2. Challenge in this presentation
1. Persuade necessity of privacy and neutrality
2. Wrap up the technical components in Enigma
network
3. Reveal the value which Enigma Protocol brings
5. <Privacy Problem>
People are losing control over their own data
Kept with lawfulness,
fairness and
transparency?
Utilized within limited
purpose?
Data collection is
minimised?
Updated at proper
moments and strictly
correct?
Freed after storage
time limit?
Stored under secured
environment?
6. ◦ To get back control over what you’ve share ...
<The Nature of Privacy Problem>
Different from physical stuffs, sharing data is irreversible action
How to prove
non-compromised?
How to prove
deletion?
Pass and...
Just ask to give back
Pass and...
Incaseofphysical
stuffs
Incaseofdata
Almost impossible to prove what
is going on behind the system
7. ◦ To achieve something commercially or politically, service providers
might get rid of data that is inconvenient to them.
◦ E.g.
▫ Recommendation Engine
▫ Script about:
■ History
■ Process
■ Definition
▫ Price signals
◦ As more people depend on
data service like AI, its impact
increases.
<Neutrality Problem>
No chance to know what’re the ingredients of the service
Hence exposed to information bias
To achieve fairness is difficult.
Even companies can’t eat bitter veges
like boys.
8. Index
◦ Problems amongst Privacy and Neutrality
◦ Privacy-Preserving Computation
Infrastructure "Enigma"
◦ Enigma's Future
9. ★Enigma in sMPC mode
<Enigma’s natural value>
Enigma keeps data provider’s control over their own data while letting
the data be utilized
Enigma Network
許可 許可
Secret contract brings
transparency of process
Raw Data
Data fragments are
distributed to multiple
nodes evenly (SSS)
Can’t reconstruct raw data w/o
each data provider’s private key
Contract can’t do
computation on data w/o
permission
10. ★Additive/Multiplicative Homomorphism = Functional Completeness
<Enigma’s feature>
Raw data never appears on any node during computation even once.
Combination of SSS and SHE computation breaks this contradiction.
Computation on Enigma in sMPC mode
E.g. plain amounting
Result can be
reconstructed in
plain text
11. ★Reliability of Trusted Execution Environment(TEE) is depending on
sanity of CPU’s vendor, much better performance than sMPC though.
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Attest Genuine
Intel CPU + DH
Key Exchange
SGX module is
anti-tampering
12. ★Reliability of Trusted Execution Environment(TEE) is depending on
sanity of CPU’s vendor, much better performance than sMPC though.
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Special memory allocation (enclave)
that can be read only by SGX module.
Encrypted by common key
that is exchanged through DH
13. ★ Secret contract execution with data and
Other’s data stored
in Enclave
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Attest Genuine
Intel CPU + DH
Key Exchange
14. ★ Secret contract execution with data and
Dec
Dec
Re-re-encrypted
data in Enclave
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Re-encrypted by common key
that is exchanged through DH
15. ★ Secret contract execution with data and
Dec & Run
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Result
17. Improve conventional schemes [ 1 to 10 ] Brand new schemes < 0 to 1 >
Replace conventional schemes and keep
privacy and neutrality safe
Schemes that were infeasible before Enigma
era
<Enigma’s solutions>
[ 1 to 10 ] and [ 0 to 1 ] by Enigma
Voting, Auction
Credit scoring, ID
Hedge fund,
Price signals
………
Information bank infrastructure
* Infrastucture for conventional personal data
exchange and data brokers where incentive
system is add-on by default
See the next slide
18. ★Payment condition can be defined by contracts.
E.g. paid by each usage of built service to which data has contributed
Contribute
Re-usable result might be
sold as well
E.g. Index, Folded value,
Transfer leaning model,
Clustered data, e.t.c
Same class
data providers
<Enigma Data Marketplace (Infrastructure of Data Bank>
Data provision might be a new pipeline of income for general people.
Incentivization might gather more quantity and variety of data
Contract distributes
reward to each data
provider from deposit
19. < Enigma’s issues >
Enigma holds foreseeable issues.
Research might be required to solve them.
Technical issues Political issues
1. Few can read secret contract
Conversion from secret contract to natural
language expression might be helpful to bring
equity amongst people.
2. Some expression in contract must be
banned
Because sMPC’s result is plain text.
3. Performance problem with sMPC
Especially multiplication (inconstant)
1. Loss of methods to detect anti-social
organization
Without central administrator, government
can’t pull out anti-social organization’s data
forcibly. I suggest ERC792 might be a way to
solve this. Voting on whether reveal a specific
data or not amongst node runners.
2. Strongly depending on marketing
technologies already
At the sacrifice of privacy, modern marketing
tools have developed and web business
depends on it strongly.
To catch up this scene, tools on Enigma must
do an extra effort.
trans