung 최윤성[ETHCon Korea 2019] Choi yunsung 최윤성
[ETHCon Korea 2019] Choi yunsung 최윤성
 
[ETHCon Korea 2019] Jung woohyun 정우현
[ETHCon Korea 2019] Jung woohyun 정우현[ETHCon Korea 2019] Jung woohyun 정우현
[ETHCon Korea 2019] Jung woohyun 정우현
 
[ETHCon Korea 2019] Jung soonhyung 정순형
[ETHCon Korea 2019] Jung soonhyung 정순형[ETHCon Korea 2019] Jung soonhyung 정순형
[ETHCon Korea 2019] Jung soonhyung 정순형
 
[ETHCon Korea 2019] Jang jinho 장진호
[ETHCon Korea 2019] Jang jinho 장진호[ETHCon Korea 2019] Jang jinho 장진호
[ETHCon Korea 2019] Jang jinho 장진호
 
[ETHCon Korea 2019] Jang jaehyuk 장재혁
[ETHCon Korea 2019] Jang jaehyuk 장재혁[ETHCon Korea 2019] Jang jaehyuk 장재혁
[ETHCon Korea 2019] Jang jaehyuk 장재혁
 
[ETHCon Korea 2019] Lim wanseob 임완섭
[ETHCon Korea 2019] Lim wanseob 임완섭[ETHCon Korea 2019] Lim wanseob 임완섭
[ETHCon Korea 2019] Lim wanseob 임완섭
 

Recently uploaded

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 

Recently uploaded (20)

%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 

[ETHCon Korea 2019] Bae kyungil 배경일

  • 1. Secure Multi-party Computation Deep Dive Knowledge Discovery without Sharing Data Kyoungil Bae, Ph.D
  • 2. Data Privacy Data as Liability “control over users’ data and digital possessions and activity is rapidly moving from an asset to a liability.” - Vitalik Buterin, 2019 “Data is a toxic asset” - Bruce Schneier, 2016 Self-sovereignty “You are the product of Facebook” - John Lanchester, 2017 “Cambridge Analytica illicitly procured the data of 50 million Facebook users” - Todd Spangler, 2018 “일부 ‘지식인’ 들의 고집으로 전 국민을 피곤하게 만드는거 아닐까? 지금이 편하고 좋은데 …”
  • 3. Data Sharing • Genome analytics • Government policy making • Smart city – public safety • and Blockchain
  • 4. Knowledge Discovery Without Data Sharing f(xa, xb, xc) - Privacy-preserving - Verifiable output Alice Bob Carol Xa Xb Xc Secure MPC Trusted Computing between Trustless Parties
  • 5. Inventors Andrew Yao, Millionaires’ Problem1982 Andrew Yao’s GC (Garbled Circuits)1986 GMW (Goldreich-Micali-Wigderson) Protocol1987 BGW (Ben-Or, Goldwasser, Wigderson) Protocol, CCD (Chaum, Crépeau, Damgård) Protocol1988 China Physics Computer Science Israel Computer Science Italia Computer Science Israel Computer Science Israel Mathematics U.S (Israeli) Computer Science (Mathematics) Israel Computer Science U.S Computer Science Denmark Mathematics Canada Computer Science
  • 6. Generic Secure MPC Boolean Circuit Arithmetic Circuit Yao’ GC GMW BGW (CCD) 2 Party Constant Round Multi-party Secret Sharing Multi-party Shamir Secret Sharing Honest majority
  • 7. Building Knowledge Discovery Functions Boolean Circuit Arithmetic Circuit Gates Example XOR AND NOT Addition Multiplication Adder 4-bit Parallel Adder Xa XbXc × + Output f(xa, xb, xc) = xa + xb × xc
  • 8. Comparison (A > B) A B NOT AND (A>B) A B ¬B A ⋀ ¬B 0 0 1 0 0 1 0 0 1 0 1 1 1 1 0 0
  • 9. Alice Bob $A millions $B millions f(A, B) = (A > B) B-2 B-1 B B+1 B+2 B+3 B+4 B-2 B-1 B B+1 B+2 = A B+3 B+4 X OTRUE FALSEResult X X X X O O O Millionaires’ Problem for Dummies B-2 B-1 B B+1 B+2 = A B+3 B+4 X X X X O O O
  • 10. Basic Idea of GC (Garbled Circuit) 1 2 3 4 1 2 3 4 BA 1 1 10 0 1 10 0 0 10 0 0 00 Alice Bob $3 millions $2 millions f(A, B) = (A > B) k1 k2 k3 k4 Permutation (Garbling)
  • 11. Basic Idea of GC (Garbled Circuit) 1 1 10 0 1 10 0 0 10 0 0 00 Alice Bob $3 millions $2 millions f(A, B) = (A > B) k1 k2 k3 k4 1 out of 4 OT (Oblivious Transfer) Alice does not know B=2, Bob does not know kj (j≠B)
  • 12. Basic Idea of GC 1 1 10 0 1 10 0 0 10 0 0 00 Alice Bob $3 millions $2 millions f(A, B) = (A > B) k2 Open
  • 13. Basic Idea of OT Alice (Sender) Bob (Receiver) Has secrets Want to know xb where b ∈ {0,1} Bob does not know x0Alice does not know b 0 b=1 0 1 x0 x1 x0 x1 0 b=1 x0 x1 Bob이 열쇠 두 개를 다 가지고 있다면?
  • 14. More Secure OT Alice (Sender) Bob (Receiver) • G: cyclic group where DH problem is hard • g: generator of G Pick C ∈R G C Has secrets, x0 and x1 Want to know x1 (let b = 1) Pick a ∈R [0..|G|-1] h1 = ga, h0 = C∙h1 -1 h0, h1 Check h0h1 = C Pick r0, r1 ∈R G c0 = H(h0 r0) ⊕ x0 c1 = H(h1 r1) ⊕ x1 gr0, gr1, c0, c1 Compute x1 = c1 ⊕ H((gr1)a) Bob cannot compute x0Alice does not know b
  • 15. Circuit: Multiple Gates 1 2 3 4 1 2 3 4 BA 1 1 10 0 1 10 0 0 10 0 0 00 Alice Bob $3 millions $2 millions f(A, B) 0 1 0 1 00 10 Domains of A, B are very small Generally, … Gate
  • 16. Fairplay (2004) Alice Bob A = 10 of 16-bit numbers (sorted) B = 10 of 16-bit numbers (sorted) f(A, B) = median(A ∪ B) 4383 Gates, 7 seconds (over LAN)
  • 17. Basic Idea of GMW: Secret Sharing G wi wj wk x y Alice Bob x y 1) ⊕ secret sharing: (xi ⊕ ri) ⊕ ri = xi ∴ = xi ⊕ (ri ⊕ ri) = xi ⊕ zero = xi si 1 = x ⊕ r si 2 = r ⊕ secret sharing of x, P1’s secret1) r ∈R {0,1} è sj 2 = y ⊕ q sj 1 = q ⊕ secret sharing of y, P2’s secret ç q ∈R {0,1}Alice’s knowledge Bob’s knowledge
  • 18. Basic Idea of GMW: Gate Evaluation XOR1) wi wj wk x y si 1 si 2 sj 2 sj 1 NOT wi wk x si 1 si 2 Alice’s knowledge Bob’s knowledge AND wi wj wk x y si 1 si 2 sj 2 sj 1 without any interaction sk 1 = ¬ si 1 sk 2 = si 2 sk 1 = si 1 ⊕ sj 1 sk 2 = si 2 ⊕ sj 2 1) sk 1 ⊕ sk 2 = (si 1 ⊕ sj 1) ⊕ (si 2 ⊕ sj 2) = (si 1 ⊕ si 2) ⊕ (sj 1 ⊕ sj 2) = x ⊕ y use 1-out-of-4 OT 1-out-of-4 OT Alice’s knowledge Bob’s knowledge Alice’s knowledge Bob’s knowledge Alice’s knowledge Bob’s knowledge Alice’s knowledge Bob’s knowledge
  • 19. BGW: Shamir’s Secret Sharing f(x) = a*x + S (random a) S = 3 Sa = (1, f(1)) Sb = (2, f(2)) Sc = (3, f(3)) [2,3]-SS: Two of three can jointly find f(x) and S.
  • 20. BGW: Shamir’s Secret Sharing f(x) = x2 + x * 4 - 3 f(x) = x3 * 0.02 + x2 * 0.05 + x * 1 - 3 S = 3 S = 3 Sa = (1, f(1)) Sb = (2, f(2)) Sc = (3, f(3)) [3,4]-SS: Three of four can jointly find f(x) and S. Sd = (4, f(4)) [4,5]-SS: Four of five can jointly find f(x) and S.
  • 21. Secure Addition: Voting 1 1 0 Generate Shares Secret-share&Compute 4 -2 -2 -2 1 2 2 -4 3 Send&Compute Sum 2 Sum 2 Sum 2 2 -2 1 3 -4 2 4 -2 -2 1 = 2 + (-2) + 1 1 = 3 + (-4) + 2 0 = 4 + (-2) + (-2) Alice Bob Carol S2b S2b S1c S1c S3a S3a Sum S2b=-8 Sum S3a=1 Sum S1c=9 S2b S1c S3a xi = 1 (agree) or 0 (disagree)
  • 22. Secure Addition: Voting 1 1 0 Generate Shares Secret-share&Compute 4 -2 -2 -2 1 2 2 -4 3 Send&Compute Sum 1 Sum 1 Sum 1 2 -2 1 3 -4 2 4 -2 -2 1 = 2 + (-2) + 1 1 = 3 + (-4) + 2 0 = 4 + (-2) + (-2) Alice Bob Carol S2b S2b S1c S1c S3a S3a Sum S2b=-8 Sum S3a=1 Sum S1c=9 è 8 (cheat!) S2b S1c S3a xi = 1 (agree) or 0 (disagree)
  • 23. Secure and Verifiable Addition: Voting 1 1 0 Generate Shares Secret-share&Compute 4 -2 -2 -2 1 2 2 -4 3 Send&Compute Sum 2 Sum 2 Sum 2 2 -2 1 3 -4 2 4 -2 -2 1 = 2 + (-2) + 1 1 = 3 + (-4) + 2 0 = 4 + (-2) + (-2) Alice Bob Carol S2b S2b S1c S1c S3a S3a Sum S2b=-8 Sum S3a=1 Sum S1c=9 S2b S1c S3a -2 -2 4 1 2 -2 3 2 -4 Sum S3b=1 Sum S1a=9 Sum S2c=-8 S3b S3b S3b S2c S2c S2c S1a S1a S1a Verify Verify Verify xi = 1 (agree) or 0 (disagree)
  • 24. Secure Multiplication: Dating A = 1 B = 1 Generate Shares Secret-Share &Compute Send&Compute B1 B3 B1 B2 B2 B3 A2 A3 A1 A2 A1 A3 B1 B2 B3 A1 A2 A3 B = B1+B2+B3 A = A1+A2+A3 Sb = A2*B2+A2*B3+A3*B2 Sa = A3*B3+A1*B3+A3*B1 Sc = A1*B1+A1*B2+A2*B1 Secure Addition of Sb, Sa, Sc A * B = 1 Alice Bob Carol xi = 1 (interest) or 0 (not interest)
  • 25. Performance Improvement 2-party AES Encryption Benchmarking 1 E+01 1 E+02 1 E+03 1 E+04 1 E+05 1 E+06 1 E+07 1 E+08 1 E+09 1 E+10 2011 2013 2015 2017 Throughput(bytes/sec) Clear MPC
  • 26. Our Project Typical Setup with Key •Single point of failure •Not recoverable Private Key Keyless Setup with Custody Custody •No single point of failure - Threshold Signature (2,3)1) •Recoverable Shares 1) Any 2 shares of 3 can restore the associated private key or sign transactions Knowledge Discovery Function: ECDSA (Elliptic Curve Digital Signing Algorithm)
  • 27.