Slide

advertisement
Challenges and directions
for optimizing
the automated solution
of the general MPC problem
Vladimir Kolesnikov (Bell Labs)
Tal Malkin (Columbia U), Payman Mohassel (U Calgary),
Mike Rosulek (Oregon State), Yehuda Lindell (Bar-Ilan U)
Kedar Namjoshi, Alan Jeffrey, Steve Fortune (Bell Labs)
Outline
• Problem description
• Protocol composition for performance improvement
• Leakage for insane performance improvement
- But what guarantees do we have?
• Research directions in cryptography, compilers and program analysis
• Heilmeier’s Catechism
2
General MPC
• One button to generate the best protocol
• High-level language?
• Program may specify (partial list)
- Number of players
- Trust assumptions
- Communication channel assumptions
- Player computational abilities
- Leakage allowance
- Automatically or manually select:
- The “right” subroutine
- E.g. Array implementation via GC or ORAM
3
(Automatic) Subroutine Selection &
Protocol composition
• Crypto primitives for variety of general and special cases
- GC, Info-theoretic GC, GMW,
- ORAM, ORAM-based MPC
- Server-aided computation
- OBDD, FSA
- Homomorpic
-…
• Each is best in some setting
4
(Automatic) Subroutine Selection &
Protocol composition (cont.)
• Crypto primitives for variety of special cases
• Idea: compose (automatically or manually) the “right” subroutines.
- Few first attempts
- [KSS13] (GC + homomorphic, manual), TASTY [HSSW10]
- [LHSHK14] (GC+ORAM, compiler), “order of magnitude” improvement
• GC can serve as secure “glue” for many compositions
- In the semi-honest model. Much harder in malicious model.
• Systematize the approaches
• Amend/design protocols to enable easy composition
5
Leakage
• Much of the cost of MPC comes from “the last mile”
- Selective abort allows to learn one bit at the cost of being caught
- Cost: complex Cut-and-choose with s^2 commitments
- Dual execution [MF06] leaks one bit at the cost of being caught
- Cost: 20x performance overhead via [Lin13]
- Leaking execution path in large-input computation (e.g. [PKVKMCGKB14])
- Cost: insane (vs GC), orders of magnitude (vs ORAM-MPC)
• In deadline-driven applications, the choice is between
- no privacy / imperfect privacy
- Imperfect privacy can be more dangerous if not clearly understood
6
Research directions – MPC improvements &
Benchmarking
- Research in improving standalone protocols, with a view of
composition
- General
- Specific functions
- Implementations
- Profiling frequently-used primitives a-la OT Extension[ALSZ13]
- Specific to settings (high/low power devices, battery considerations, etc.)
7
Research directions – Composition
• Systematize the many approaches
• Amend/design protocols to enable easy composition at compile-time
• Malicious model composition
• Compiler work to automate primitive selection and gluing
8
Research directions – Leakage
• Design faster and less-leaking protocols
- Improve bounds and guarantees on
- Covert protocols
- Dual execution protocols
- Other
9
Research directions – Understanding (Composed)
Leakage
• Needed even in “proper” non-leaky protocols
- Multiple execution leaks a complex object that is often hard to understand
- E.g. What is learned from a sequence of DB queries
- If running time is also revealed
• Design concepts, language, and tools for leakage analysis
• New leaky definitions
10
Research directions – Understanding (Composed)
Leakage
• Consider a high-level program which calls subroutines (e.g. DB queries)
• Use automated program analysis and verification techniques:
- Trace possible/probable program states and subroutine call sequences
- Bound the knowledge gained from leakage, malicious gains and legal outputs
- Answer questions of the type “Is information x leaked?”
11
Heilmeier’s Catechism (1)
• What are you trying to do?
- Understandable security for deadline-oriented applications
• How is it done today, and what are the limits of current practice?
- Not done*
• What's new in your approach and why do you think it will be successful?
- Combination of crypto, compilers, and automated leakage analysis
• Who cares?
- Agencies who may not share their data; industry if it’s simple and fast enough
• If you're successful, what difference will it make?
- More PII privacy, ability to securely share data, technological enforcement of
data laws.
12
Heilmeier’s Catechism (2)
• What are the risks and the payoffs?
- MPC improvements are low- to medium- risk, depending on expectation
- Leakage analysis is high-risk as a new field
- Pay off – up to eliminating overhead of MPC (with leakage, in ideal world, in
some settings)
• How much will it cost?
- 7-10 people working ½ time
• How long will it take?
- 3-4 years to see noticeable results
13
Heilmeier’s Catechism (3)
• What are the midterm and final "exams" to check for success?
- Foundations (1.5 yrs)
- MPC crypto work in systematization etc.
- Design of leakage specification language and analysis tools
- Demo Implementation of (1.5 yrs)
- Improve foundations and deliver an implementation
- Deliverable
- A push-button system
14
Bibliography
[ALSZ13] Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner. More
efficient oblivious transfer and extensions for faster secure computation. In Proceedings of
the 2013 ACM SIGSAC conference on Computer & communications security.
[HSSW10] Wilko Henecka, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg.
TASTY: tool for automating secure two-party computations. CCS 2010
[KSS13] Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider: A systematic
approach to practically efficient general two-party secure function evaluation protocols and
their modular design. Journal of Computer Security 21(2): 283-315 (2013)
[LHSHK14] Chang Liu, Yan Huang, Elaine Shi, Michael Hicks, and Jonathan Katz.
Automating Efficient RAM-Model Secure Computation. In S&P (Oakland) 2014
[MF06] Payman Mohassel, Matthew K. Franklin: Efficiency Tradeoffs for Malicious TwoParty Computation. In PKC 2006
[Lin13] Yehuda Lindell: Fast Cut-and-Choose Based Protocols for Malicious and Covert
Adversaries. CRYPTO (2) 2013
[PKVKMCGKB14] Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin,
Seung Geol Choi, Wesley George, Angelos Keromytis, Steve Bellovin. Blind Seer: A Scalable
Private DBMS. In Oakland 2014.
15
Download