SlideShare a Scribd company logo
David Evans
University of Virginia
http://www.cs.virginia.edu/evans
http://MightBeEvil.com
Oregon Security Day
5 April 2013
(De)Motivating Application:
“Genetic Dating”
2
AliceBob
Genome Compatibility
Protocol
Your offspring will have
good immune systems!
Your offspring will have
good immune systems!
WARNING!
Don’t Reproduce
WARNING!
Don’t Reproduce
3
Cost to sequence human genome
Moore’s Law prediction
(halve every 18 months)
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
Aug2001
Feb2002
Aug2002
Feb2003
Aug2003
Feb2004
Aug2004
Feb2005
Aug2005
Feb2006
Aug2006
Feb2007
Aug2007
Feb2008
Aug2008
Feb2009
Aug2009
Feb2010
Aug2010
Feb2011
Aug2011
Feb2012
Aug2012
Feb2013
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
Aug2001
Feb2002
Aug2002
Feb2003
Aug2003
Feb2004
Aug2004
Feb2005
Aug2005
Feb2006
Aug2006
Feb2007
Aug2007
Feb2008
Aug2008
Feb2009
Aug2009
Feb2010
Aug2010
Feb2011
Aug2011
Feb2012
Aug2012
Feb2013
4
Cost to sequence human genome
Moore’s Law prediction
(halve every 18 months)
Ion torrent Personal Genome Machine
Human Genome Sequencing Using Unchained Base Reads on Self-Assembling DNA Nanoarrays. Radoje
Drmanac, Andrew B. Sparks, Matthew J. Callow, Aaron L. Halpern, Norman L. Burns, Bahram G. Kermani, Paolo
Carnevali, Igor Nazarenko, Geoffrey B. Nilsen, George Yeung, Fredrik Dahl, Andres Fernandez, Bryan Staker,
Krishna P. Pant, Jonathan Baccash, Adam P. Borcherding, Anushka Brownley, Ryan Cedeno, Linsu Chen, Dan
Chernikoff, Alex Cheung, Razvan Chirita, Benjamin Curson, Jessica C. Ebert, Coleen R. Hacker, Robert Hartlage,
Brian Hauser, Steve Huang, Yuan Jiang, Vitali Karpinchyk, Mark Koenig, Calvin Kong, Tom Landers, Catherine Le,
Jia Liu, Celeste E. McBride, Matt Morenzoni, Robert E. Morey, Karl Mutch, Helena Perazich, Kimberly Perry, Brock
A. Peters, Joe Peterson, Charit L. Pethiyagoda, Kaliprasad Pothuraju, Claudia Richter, Abraham M. Rosenbaum,
Shaunak Roy, Jay Shafto, Uladzislau Sharanhovich, Karen W. Shannon, Conrad G. Sheppy, Michel Sun, Joseph V.
Thakuria, Anne Tran, Dylan Vu, Alexander Wait Zaranek, Xiaodi Wu, Snezana Drmanac, Arnold R. Oliphant,
William C. Banyai, Bruce Martin, Dennis G. Ballinger, George M. Church, Clifford A. Reid. Science, January 2010.
6
Dystopia
Personalized Medicine
Secure Two-Party Computation
7
AliceBob
Bob’s Genome: ACTG…
Markers (~1000): *0,1, …, 0+
Alice’s Genome: ACTG…
Markers (~1000): [0, 0, …, 1]
Can Alice and Bob compute a function of their private
data, without exposing anything about their data besides the
result?
Secure Function Evaluation
Alice (circuit generator) Bob (circuit evaluator)
Garbled Circuit Protocol
Andrew Yao, 1982/1986
Regular Logic
Inputs Output
a b x
0 0 0
0 1 0
1 0 0
1 1 1
AND
a b
x
Computing with Meaningless Values?
Inputs Output
a b x
a0 b0 x0
a0 b1 x0
a1 b0 x0
a1 b1 x1
AND
a0 or a1 b0 or b1
x0 or x1
ai, bi, xi are random
values, chosen by the
circuit generator but
meaningless to the
circuit evaluator.
Computing with Garbled Tables
Inputs Output
a b x
a0 b0 Enca0,b0
(x0)
a0 b1 Enca0,b1
(x0)
a1 b0 Enca1,b0
(x0)
a1 b1 Enca1,b1
(x1)
AND
a0 or a1 b0 or b1
x0 or x1
Bobcanonlydecrypt
oneofthese!
Garbled And Gate
Enca0, b1
(x0)
Enca1,b1
(x1)
Enca1,b0
(x0)
Enca0,b0
(x0)
Random
Permutation
Garbled Gate
Enca0, b1
(x0)
Enca1,b1
(x1)
Enca1,b0
(x0)
Enca0,b0
(x0)
Garbled Circuit Protocol
Alice (circuit generator)
Sends ai to Bob
based on her input
value
Bob (circuit evaluator)
How does the Bob learn his own input wires?
Primitive: Oblivious Transfer
Alice Bob
Oblivious Transfer
Protocol
Oblivious: Alice doesn’t learn which secret Bob obtains
Transfer: Bob learns one of Alice’s secrets
Rabin, 1981; Even, Goldreich, and Lempel, 1985; many subsequent papers
Chaining Garbled Circuits
14
AND
a0 b0
x0
AND
a1 b1
x1
OR
x2
And Gate 1
Enca10, b11
(x10)
Enca11,b11
(x11)
Enca11,b10
(x10)
Enca10,b10
(x10)
Or Gate 2
Encx00, x11
(x21)
Encx01,x11
(x21)
Encx01,x10
(x21)
Encx00,x10
(x20)
…
We can do any computation privately this way!
Building Computing Systems
15
Encx00, x11
(x21)
Encx01,x11
(x21)
Encx01,x10
(x21)
Encx00,x10
(x20)
Digital Electronic Circuits Garbled Circuits
Operate on known data Operate on encrypted wire labels
One-bit logical operation requires
moving a few electrons a few
nanometers
(hundreds of Billions per second)
One-bit logical operation requires
performing (up to) 4 encryption
operations: very slow execution
Reuse is great! Reuse is not allowed for privacy:
huge circuits needed
Fairplay
16
Dahlia Malkhi, Noam Nisan,
Benny Pinkas and Yaron Sella
[USENIX Sec 2004]
SFDL Program
SFDL
Compiler
Circuit
(SHDL)
Alice Bob
Garbled Tables
Generator
Garbled Tables
Evaluator
SFDL
Compiler
Faster Circuit Execution
17
Yan Huang
(UVa PhD Student)
Graduate
Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster Secure
Two-Party Computation Using Garbled Circuits. USENIX Security 2011.
Pipelined Execution
Optimized Circuit Library
Partial Evaluation
Encx00, x11
(x21)
Encx01,x11
(x21)
Encx01,x10
(x21)
Encx20, x21
(x30)
Encx21,x21
(x30)
Encx21,x20
(x31)
Encx20, x31
(x41)
Encx21,x31
(x41)
Encx21,x30
(x40)
Encx40, x31
(x51)
Encx41,x31
(x50)
Encx41,x30
(x50)
Encx40, x51
(x61)
Encx41,x51
(x60)
Encx41,x50
(x60)
Encx30, x61
(x71)
Encx31,x61
(x70)
Encx31,x60
(x71)
Pipelined Execution
18
Circuit-Level
Application
GC Framework
(Evaluator)
GC Framework
(Generator)
Circuit StructureCircuit Structure
x41
x21
x31
x60
x51
x71
Saves memory: never need to keep whole circuit in memory
Pipelining
Circuit Generation
Circuit
Transmission
Circuit
Evaluation
Circuit Generation
Circuit Transmission
time
Circuit Evaluation
Waiting I d l i n g
19
Waiting
Saves time: reduces
latency and improves
throughput
0
0.2
0.4
0.6
0.8
1
1.2
Fairplay [PSSW09] TASTY Here
Billions
Results
0
2
4
6
8
10
Fairplay [PSSW09] TASTY Here
x10000
Performance
(10,000x non-free gates per second)
Scalability
(billions of gates)
[HEKM11]
[HEKM11]
20
100000gates/second
Semi-Honest is Half-Way There
Privacy
Nothing is revealed
other than the output
Correctness
The output of the
protocol is indeed f(x,y)
Generator Evaluator
As long as evaluator doesn’t send
result back, and a malicious-
resistant OT is used, privacy for
evaluator is guaranteed.
How can we get both correctness, and maintain
privacy while giving both parties result?
21
Dual Execution Protocols
Yan Huang, Jonathan Katz, and David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-
Honest Protocols with Dual Execution. IEEE Security and Privacy (Oakland) 2012.
Dual Execution Protocol
[Mohassel and Franklin, PKC’06+
Alice Bob
first round execution (semi-honest)generator evaluator
generatorevaluator
z=f(x, y)
Pass if z = z’ and correct wire labels
z’, learned
output
wire labels
second round execution (semi-honest)
z'=f(x, y)
z, learned
output
wire labels
fully-secure, authenticated equality test
Security Properties
Correctness: guaranteed by authenticated,
secure equality test
Privacy: Leaks one (extra) bit on average
adversarial circuit generator provides a
circuit that fails on ½ of inputs
Malicious generator can decrease likelihood of being caught, and
increase information leaked when caught (but decreases average
information leaked): at extreme, circuit fails on just one input
24
1-bit Leak
25
Cheating detected
Proving Security: Malicious
26
A B
Ideal World
y 'x'
Adversary
receives:
f (x‘, y‘)
TrustedPartyinIdealWorld
Standard Malicious Model: can’t prove this for Dual Execution
Real World
A B
y 'x'
Show equivalence
Corrupted
party behaves
arbitrarily
Secure Computation Protocol
Proof of Security: One-Bit Leakage
27
A B
Ideal World
y 'x'
Controlled by
malicious A
g R {0, 1}
g is an arbitrary
Boolean function
selected by
adversary
Adversary receives:
f (x‘, y') and g(x‘, y‘)
TrustedPartyinIdealWorld
Can prove equivalence to this for Dual Execution protocols
Implementation
Alice Bob
first round execution (semi-honest)generator evaluator
z=f(x, y)
Pass if z = z’ and correct wire labels
z’, learned
output
wire labels
generatorevaluator second round execution (semi-honest)
z'=f(x, y)
z, learned
output
wire labels
Recall: work to generate is 3x work to evaluate!
28
fully-secure, authenticated equality test
0
50
100
150
200
250
PSI (4096) ED (200x200) AES (100) AES (1)
Time(seconds)
Semi-honest
DualEx (dual-core)
DualEx (single-core)
Malicious
Performance
29
Circuits of arbitrary size can be done this way
[Kreuter et al., USENIX Security 2012]
Less than 1 second
Applications
30
Privacy-Preserving
Biometric Matching
Private
Personal
Genomics
Private Set Intersection
Private AES
Encryption
Problem
Best Previous
Result Our Result Speedup
Private Set Intersection (contact
matching, common disease carrier)
Competitive with best custom protocols,
scales to millions of 32-bit elements
Hamming Distance (Face
Recognition)
213s
[SCiFI, 2010]
0.051s 4176
Levenshtein Distance (genome,
text comparison) – two 200-
character inputs
534s
[Jha+, 2008]
18.4s 29
Smith-Waterman (genome
alignment) – two 60-nucleotide
sequences
[Not
Implementable]
447s -
AES Encryption 3.3s
[Henecka, 2010]
0.2s 16.5
Fingerprint Matching (1024-entry
database, 640x8bit vectors)
~83s
[Barni, 2010]
18s 4.6
31
NDSS
2011
USENIXSecurity2011
NDSS
2012
Crazy Things in Typical Code
32
a[i] = x
Circuit for Array Update
33
i == 0
a[0] x
a'[0]
a[i] = x
i == 1
a[1] x
a’[1]
i == 2
a[2] x
a’[2]
…
Easy (and Common) Case
34
for (i = 0; i < n; i++)
a[i] += 1
a[0] a[1] a[2] a[n-1]…
+1 +1 +1 +1
Design circuits to support typical
data structures efficiently
Non-trivial access patterns, but
patterns nonetheless
Main opportunities:
Locality and Batching
35
Samee Zahur and David Evans. Circuit Structures
for Improving Efficiency of Security & Privacy Tools.
IEEE Security and Privacy (Oakland) 2013.
Samee Zahur
(UVa PhD Student)
Locality: Stacks and Queues
36
if (x != 0)
a[i] += 1
if (a[i] > 10)
i += 1
a[i] = 5
t := a.top() + 1
a.cond_update(x != 0, t)
a.cond_push(x != 0 && t > 10, *)
a.cond_update(x != 0, 5)
Data-oblivious code
No branching allowed
Naïve Conditional Push
37
…p
x a[0] a[1] a[2] …
a’[0] a’[1] a’[2] …
Naïve Conditional Push
38
…True
7 2 9 3 …
7 2 9 …
More Efficient Stack
39
Level 0: 2 9 3
t = 3
Level 1: 4 7
t = 2
5 4
Level 2: 8 8 2 3 8
…
Block size = 2level
Each level has 5 blocks, at least 2 full and 2 empty
t = 3
40
2 9 3
t = 3
4 7
t = 2
5 4
Level 0
t = 3
Level 1 Level2
Conditional push (True, 7)
7 2 9 3
t = 4
4 7
t = 2
5 4
t = 3
Conditional push (True, 8)
8 7 2 9 3
t = 5
4 7
t = 2
5 4
t = 3
8 2 7
t = 3
4 7
t = 3
5 49 3
t = 3
Shift
41
2 9 3
t = 3
4 7
t = 2
5 4
Level 0
t = 3
Level 1 Level
7 2 9 3
t = 4
4 7
t = 2
5 4
t = 3
Conditional push (True, 8)
8 7 2 9 3
t = 5
4 7
t = 2
5 4
t = 3
8 2 7
t = 3
4 7
t = 3
5 49 3
t = 3
Amortized
Θ(log n) gates
per operation
0 2 7 9
'A'
'U'
'M'
'R'
'D'
'Y'
'K'
'C'
Arbitrary Array Accesses
(Associative Maps)
42
m[0] = 'A'
m[2] = 'U'
m[9] = 'M'
m[7] = 'R'
m[0] = 'D'
m[9] = 'Y'
m[9] = 'K'
m[7] = 'C'
Execution trace: indexes and
values are private values
43
m[0] = 'A'
m[2] = 'U'
m[9] = 'M'
m[7] = 'R'
m[0] = 'D'
m[9] = 'Y'
m[9] = 'K'
m[7] = 'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Batching Updates
44
m[0] = 'A'
m[2] = 'U'
m[9] = 'M'
m[7] = 'R'
m[0] = 'D'
m[9] = 'Y'
m[9] = 'K'
m[7] = 'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Batching Updates
45
'A'
'U'
'M'
'R'
'D'
'Y'
'K'
'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Compare
Adjacent
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
Batching Updates
46
'A'
'U'
'M'
'R'
'D'
'Y'
'K'
'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Compare
Adjacent
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
Batching Updates
47
Batching Updates
'A'
'U'
'M'
'R'
'D'
'Y'
'K'
'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Compare
Adjacent
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
48
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Compare
Adjacent
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
m[0] = 'D'
m[2] = 'U'
m[7] = 'C'
m[9] = 'K'
m[0] = 'A'
m[7] = 'R'
m[9] = 'M'
m[9] = 'Y'
Sortby
Liveness
output
wires
Discarded
Associative Map Cost
49
Oblivious Stable Sort
Comparisons and Liveness
Marking
Oblivious Sort
Liveness/Key
Circuit Size:
Θ(n log n) ⨯comparison
cost
Θ(n log2 n)
Example Application: DBScan
50
Density-based clustering:
depth-first search to find dense clusters
Martin Ester, Hans-Peter Kriegel, Jörg
Sander, Xiaowei Xu. KDD 1996
Alice’s Data Bob’s Data Joint Clusters
51
Private Input: P – array of points (combines
private points from both parties)
Public inputs: minpts, radius
Output: cluster number for each point
Conditional Push!
Array update!
52
0
5000
10000
15000
20000
25000
30000
35000
40000
60 120 240 480
ExecutionTime(seconds)
Data Size
Optimized Structures
Normal Data Structures
9.7 hours
55 minutes
53
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
Aug2001
Mar2002
Oct2002
May2003
Dec2003
Jul2004
Feb2005
Sep2005
Apr2006
Nov2006
Jun2007
Jan2008
Aug2008
Mar2009
Oct2009
May2010
Dec2010
Jul2011
Feb2012
Sep2012
Apr2013
Cost to sequence human genome
Moore’s Law prediction
(halve every 18 months)
54
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
Aug2001
Mar2002
Oct2002
May2003
Dec2003
Jul2004
Feb2005
Sep2005
Apr2006
Nov2006
Jun2007
Jan2008
Aug2008
Mar2009
Oct2009
May2010
Dec2010
Jul2011
Feb2012
Sep2012
Apr2013
FairPlay (2004) [10k*10k alignment]
Free XOR
HEKM
Schneider & Zhoner 2013
55
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
$1,000,000,000
$10,000,000,000
$100,000,000,000
Aug2001
Mar2002
Oct2002
May2003
Dec2003
Jul2004
Feb2005
Sep2005
Apr2006
Nov2006
Jun2007
Jan2008
Aug2008
Mar2009
Oct2009
May2010
Dec2010
Jul2011
Feb2012
Sep2012
Apr2013
Semi-Honest
56
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
$1,000,000,000
$10,000,000,000
$100,000,000,000
Aug2001
Mar2002
Oct2002
May2003
Dec2003
Jul2004
Feb2005
Sep2005
Apr2006
Nov2006
Jun2007
Jan2008
Aug2008
Mar2009
Oct2009
May2010
Dec2010
Jul2011
Feb2012
Sep2012
Apr2013
Active Security
Semi-Honest
KSS 2011
HKE 2013
1-bit leak
57
mightbeevil.com
Questions?

More Related Content

Similar to Scaling Secure Computation

Deep Learning for New User Interactions (Gestures, Speech and Emotions)
Deep Learning for New User Interactions (Gestures, Speech and Emotions)Deep Learning for New User Interactions (Gestures, Speech and Emotions)
Deep Learning for New User Interactions (Gestures, Speech and Emotions)
Olivia Klose
 
Find nuclei in images with U-net
Find nuclei in images with U-netFind nuclei in images with U-net
Find nuclei in images with U-net
Ding Li
 
Development of a low cost pc-based single-channel eeg monitoring system
Development of a low cost pc-based single-channel eeg monitoring systemDevelopment of a low cost pc-based single-channel eeg monitoring system
Development of a low cost pc-based single-channel eeg monitoring system
Md Kafiul Islam
 
Digit recognizer by convolutional neural network
Digit recognizer by convolutional neural networkDigit recognizer by convolutional neural network
Digit recognizer by convolutional neural network
Ding Li
 
Gan seminar
Gan seminarGan seminar
Gan seminar
San Kim
 
SPIE Conference V3.0
SPIE Conference V3.0SPIE Conference V3.0
SPIE Conference V3.0Robert Fry
 
eel6935_ch2.pdf
eel6935_ch2.pdfeel6935_ch2.pdf
eel6935_ch2.pdf
Sambasiva62
 
Combinational logic 1
Combinational logic 1Combinational logic 1
Combinational logic 1
Heman Pathak
 
nlp dl 1.pdf
nlp dl 1.pdfnlp dl 1.pdf
nlp dl 1.pdf
nyomans1
 
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
Aritra Sarkar
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
vishnu973656
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
Rvishnupriya2
 
f33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.pptf33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.ppt
MaddulaCharishma
 
4366 chapter7
4366 chapter74366 chapter7
4366 chapter7Sai Kumar
 
Deep learning study 2
Deep learning study 2Deep learning study 2
Deep learning study 2
San Kim
 
14911259.ppt
14911259.ppt14911259.ppt
14911259.ppt
ssuser05e57e
 
f37-book-intarch-pres-pt1.ppt
f37-book-intarch-pres-pt1.pptf37-book-intarch-pres-pt1.ppt
f37-book-intarch-pres-pt1.ppt
rickjones250264
 
Chapter 5 boolean algebra
Chapter 5 boolean algebraChapter 5 boolean algebra
Chapter 5 boolean algebra
Praveen M Jigajinni
 
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
Victor Asanza
 
clegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdfclegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdf
aoecmtin
 

Similar to Scaling Secure Computation (20)

Deep Learning for New User Interactions (Gestures, Speech and Emotions)
Deep Learning for New User Interactions (Gestures, Speech and Emotions)Deep Learning for New User Interactions (Gestures, Speech and Emotions)
Deep Learning for New User Interactions (Gestures, Speech and Emotions)
 
Find nuclei in images with U-net
Find nuclei in images with U-netFind nuclei in images with U-net
Find nuclei in images with U-net
 
Development of a low cost pc-based single-channel eeg monitoring system
Development of a low cost pc-based single-channel eeg monitoring systemDevelopment of a low cost pc-based single-channel eeg monitoring system
Development of a low cost pc-based single-channel eeg monitoring system
 
Digit recognizer by convolutional neural network
Digit recognizer by convolutional neural networkDigit recognizer by convolutional neural network
Digit recognizer by convolutional neural network
 
Gan seminar
Gan seminarGan seminar
Gan seminar
 
SPIE Conference V3.0
SPIE Conference V3.0SPIE Conference V3.0
SPIE Conference V3.0
 
eel6935_ch2.pdf
eel6935_ch2.pdfeel6935_ch2.pdf
eel6935_ch2.pdf
 
Combinational logic 1
Combinational logic 1Combinational logic 1
Combinational logic 1
 
nlp dl 1.pdf
nlp dl 1.pdfnlp dl 1.pdf
nlp dl 1.pdf
 
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
f33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.pptf33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.ppt
 
4366 chapter7
4366 chapter74366 chapter7
4366 chapter7
 
Deep learning study 2
Deep learning study 2Deep learning study 2
Deep learning study 2
 
14911259.ppt
14911259.ppt14911259.ppt
14911259.ppt
 
f37-book-intarch-pres-pt1.ppt
f37-book-intarch-pres-pt1.pptf37-book-intarch-pres-pt1.ppt
f37-book-intarch-pres-pt1.ppt
 
Chapter 5 boolean algebra
Chapter 5 boolean algebraChapter 5 boolean algebra
Chapter 5 boolean algebra
 
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
 
clegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdfclegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdf
 

More from David Evans

Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!
David Evans
 
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksTrick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
David Evans
 
Hidden Services, Zero Knowledge
Hidden Services, Zero KnowledgeHidden Services, Zero Knowledge
Hidden Services, Zero Knowledge
David Evans
 
Anonymity in Bitcoin
Anonymity in BitcoinAnonymity in Bitcoin
Anonymity in Bitcoin
David Evans
 
Midterm Confirmations
Midterm ConfirmationsMidterm Confirmations
Midterm Confirmations
David Evans
 
Scripting Transactions
Scripting TransactionsScripting Transactions
Scripting Transactions
David Evans
 
Bitcoin Script
Bitcoin ScriptBitcoin Script
Bitcoin Script
David Evans
 
Mining Economics
Mining EconomicsMining Economics
Mining Economics
David Evans
 
Mining
MiningMining
Mining
David Evans
 
The Blockchain
The BlockchainThe Blockchain
The Blockchain
David Evans
 
Becoming More Paranoid
Becoming More ParanoidBecoming More Paranoid
Becoming More Paranoid
David Evans
 
Asymmetric Key Signatures
Asymmetric Key SignaturesAsymmetric Key Signatures
Asymmetric Key Signatures
David Evans
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
David Evans
 
Class 1: What is Money?
Class 1: What is Money?Class 1: What is Money?
Class 1: What is Money?
David Evans
 
Proof of Reserve
Proof of ReserveProof of Reserve
Proof of Reserve
David Evans
 
Silk Road
Silk RoadSilk Road
Silk Road
David Evans
 
Blooming Sidechains!
Blooming Sidechains!Blooming Sidechains!
Blooming Sidechains!
David Evans
 
Useful Proofs of Work, Permacoin
Useful Proofs of Work, PermacoinUseful Proofs of Work, Permacoin
Useful Proofs of Work, Permacoin
David Evans
 
Alternate Cryptocurrencies
Alternate CryptocurrenciesAlternate Cryptocurrencies
Alternate Cryptocurrencies
David Evans
 
Script
ScriptScript
Script
David Evans
 

More from David Evans (20)

Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!
 
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksTrick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
 
Hidden Services, Zero Knowledge
Hidden Services, Zero KnowledgeHidden Services, Zero Knowledge
Hidden Services, Zero Knowledge
 
Anonymity in Bitcoin
Anonymity in BitcoinAnonymity in Bitcoin
Anonymity in Bitcoin
 
Midterm Confirmations
Midterm ConfirmationsMidterm Confirmations
Midterm Confirmations
 
Scripting Transactions
Scripting TransactionsScripting Transactions
Scripting Transactions
 
Bitcoin Script
Bitcoin ScriptBitcoin Script
Bitcoin Script
 
Mining Economics
Mining EconomicsMining Economics
Mining Economics
 
Mining
MiningMining
Mining
 
The Blockchain
The BlockchainThe Blockchain
The Blockchain
 
Becoming More Paranoid
Becoming More ParanoidBecoming More Paranoid
Becoming More Paranoid
 
Asymmetric Key Signatures
Asymmetric Key SignaturesAsymmetric Key Signatures
Asymmetric Key Signatures
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Class 1: What is Money?
Class 1: What is Money?Class 1: What is Money?
Class 1: What is Money?
 
Proof of Reserve
Proof of ReserveProof of Reserve
Proof of Reserve
 
Silk Road
Silk RoadSilk Road
Silk Road
 
Blooming Sidechains!
Blooming Sidechains!Blooming Sidechains!
Blooming Sidechains!
 
Useful Proofs of Work, Permacoin
Useful Proofs of Work, PermacoinUseful Proofs of Work, Permacoin
Useful Proofs of Work, Permacoin
 
Alternate Cryptocurrencies
Alternate CryptocurrenciesAlternate Cryptocurrencies
Alternate Cryptocurrencies
 
Script
ScriptScript
Script
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Scaling Secure Computation

Editor's Notes

  1. Circuit structure is small and can be reused;Each GT can be used only once.Significance: 1) allow GC to easily scale to arbitrary problem size; 2) indirectly improves time efficiency;
  2. People have done this before. What’s new here is achieving performance &amp; scalability needed for realistic problems.