SlideShare a Scribd company logo
Introduction multiparty computation
Cryptography for secure computation
⮚ Traditional Solution: Decrypt data and process it; extended trust to all collaborating parties.
⮚ Cryptography can however be used securely (and correctly) perform data perform processing and, minimize trust
assumptions.
PPT: Privacy Preserving
Technology
Scenario: doing statistics on big data.
• Machine Learning Technologies have increased the utility of data
• But we would like to process it while preserving privacy of data sources
Privacy preserving technologies
• To provide input privacy: protect against access to sources private input data.
• To provide output privacy: protect from adversaries reverse engineering sources private input data from
statistical inputs
Output privacy protection: differential privacy
Most popular technique: differential privacy
• Mathematical (not cryptographic) technique to protect against reconstructing (private) input data from output data.
•Main idea add noise in a careful, way so that one can carefully select a trade-off between privacy and utility of data.
Via the notion of k anonymity.
• Used in the wild, e.g. Apple to collect usage statistics, US Census Bureau, etc
• Ps: the input privacy techniques we discuss next typically don’t provide output privacy protection.
• i.e.. differential privacy may need to be used on conjunction, to provide input/output privacy
Input privacy
protection
The main cryptographic, techniques to provide input privacy
• Secure Multi-Party Computation (MPC)
• Homomorphic Encryption (HE)
• Zero-Knowledge Proofs (ZKP)
Multi-Party Computation (MPC)
MPC: Cryptographic protocols that allow the secure computation of a function with multiple
inputs
• Parties p1, p2, p n
• Each pi has a private input xi
• Parties wish to jointly compute F (X1, x2,…., xn)
• Secure parties want to perform this computation privately and securely
• Security parties want to perform this computation privately and correctly
• psI: there are other security requirements.
• Ps2: a dedicated security paradigm is used to prove security of MPC protocols
MPC: How it
started
• 2nd Party protocol introduced by Yao in 1986
• Multiparty cases by Goldreich, Micali and Wigderson in 1987
• One can show that any function is computable securely via MPC
Main tools:
• Yao’s Grabbled Circuits
• Shamir Secret Sharing
• Theoretical aspects have been known for 3 decades .. Main problem was efficiency.
MPC: how is it
going?
• After 2-3 decades of research , MPC is a mature cryptographic technique.
• Overheads are now acceptable for several applications
• Although one can use general purpose MPC protocols for any computation, specific functions (e.g. private set intersection) very
efficient protocol now exist.
• Many real world applications
More MPC
Examples
• Private auction several parties want to execute a private auction
• Highest bid winners and only their bid is revealed to the other parties
• Traditional solution use a trusted, auctioneer
• MPC solution replaces trusted auctioneer by an MPC protocol
Private intersection two organisations hold proprietary databases
They would like to find out the intersection and any other information must remain
private
Traditional solution use a third-party
More & more (MPC)
applications
• Several other practical applications
• threshold cryptography
• digital asset custody
• privacy preserving database (private queries, e.g. Jana DB)
• Information sharing and collaborative statistics
• secure analysis (e.g. Sharemind)
• private marketplace
Multi-Party Computation (MPC)
Other aspects of the protocol to be considered
include:
• functionality
• adversarial model
• communication model
Private Set
Intersection
• Private set intersection protocols are now very efficient
• Wide range of real-world applications:
• Collaboration between parties who do not trust each other
• Mobile phone applications
• Financial crime fighting
Homomorphic Encryption
• Not protocols, primitives providing an attractive functionally: we can process ciphertext that will decrypt into processed plaintext (see
‘homomorphism’ in mathematics
• Does not require interaction between parties- processing is on the ciphertext
• Adversarial model is tricker than (MPC)
• Not very efficient
• Main current application: privacy preserving machine learning
Zero-knowledge
proofs
• Protocols that allow computation of a proof of some statement in a correct, sound and private manner
• Can be interactive or non-interactive
• Complex implementations and proofs of security
• Main current application: privacy preserving blockchain applications
• More generally (ZKP) could provide a secure auditing mechanism, but probably not efficient enough
• A lot of ZNP research and development is in the blockchain arena ... Because of high incentives
Secure Computation: the
future
• Research deployment and deployment of privacy preserving technologies will continue to
grow.
• Acceptance is growing
• Solutions are becoming more efficient
• Range of application is growing
Interesting research problem:
• Quantum setting: different adversarial and computational models

More Related Content

Similar to Introduction multiparty computation

Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
Security Innovation
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
acijjournal
 
Lesson 2
Lesson 2Lesson 2
Oral.pptx
Oral.pptxOral.pptx
Oral.pptx
Sasal6
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
Mphasis
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
PECB
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
Namit Sinha
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
IJERA Editor
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
Ulf Mattsson
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
Shantanu Sharma
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
sabin kafle
 
Is Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionIs Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar Question
Security Innovation
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
IJMER
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
Len Bass
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
Jyotika Pandey
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paper
Hemanth
 

Similar to Introduction multiparty computation (20)

Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptx
 
cryptography
cryptographycryptography
cryptography
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
 
Is Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionIs Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar Question
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Ccc brochure
Ccc brochureCcc brochure
Ccc brochure
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paper
 

More from The Cryptography Centre For Excellence

Non-Fungible Token (NFT).pptx
Non-Fungible Token (NFT).pptxNon-Fungible Token (NFT).pptx
Non-Fungible Token (NFT).pptx
The Cryptography Centre For Excellence
 
Cryptography is all we can trust
Cryptography is all we can trustCryptography is all we can trust
Cryptography is all we can trust
The Cryptography Centre For Excellence
 
Joe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum CryptographyJoe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum Cryptography
The Cryptography Centre For Excellence
 
fips140-3compliance
fips140-3compliancefips140-3compliance
Exemplar of Cryptography Vulnerabilities
Exemplar of Cryptography VulnerabilitiesExemplar of Cryptography Vulnerabilities
Exemplar of Cryptography Vulnerabilities
The Cryptography Centre For Excellence
 
Poor uses of cryptography
Poor uses of cryptographyPoor uses of cryptography
Poor uses of cryptography
The Cryptography Centre For Excellence
 
Quantum Cryptography
Quantum Cryptography  Quantum Cryptography
Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash SystemBitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System
The Cryptography Centre For Excellence
 
Bitcoins introduction
Bitcoins introduction Bitcoins introduction
Prepare For Post-Quantum Cryptography
Prepare For Post-Quantum CryptographyPrepare For Post-Quantum Cryptography
Prepare For Post-Quantum Cryptography
The Cryptography Centre For Excellence
 
Cryptography Inventory
 Cryptography Inventory Cryptography Inventory

More from The Cryptography Centre For Excellence (13)

Non-Fungible Token (NFT).pptx
Non-Fungible Token (NFT).pptxNon-Fungible Token (NFT).pptx
Non-Fungible Token (NFT).pptx
 
Cryptography is all we can trust
Cryptography is all we can trustCryptography is all we can trust
Cryptography is all we can trust
 
Joe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum CryptographyJoe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum Cryptography
 
fips140-3compliance
fips140-3compliancefips140-3compliance
fips140-3compliance
 
Exemplar of Cryptography Vulnerabilities
Exemplar of Cryptography VulnerabilitiesExemplar of Cryptography Vulnerabilities
Exemplar of Cryptography Vulnerabilities
 
Poor uses of cryptography
Poor uses of cryptographyPoor uses of cryptography
Poor uses of cryptography
 
Quantum Cryptography
Quantum Cryptography  Quantum Cryptography
Quantum Cryptography
 
Blockchain
BlockchainBlockchain
Blockchain
 
Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Introduction to bitcoin
 
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash SystemBitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System
 
Bitcoins introduction
Bitcoins introduction Bitcoins introduction
Bitcoins introduction
 
Prepare For Post-Quantum Cryptography
Prepare For Post-Quantum CryptographyPrepare For Post-Quantum Cryptography
Prepare For Post-Quantum Cryptography
 
Cryptography Inventory
 Cryptography Inventory Cryptography Inventory
Cryptography Inventory
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Introduction multiparty computation

  • 2. Cryptography for secure computation ⮚ Traditional Solution: Decrypt data and process it; extended trust to all collaborating parties. ⮚ Cryptography can however be used securely (and correctly) perform data perform processing and, minimize trust assumptions.
  • 3. PPT: Privacy Preserving Technology Scenario: doing statistics on big data. • Machine Learning Technologies have increased the utility of data • But we would like to process it while preserving privacy of data sources Privacy preserving technologies • To provide input privacy: protect against access to sources private input data. • To provide output privacy: protect from adversaries reverse engineering sources private input data from statistical inputs
  • 4. Output privacy protection: differential privacy Most popular technique: differential privacy • Mathematical (not cryptographic) technique to protect against reconstructing (private) input data from output data. •Main idea add noise in a careful, way so that one can carefully select a trade-off between privacy and utility of data. Via the notion of k anonymity. • Used in the wild, e.g. Apple to collect usage statistics, US Census Bureau, etc • Ps: the input privacy techniques we discuss next typically don’t provide output privacy protection. • i.e.. differential privacy may need to be used on conjunction, to provide input/output privacy
  • 5. Input privacy protection The main cryptographic, techniques to provide input privacy • Secure Multi-Party Computation (MPC) • Homomorphic Encryption (HE) • Zero-Knowledge Proofs (ZKP)
  • 6. Multi-Party Computation (MPC) MPC: Cryptographic protocols that allow the secure computation of a function with multiple inputs • Parties p1, p2, p n • Each pi has a private input xi • Parties wish to jointly compute F (X1, x2,…., xn) • Secure parties want to perform this computation privately and securely • Security parties want to perform this computation privately and correctly • psI: there are other security requirements. • Ps2: a dedicated security paradigm is used to prove security of MPC protocols
  • 7. MPC: How it started • 2nd Party protocol introduced by Yao in 1986 • Multiparty cases by Goldreich, Micali and Wigderson in 1987 • One can show that any function is computable securely via MPC Main tools: • Yao’s Grabbled Circuits • Shamir Secret Sharing • Theoretical aspects have been known for 3 decades .. Main problem was efficiency.
  • 8. MPC: how is it going? • After 2-3 decades of research , MPC is a mature cryptographic technique. • Overheads are now acceptable for several applications • Although one can use general purpose MPC protocols for any computation, specific functions (e.g. private set intersection) very efficient protocol now exist. • Many real world applications
  • 9. More MPC Examples • Private auction several parties want to execute a private auction • Highest bid winners and only their bid is revealed to the other parties • Traditional solution use a trusted, auctioneer • MPC solution replaces trusted auctioneer by an MPC protocol Private intersection two organisations hold proprietary databases They would like to find out the intersection and any other information must remain private Traditional solution use a third-party
  • 10. More & more (MPC) applications • Several other practical applications • threshold cryptography • digital asset custody • privacy preserving database (private queries, e.g. Jana DB) • Information sharing and collaborative statistics • secure analysis (e.g. Sharemind) • private marketplace
  • 11. Multi-Party Computation (MPC) Other aspects of the protocol to be considered include: • functionality • adversarial model • communication model
  • 12. Private Set Intersection • Private set intersection protocols are now very efficient • Wide range of real-world applications: • Collaboration between parties who do not trust each other • Mobile phone applications • Financial crime fighting
  • 13. Homomorphic Encryption • Not protocols, primitives providing an attractive functionally: we can process ciphertext that will decrypt into processed plaintext (see ‘homomorphism’ in mathematics • Does not require interaction between parties- processing is on the ciphertext • Adversarial model is tricker than (MPC) • Not very efficient • Main current application: privacy preserving machine learning
  • 14. Zero-knowledge proofs • Protocols that allow computation of a proof of some statement in a correct, sound and private manner • Can be interactive or non-interactive • Complex implementations and proofs of security • Main current application: privacy preserving blockchain applications • More generally (ZKP) could provide a secure auditing mechanism, but probably not efficient enough • A lot of ZNP research and development is in the blockchain arena ... Because of high incentives
  • 15. Secure Computation: the future • Research deployment and deployment of privacy preserving technologies will continue to grow. • Acceptance is growing • Solutions are becoming more efficient • Range of application is growing Interesting research problem: • Quantum setting: different adversarial and computational models