ajith suresh
play

Ajith Suresh CrIS Lab, IISc * Indian Institute of Science (IISc), - PowerPoint PPT Presentation

Ajith Suresh CrIS Lab, IISc * Indian Institute of Science (IISc), Bangalore https://www.csa.iisc.ac.in/~cris ^ Aarhus University, Denmark Outline q Privacy Preserving Machine Learning (PPML) q Secure Multi-party Computation (MPC) q Overview of


  1. Ajith Suresh CrIS Lab, IISc * Indian Institute of Science (IISc), Bangalore https://www.csa.iisc.ac.in/~cris ^ Aarhus University, Denmark

  2. Outline q Privacy Preserving Machine Learning (PPML) q Secure Multi-party Computation (MPC) q Overview of Trident Protocol q Benchmarking Results AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  3. Machine Learning (ML) Prediction – An Abstraction Model Query Parameters Result ML Algorithm Jasmine Aladdin (Model Owner) (Client) Privacy ?? AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  4. Machine Learning (ML) Prediction – An Abstraction Query Model Parameters Result ML Algorithm Jasmine Aladdin (Model Owner) (Client) Privacy ?? AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  5. Machine Learning (ML) Prediction – An Abstraction Model Query Parameters Result ML Algorithm Jasmine Aladdin (Model Owner) (Client) Privacy ?? AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  6. Privacy Preserving Machine Learning (PPML) Model Query Parameters Result PPML Algorithm Jasmine Aladdin (Model Owner) (Client) MPC meets ML AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  7. Secure Multi-party Computation (MPC) [Yao’82] ü A set of parties with private inputs wish to compute some joint function of their inputs. ü Goals of MPC: Correctness – Parties should correctly evaluate § the function output. Privacy – Nothing more than the function § output should be revealed AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  8. Secure Multi-party Computation (MPC) [Yao’82] Trusted Third Party (TTP) AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  9. Trusted Third Party (TTP) AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  10. MPC MPC emulates TTP AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  11. AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  12. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  13. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model v 4 parties v Honest majority v At most 1 corruption AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  14. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model v Data independent pre-processing v Fast online phase AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  15. Sharing Semantics

  16. Pre-processing

  17. Pre-processing

  18. + = Online

  19. Shares of

  20. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  21. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Corrupt parties arbitrarily deviate AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  22. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Honest parties get output whenever corrupt parties get output AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  23. Multiplication ( !. # ) Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 (3PC) 12 9 Abort AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  24. Multiplication ( !. # ) Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 (3PC) 12 9 Abort ASTRA (3PC) 21 4 Fair AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  25. Multiplication ( !. # ) Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 (3PC) 12 9 Abort ASTRA (3PC) 21 4 Fair Gordon et al.’18 (4PC) 2 4 Abort AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  26. Multiplication ( !. # ) Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 (3PC) 12 9 Abort ASTRA (3PC) 21 4 Fair Gordon et al.’18 (4PC) 2 4 Abort Trident 3 3 Fair AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  27. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  28. Mixed World Conversions Boolean World Boolean o Comparison, Bit Extraction … AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  29. Mixed World Conversions Boolean World Boolean o Comparison, Bit Extraction … Arithmetic World o Addition, Multiplication … Arithmetic AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  30. Mixed World Conversions Boolean World Boolean o Comparison, Bit Extraction … Arithmetic World o Addition, Multiplication … Garbled Arithmetic Garbled World o Division over rings … AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  31. Mixed World Conversions Boolean Online Online Rounds Communication B2A B2G Up to 7 x 2 x - 67 x A2B G2B Range of improvement over ABY3 A2G Garbled Arithmetic G2A AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  32. Mixed World Conversions – An Example min(% & + % ( , % * ) % , AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  33. Mixed World Conversions – An Example ! " + x % AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  34. Mixed World Conversions – An Example Arithmetic ! " + x % AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  35. Mixed World Conversions – An Example Arithmetic A2B ! " + x % min(! " + ! % , ! + ) AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  36. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  37. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) B2G AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  38. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) B2G A2G ! - AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  39. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) B2G A2G min ! " + ! % , ! + ÷ ! . ! . AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  40. Mixed World Conversions – An Example Arithmetic Boolean A2B ! " + x % min(! " + ! % , ! + ) B2G A2G min ! " + ! % , ! + ÷ ! . ! . Garbled AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  41. Mixed World Conversions – An Example Arithmetic Boolean A2B % & + x ( min(% & + % ( , % * ) B2G min(% & + % ( , % * ) A2G G2A min % & + % ( , % * ÷ % , % , % , Garbled AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  42. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions Ø Special tools for PPML AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  43. ) Dot Product !∎# = % * + . -+ &'( Pre-processing Online Ref Security (#elements) (#elements) ABY3 (3PC) 12d 9d Abort d – #elements in each vector AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  44. ) Dot Product !∎# = % * + . -+ &'( Pre-processing Online Ref Security (#elements) (#elements) ABY3 (3PC) 12d 9d Abort ASTRA (3PC) 21d 2d+2 Fair d – #elements in each vector AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  45. ) Dot Product !∎# = % * + . -+ &'( Pre-processing Online Ref Security (#elements) (#elements) ABY3 (3PC) 12d 9d Abort ASTRA (3PC) 21d 2d+2 Fair Trident 3 3 Fair d – #elements in each vector AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  46. Non-linear Dot Activation Product Functions Bit Truncation Injection Tools for PPML Bit to Fixed Point Arithmetic Arithmetic Comparison AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

  47. Trident protocol Ø A new 4PC protocol over ring in the pre-processing model Ø Malicious security with guarantee of fairness Ø Efficient Mixed World Conversions Ø Special tools for PPML Ø Lower monetary cost in the outsourced setting AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

Recommend


More recommend