Top Banner
What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University
39

What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Dec 18, 2015

Download

Documents

Bryan Howard
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

What Crypto Can Do for You: Solutions in Search of

Problems

Anna LysyanskayaBrown University

Page 2: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Systemic Risk from Local Information

Page 3: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Systemic Risk from Local Information

Page 4: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Systemic Risk from Local Information

Page 5: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Systemic Risk from Local Information

Page 6: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Systemic Risk from Local Information

Page 7: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Systemic Risk from Local Information

Page 8: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Systemic Risk from Local Information

M.C.Escher, Belvedere

Page 9: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Who Puts Together the Big Picture?

Page 10: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Who Puts Together the Big Picture?

The government?

Page 11: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Who Puts Together the Big Picture?

The government?

Page 12: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Who Puts Together the Big Picture?

An independent trustworthy party?

Page 13: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Who Puts Together the Big Picture?

An independent trustworthy party?

Page 14: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Who Puts Together the Big Picture?

The data owners (financial institutions) themselves?

Page 15: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Who Puts Together the Big Picture?

The data owners (financial institutions) themselves?

Page 16: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Who Puts Together the Big Picture?

Cryptography tells us:

For any efficiently computable function F, there is an “efficient” interactive algorithm that n data owners, P1(x1),…,Pn(xn), can run together such that:

•They learn F(x1,x2,…,xn) •Other than that, Pi learns nothing about xj, j≠i[Yao, GMW, BGW, …]

Page 17: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Example: Set Intersection

12

18

5

6

31

42

5

24

12

3

Alice’s set Bob’s set

5

12

Intersection

Page 18: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

How to compute the intersection w/o learning the rest of each other’s

sets?

[FMP04,…,BCCKLS09,…,KMRS14]

Page 19: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 1: Alice’s set becomes a polynomial

12

18

5

6

31

Alice’s set

p(x) = (x-12)(x-18)(x-5)(x-6)(x-31) mod q = x5 + c4x4 + c3x3 + c2x2 + c1x + c0

c4 c3 c2 c1 c0

Page 20: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 1: Alice’s set becomes a polynomial

Alice’s polynomial p(x)

c4 c3 c2 c1 c0

Page 21: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 2: Alice encrypts her polynomial

Alice’s polynomial p(x)

c4 c3 c2 c1 c0

Page 22: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 2: Alice encrypts her polynomial

Alice’s encrypted polynomial p(x)

E(c4) E(c3) E(c2) E(c1) E(c0)

Page 23: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 2: Alice encrypts her polynomial…

Alice’s encrypted polynomial p(x)

E(c4) E(c3) E(c2) E(c1) E(c0)

…using an “additive” encryption scheme

E(x) * E(y) = E(x+y) [Paillier’99]

Page 24: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 2: Alice encrypts her polynomial…

Alice’s encrypted polynomial p(x)

E(c4) E(c3) E(c2) E(c1) E(c0)

…using an “additive” encryption scheme…for which she holds the decryption

key

Page 25: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 3: Alice sends the encrypted

Alice’s encrypted polynomial p(x)

E(c4) E(c3) E(c2) E(c1) E(c0)

polynomial to Bob

Page 26: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 4: Bob evaluates the encrypted

Alice’s encrypted polynomial p(x)

E(c4) E(c3) E(c2) E(c1) E(c0)

polynomial on his set 42

5

24

12

3

Bob’s set

p(42) = 425 + c4424 + c3423+c2422+c142+c0 mod q

E(p(42)) = E(425) * E(c4)424 * E(c3)423

* E(c2)422 * E(c1)42 * E(c0)

Page 27: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 4: Bob evaluates the encrypted

Alice’s encrypted polynomial p(x)

E(c4) E(c3) E(c2) E(c1) E(c0)

polynomial on his set 42

5

24

12

3

Bob’s setp(x) evaluated on Bob’s set

E(p(42)) E(p(5)) E(p(24)) E(p(12)) E(p(3))

Page 28: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 4: Bob evaluates the encrypted

Alice’s encrypted polynomial p(x)

E(c4) E(c3) E(c2) E(c1) E(c0)

polynomial on his set

p(x) evaluated on Bob’s set

E(p(42)) E(0) E(p(24)) E(0) E(p(3))

Note: p(y) = 0iff y is in Alice’s set

Page 29: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 5: Bob randomizes the result

E(p(42))R1 E(0)R2 E(p(24))R3 E(0)R4 E(p(3))R5

Page 30: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 5: Bob randomizes the result

E(u1) E(0) E(u3) E(0) E(u5)

Page 31: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 6: Bob sends the result to Alice

E(u1) E(0) E(u3) E(0) E(u5)

Page 32: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 7: Alice decrypts it...

E(u1) E(0) E(u3) E(0) E(u5)

u1 0 u3 0 u5

Page 33: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 7: Alice decrypts it...and sends the locations of 0’s to

Bob

u1 0 u3 0 u5

Page 34: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 7: Alice decrypts it...and sends the locations of 0’s to

Bob

? 0 ? 0 ?

Page 35: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 8: Bob derives the intersection

? 0 ? 0 ?

42

5

24

12

3

Page 36: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Step 8: Bob derives the intersectionand sends it to Alice

5

12

Page 37: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

A More General Solution for Two Parties:Yao’s Encrypted Circuit

Alice’s logical circuit C Bob’s input x

0

1

1

Encrypted circuit

Oblivious transfer of keys

Page 38: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

A More General Solution for N Parties: Secure Multi-Party Computation

• Split the computation into logical steps (ANDs, ORs, NOTs) or algebraic steps (ADD, MULT)

• Securely evaluate step by step• [GMW, BGW, …]

Page 39: What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.

Conclusion

• Tell me how you could detect systemic risk given complete information…

• …and I will tell you how to do it via a privacy-preserving protocol!