The document describes a talk given by David Evans from the University of Virginia on genetic dating and privacy-preserving computation. It discusses how the cost of genome sequencing has decreased dramatically according to Moore's law, enabling applications like genetic dating. It then explains secure two-party computation using garbled circuits, where two parties can compute a function on their private inputs without revealing anything else. Techniques described include oblivious transfer, garbled gates, and techniques like pipelining and circuit optimization that improve efficiency. Applications demonstrated include private set intersection and biometric matching.
Computing Cooperatively with People You Don't TrustDavid Evans
David Evans, UVA Department of Computer Science
Talk at University of Richmond, 30 January 2012
Two-party secure computation allows two parties to compute a function that depends on inputs from both parties, but reveals nothing except the output of the function. A general solution to this problem have been known since Andrew Yao's pioneering work on garbled circuits in the 1980s, but only recently has it become conceivable to use this approach in real systems. This talk will provide an introduction to secure computation, and describe the work we are doing at UVa to make secure computation efficient and scalable enough to build real applications. The talk assumes no prior background in cryptography, and should be understandable all computing students.
Multi-Party Computation in 2029: Boom, Bust, or Bonanza?David Evans
Applied Multi-Party Computation
Microsoft Research, Redmond
21 February 2014
Multi-Party Computation in 2014, 1999, 1984, and 1969
Where should secure computation be in 2029?
Decreasing costs of secure computation
Making Predictions
"Sending Faxes on the Beach" vs. "Making the WoldWideWeb"
Introducing "Dori-Mic and the Universal Machine!"
MOOCs, KOOCS, and SMOOCHs (or, Reports of the Death of Traditional Higher Edu...David Evans
Tech-Connect Brown Bag Talk, Harrison-Small Auditorium, University of Virginia, 1 May 2013
This talk is about my experiences developing open courses with Udacity, and makes the case that scale enables new and exciting opportunities in education because of the economics of amortizing development cost over a large number of students, but more importantly because of the possibility for scale to produce effective learning communities and inspire amazing contributions. The last part of the talk is about what the University of Virginia should do as a leading public institution.
UVa Today article:
http://news.virginia.edu/content/evans-uva-should-be-global-leader-moocs-online-learning
Evans: U.Va. Should Be a Global Leader in MOOCS, Online Learning
Computing Cooperatively with People You Don't TrustDavid Evans
David Evans, UVA Department of Computer Science
Talk at University of Richmond, 30 January 2012
Two-party secure computation allows two parties to compute a function that depends on inputs from both parties, but reveals nothing except the output of the function. A general solution to this problem have been known since Andrew Yao's pioneering work on garbled circuits in the 1980s, but only recently has it become conceivable to use this approach in real systems. This talk will provide an introduction to secure computation, and describe the work we are doing at UVa to make secure computation efficient and scalable enough to build real applications. The talk assumes no prior background in cryptography, and should be understandable all computing students.
Multi-Party Computation in 2029: Boom, Bust, or Bonanza?David Evans
Applied Multi-Party Computation
Microsoft Research, Redmond
21 February 2014
Multi-Party Computation in 2014, 1999, 1984, and 1969
Where should secure computation be in 2029?
Decreasing costs of secure computation
Making Predictions
"Sending Faxes on the Beach" vs. "Making the WoldWideWeb"
Introducing "Dori-Mic and the Universal Machine!"
MOOCs, KOOCS, and SMOOCHs (or, Reports of the Death of Traditional Higher Edu...David Evans
Tech-Connect Brown Bag Talk, Harrison-Small Auditorium, University of Virginia, 1 May 2013
This talk is about my experiences developing open courses with Udacity, and makes the case that scale enables new and exciting opportunities in education because of the economics of amortizing development cost over a large number of students, but more importantly because of the possibility for scale to produce effective learning communities and inspire amazing contributions. The last part of the talk is about what the University of Virginia should do as a leading public institution.
UVa Today article:
http://news.virginia.edu/content/evans-uva-should-be-global-leader-moocs-online-learning
Evans: U.Va. Should Be a Global Leader in MOOCS, Online Learning
Deep Learning for New User Interactions (Gestures, Speech and Emotions)Olivia Klose
Who doesn't know of the super cool scenes in "Minority Report": intelligent machines and innovative user interfaces with speech and gestures?
In this deep dive, we will talk about how deep learning can enable such interactions using some Microsoft projects in the area of NUI (Natural User Interfaces): Kinect, Handpose, Skype Translator etc. Which predictive models are being used? What do we do if we don't have sufficient data? Finally we will dare an outlook into the future how new and innovative human-machine-interaction concepts can change our user experience with computers and in light of industry 4.0.
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...Victor Asanza
By exploiting the received power change in a communication link produced by the presence of a human body in an otherwise empty room, this work evaluates indoor free device localization methods in the 28 GHz band using machine learning techniques. For this objective, a database is built using results from ray tracing simulations of a system comprised of 4 receivers and up to 2 transmitters, while a person is standing within the room. Transmitters are equipped with uniform linear arrays that switch their main beams sequentially at 21 angles, whereas the receivers operate with omnidirectional antennas. Statistical localization error reduction of at least 16% over a global-based classification technique can be obtained through the combination of two independent classifiers using one transmitter and a reduction of at least 19% for 2 transmitters. An additional improvement is achieved by combining each independent classifier with a regression algorithm. Results also suggest that the number of examples per class and size of the blocks (strips) in which the study area is partitioned play a role in the localization error.
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksDavid Evans
David Evans
DC Area Crypto Day
Johns Hopkins University
30 October 2015
This (non-research) talk will start with a tutorial introduction to cryptocurrencies and how bitcoin works (and doesn’t work) today. We’ll touch on some of the legal, policy, and business aspects of bitcoin and discuss some potential research opportunities in cryptocurrencies.
Deep Learning for New User Interactions (Gestures, Speech and Emotions)Olivia Klose
Who doesn't know of the super cool scenes in "Minority Report": intelligent machines and innovative user interfaces with speech and gestures?
In this deep dive, we will talk about how deep learning can enable such interactions using some Microsoft projects in the area of NUI (Natural User Interfaces): Kinect, Handpose, Skype Translator etc. Which predictive models are being used? What do we do if we don't have sufficient data? Finally we will dare an outlook into the future how new and innovative human-machine-interaction concepts can change our user experience with computers and in light of industry 4.0.
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...Victor Asanza
By exploiting the received power change in a communication link produced by the presence of a human body in an otherwise empty room, this work evaluates indoor free device localization methods in the 28 GHz band using machine learning techniques. For this objective, a database is built using results from ray tracing simulations of a system comprised of 4 receivers and up to 2 transmitters, while a person is standing within the room. Transmitters are equipped with uniform linear arrays that switch their main beams sequentially at 21 angles, whereas the receivers operate with omnidirectional antennas. Statistical localization error reduction of at least 16% over a global-based classification technique can be obtained through the combination of two independent classifiers using one transmitter and a reduction of at least 19% for 2 transmitters. An additional improvement is achieved by combining each independent classifier with a regression algorithm. Results also suggest that the number of examples per class and size of the blocks (strips) in which the study area is partitioned play a role in the localization error.
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksDavid Evans
David Evans
DC Area Crypto Day
Johns Hopkins University
30 October 2015
This (non-research) talk will start with a tutorial introduction to cryptocurrencies and how bitcoin works (and doesn’t work) today. We’ll touch on some of the legal, policy, and business aspects of bitcoin and discuss some potential research opportunities in cryptocurrencies.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
5. Human Genome Sequencing Using Unchained Base Reads on Self-Assembling DNA Nanoarrays. Radoje
Drmanac, Andrew B. Sparks, Matthew J. Callow, Aaron L. Halpern, Norman L. Burns, Bahram G. Kermani, Paolo
Carnevali, Igor Nazarenko, Geoffrey B. Nilsen, George Yeung, Fredrik Dahl, Andres Fernandez, Bryan Staker,
Krishna P. Pant, Jonathan Baccash, Adam P. Borcherding, Anushka Brownley, Ryan Cedeno, Linsu Chen, Dan
Chernikoff, Alex Cheung, Razvan Chirita, Benjamin Curson, Jessica C. Ebert, Coleen R. Hacker, Robert Hartlage,
Brian Hauser, Steve Huang, Yuan Jiang, Vitali Karpinchyk, Mark Koenig, Calvin Kong, Tom Landers, Catherine Le,
Jia Liu, Celeste E. McBride, Matt Morenzoni, Robert E. Morey, Karl Mutch, Helena Perazich, Kimberly Perry, Brock
A. Peters, Joe Peterson, Charit L. Pethiyagoda, Kaliprasad Pothuraju, Claudia Richter, Abraham M. Rosenbaum,
Shaunak Roy, Jay Shafto, Uladzislau Sharanhovich, Karen W. Shannon, Conrad G. Sheppy, Michel Sun, Joseph V.
Thakuria, Anne Tran, Dylan Vu, Alexander Wait Zaranek, Xiaodi Wu, Snezana Drmanac, Arnold R. Oliphant,
William C. Banyai, Bruce Martin, Dennis G. Ballinger, George M. Church, Clifford A. Reid. Science, January 2010.
7. Secure Two-Party Computation
7
AliceBob
Bob’s Genome: ACTG…
Markers (~1000): *0,1, …, 0+
Alice’s Genome: ACTG…
Markers (~1000): [0, 0, …, 1]
Can Alice and Bob compute a function of their private
data, without exposing anything about their data besides the
result?
10. Computing with Meaningless Values?
Inputs Output
a b x
a0 b0 x0
a0 b1 x0
a1 b0 x0
a1 b1 x1
AND
a0 or a1 b0 or b1
x0 or x1
ai, bi, xi are random
values, chosen by the
circuit generator but
meaningless to the
circuit evaluator.
11. Computing with Garbled Tables
Inputs Output
a b x
a0 b0 Enca0,b0
(x0)
a0 b1 Enca0,b1
(x0)
a1 b0 Enca1,b0
(x0)
a1 b1 Enca1,b1
(x1)
AND
a0 or a1 b0 or b1
x0 or x1
Bobcanonlydecrypt
oneofthese!
Garbled And Gate
Enca0, b1
(x0)
Enca1,b1
(x1)
Enca1,b0
(x0)
Enca0,b0
(x0)
Random
Permutation
13. Primitive: Oblivious Transfer
Alice Bob
Oblivious Transfer
Protocol
Oblivious: Alice doesn’t learn which secret Bob obtains
Transfer: Bob learns one of Alice’s secrets
Rabin, 1981; Even, Goldreich, and Lempel, 1985; many subsequent papers
14. Chaining Garbled Circuits
14
AND
a0 b0
x0
AND
a1 b1
x1
OR
x2
And Gate 1
Enca10, b11
(x10)
Enca11,b11
(x11)
Enca11,b10
(x10)
Enca10,b10
(x10)
Or Gate 2
Encx00, x11
(x21)
Encx01,x11
(x21)
Encx01,x10
(x21)
Encx00,x10
(x20)
…
We can do any computation privately this way!
15. Building Computing Systems
15
Encx00, x11
(x21)
Encx01,x11
(x21)
Encx01,x10
(x21)
Encx00,x10
(x20)
Digital Electronic Circuits Garbled Circuits
Operate on known data Operate on encrypted wire labels
One-bit logical operation requires
moving a few electrons a few
nanometers
(hundreds of Billions per second)
One-bit logical operation requires
performing (up to) 4 encryption
operations: very slow execution
Reuse is great! Reuse is not allowed for privacy:
huge circuits needed
16. Fairplay
16
Dahlia Malkhi, Noam Nisan,
Benny Pinkas and Yaron Sella
[USENIX Sec 2004]
SFDL Program
SFDL
Compiler
Circuit
(SHDL)
Alice Bob
Garbled Tables
Generator
Garbled Tables
Evaluator
SFDL
Compiler
17. Faster Circuit Execution
17
Yan Huang
(UVa PhD Student)
Graduate
Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster Secure
Two-Party Computation Using Garbled Circuits. USENIX Security 2011.
Pipelined Execution
Optimized Circuit Library
Partial Evaluation
20. 0
0.2
0.4
0.6
0.8
1
1.2
Fairplay [PSSW09] TASTY Here
Billions
Results
0
2
4
6
8
10
Fairplay [PSSW09] TASTY Here
x10000
Performance
(10,000x non-free gates per second)
Scalability
(billions of gates)
[HEKM11]
[HEKM11]
20
100000gates/second
21. Semi-Honest is Half-Way There
Privacy
Nothing is revealed
other than the output
Correctness
The output of the
protocol is indeed f(x,y)
Generator Evaluator
As long as evaluator doesn’t send
result back, and a malicious-
resistant OT is used, privacy for
evaluator is guaranteed.
How can we get both correctness, and maintain
privacy while giving both parties result?
21
22. Dual Execution Protocols
Yan Huang, Jonathan Katz, and David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-
Honest Protocols with Dual Execution. IEEE Security and Privacy (Oakland) 2012.
23. Dual Execution Protocol
[Mohassel and Franklin, PKC’06+
Alice Bob
first round execution (semi-honest)generator evaluator
generatorevaluator
z=f(x, y)
Pass if z = z’ and correct wire labels
z’, learned
output
wire labels
second round execution (semi-honest)
z'=f(x, y)
z, learned
output
wire labels
fully-secure, authenticated equality test
24. Security Properties
Correctness: guaranteed by authenticated,
secure equality test
Privacy: Leaks one (extra) bit on average
adversarial circuit generator provides a
circuit that fails on ½ of inputs
Malicious generator can decrease likelihood of being caught, and
increase information leaked when caught (but decreases average
information leaked): at extreme, circuit fails on just one input
24
26. Proving Security: Malicious
26
A B
Ideal World
y 'x'
Adversary
receives:
f (x‘, y‘)
TrustedPartyinIdealWorld
Standard Malicious Model: can’t prove this for Dual Execution
Real World
A B
y 'x'
Show equivalence
Corrupted
party behaves
arbitrarily
Secure Computation Protocol
27. Proof of Security: One-Bit Leakage
27
A B
Ideal World
y 'x'
Controlled by
malicious A
g R {0, 1}
g is an arbitrary
Boolean function
selected by
adversary
Adversary receives:
f (x‘, y') and g(x‘, y‘)
TrustedPartyinIdealWorld
Can prove equivalence to this for Dual Execution protocols
28. Implementation
Alice Bob
first round execution (semi-honest)generator evaluator
z=f(x, y)
Pass if z = z’ and correct wire labels
z’, learned
output
wire labels
generatorevaluator second round execution (semi-honest)
z'=f(x, y)
z, learned
output
wire labels
Recall: work to generate is 3x work to evaluate!
28
fully-secure, authenticated equality test
29. 0
50
100
150
200
250
PSI (4096) ED (200x200) AES (100) AES (1)
Time(seconds)
Semi-honest
DualEx (dual-core)
DualEx (single-core)
Malicious
Performance
29
Circuits of arbitrary size can be done this way
[Kreuter et al., USENIX Security 2012]
Less than 1 second
33. Circuit for Array Update
33
i == 0
a[0] x
a'[0]
a[i] = x
i == 1
a[1] x
a’[1]
i == 2
a[2] x
a’[2]
…
34. Easy (and Common) Case
34
for (i = 0; i < n; i++)
a[i] += 1
a[0] a[1] a[2] a[n-1]…
+1 +1 +1 +1
35. Design circuits to support typical
data structures efficiently
Non-trivial access patterns, but
patterns nonetheless
Main opportunities:
Locality and Batching
35
Samee Zahur and David Evans. Circuit Structures
for Improving Efficiency of Security & Privacy Tools.
IEEE Security and Privacy (Oakland) 2013.
Samee Zahur
(UVa PhD Student)
36. Locality: Stacks and Queues
36
if (x != 0)
a[i] += 1
if (a[i] > 10)
i += 1
a[i] = 5
t := a.top() + 1
a.cond_update(x != 0, t)
a.cond_push(x != 0 && t > 10, *)
a.cond_update(x != 0, 5)
Data-oblivious code
No branching allowed
39. More Efficient Stack
39
Level 0: 2 9 3
t = 3
Level 1: 4 7
t = 2
5 4
Level 2: 8 8 2 3 8
…
Block size = 2level
Each level has 5 blocks, at least 2 full and 2 empty
t = 3
40. 40
2 9 3
t = 3
4 7
t = 2
5 4
Level 0
t = 3
Level 1 Level2
Conditional push (True, 7)
7 2 9 3
t = 4
4 7
t = 2
5 4
t = 3
Conditional push (True, 8)
8 7 2 9 3
t = 5
4 7
t = 2
5 4
t = 3
8 2 7
t = 3
4 7
t = 3
5 49 3
t = 3
Shift
41. 41
2 9 3
t = 3
4 7
t = 2
5 4
Level 0
t = 3
Level 1 Level
7 2 9 3
t = 4
4 7
t = 2
5 4
t = 3
Conditional push (True, 8)
8 7 2 9 3
t = 5
4 7
t = 2
5 4
t = 3
8 2 7
t = 3
4 7
t = 3
5 49 3
t = 3
Amortized
Θ(log n) gates
per operation
50. Example Application: DBScan
50
Density-based clustering:
depth-first search to find dense clusters
Martin Ester, Hans-Peter Kriegel, Jörg
Sander, Xiaowei Xu. KDD 1996
Alice’s Data Bob’s Data Joint Clusters
51. 51
Private Input: P – array of points (combines
private points from both parties)
Public inputs: minpts, radius
Output: cluster number for each point
Conditional Push!
Array update!
Circuit structure is small and can be reused;Each GT can be used only once.Significance: 1) allow GC to easily scale to arbitrary problem size; 2) indirectly improves time efficiency;
People have done this before. What’s new here is achieving performance & scalability needed for realistic problems.