collusion preserving computation
play

Collusion-Preserving Computation Jol Alwen (ETH Zrich) Jonathan - PowerPoint PPT Presentation

Collusion-Preserving Computation Jol Alwen (ETH Zrich) Jonathan Katz (U. Maryland) Ueli Maurer (ETH Zrich) Vassilis Zikas (U. Maryland) Overview l Motivation & Goals l Definition l Fall-back Security l Synchronization


  1. Collusion-Preserving Computation Joël Alwen (ETH Zürich) Jonathan Katz (U. Maryland) Ueli Maurer (ETH Zürich) Vassilis Zikas (U. Maryland)

  2. Overview l Motivation & Goals l Definition l Fall-back Security l Synchronization Pollution l Implications for Game Theory l Future Directions

  3. Goals (1)

  4. Goals (1) l Primary Goal: A realization notion bounding the capabilities of deviating coalitions even in the presence of arbitrary composition.

  5. Goals (1) l Primary Goal: A realization notion bounding the capabilities of deviating coalitions even in the presence of arbitrary composition. “R realizes F” = R can be used in place of F l

  6. Goals (1) l Primary Goal: A realization notion bounding the capabilities of deviating coalitions even in the presence of arbitrary composition. “R realizes F” = R can be used in place of F l “capabilities of deviating coalitions” = such l that even collaborating “dishonest” players can do no more with R then they could with F

  7. Goals (1) l Primary Goal: A realization notion bounding the capabilities of deviating coalitions even in the presence of arbitrary composition. “R realizes F” = R can be used in place of F l “capabilities of deviating coalitions” = such l that even collaborating “dishonest” players can do no more with R then they could with F “arbitrary composition” = regardless of any l concurrent activities in which they may be involved.

  8. Example Use Cases

  9. Example Use Cases l Composable Game Theory. Extreme case of deviating coalitions. l

  10. Example Use Cases l Composable Game Theory. Extreme case of deviating coalitions. l l Collusion-Free (CF) MPC robust in the presence of side-channels. CF (provably) not concurrently composable l

  11. Example Use Cases l Composable Game Theory. Extreme case of deviating coalitions. l l Collusion-Free (CF) MPC robust in the presence of side-channels. CF (provably) not concurrently composable l l Other (intuitive) examples requiring bounds on collaborating dishonest players. Incoercability: Coercer/Informant & Coercee. l Auctions: Bid fixing by corrupt bidders. l Bounded Isolation: Useful for say, poker or bridge l

  12. Goals (2)

  13. Goals (2) Generic definition independent of l communication resource R. Better for comparing different − constructions. Allows investigating minimal properties − for resource R used to realize a given F.

  14. Goals (2) Generic definition independent of l communication resource R. Better for comparing different − constructions. Allows investigating minimal properties − for resource R used to realize a given F. Non-triviality: strong fall-back security even l if R “miss-behaves”.

  15. Goals (2) Generic definition independent of l communication resource R. Better for comparing different − constructions. Allows investigating minimal properties − for resource R used to realize a given F. Non-triviality: strong fall-back security even l if R “miss-behaves”. Concrete communication resource R & l construction for many F.

  16. Goals (2) Generic definition independent of l communication resource R. Better for comparing different − constructions. Allows investigating minimal properties − for resource R used to realize a given F. Non-triviality: strong fall-back security even l if R “miss-behaves”. Concrete communication resource R & l construction for many F. Explore implications for composable Game l

  17. Related Work

  18. Related Work l SFE/MPC [GMW, BGW,...] First generic realization notions. l Not generally composable − Gives deviating coalitions arbitrary (internal) − capabilities (monolithic adversary)

  19. Related Work l SFE/MPC [GMW, BGW,...] First generic realization notions. l Not generally composable − Gives deviating coalitions arbitrary (internal) − capabilities (monolithic adversary) l Arbitrary composition [Can, PW, CLOS, CDPW,...] Exa: UC, GUC, JUC, etc. l But monolithic adversary −

  20. Related Work l SFE/MPC [GMW, BGW,...] First generic realization notions. l Not generally composable − Gives deviating coalitions arbitrary (internal) − capabilities (monolithic adversary) l Arbitrary composition [Can, PW, CLOS, CDPW,...] Exa: UC, GUC, JUC, etc. l But monolithic adversary − l Collusion-Free (CF) computation [LMPS, ILM, ASV, AKLPSV] Bounds deviating coalitions (via split adversaries) l

  21. CF is not Composable

  22. CF is not Composable l = 2-party null functionality (does nothing) F l Define and protocol π = ( , ) π 2 π 1 R

  23. CF is not Composable l = 2-party null functionality (does nothing) F l Define and protocol π = ( , ) π 2 π 1 R R π 2 2k π 1 m ∈ {0,1} k r ← {0,1} (unif. rand.) k r' ∈ {0,1} If r' = r ⇒ a := m a Else ⇒ a := ⊥

  24. CF is not Composable l = 2-party null functionality (does nothing) F l Define and protocol π = ( , ) π 2 π 1 R R π 2 2k π 1 m ∈ {0,1} k r ← {0,1} (unif. rand.) k r' ∈ {0,1} If r' = r ⇒ a := m a Else ⇒ a := ⊥ r is uniform random and allows no communication between F l π 1 simulators. ⇒ Can always simulate for with a = ⊥ . ⇒ CF-realizes via π . R F

  25. CF is not Composable l = 2-party null functionality (does nothing) F l Define and protocol π = ( , ) π 2 π 1 R R π 2 2k π 1 m ∈ {0,1} k r ← {0,1} (unif. rand.) k r' ∈ {0,1} If r' = r ⇒ a := m a Else ⇒ a := ⊥ r is uniform random and allows no communication between F l π 1 simulators. ⇒ Can always simulate for with a = ⊥ . ⇒ CF-realizes via π . R F Now compose with ; a k -bit channel from P2 → P1. Use it transmit r . C l So P2 can learn m from . But using & the simulators can C F R communicate at most k. I.e. π is no longer simulatable!

  26. Composable CF → Collusion-Preservation

  27. Composable CF → Collusion-Preservation l Goal: Add composability to CF.

  28. Composable CF → Collusion-Preservation l Goal: Add composability to CF. l Idea: Add an environment (as in UC-style realization notions) to CF → CP .

  29. Composable CF → Collusion-Preservation l Goal: Add composability to CF. l Idea: Add an environment (as in UC-style realization notions) to CF → CP . l Immediate results: Dummy (adversary) lemma and (G)UC l composition theorems hold essentially unchanged.

  30. Composable CF → Collusion-Preservation l Goal: Add composability to CF. l Idea: Add an environment (as in UC-style realization notions) to CF → CP . l Immediate results: Dummy (adversary) lemma and (G)UC l composition theorems hold essentially unchanged. CP strictly generalizes (G)UC realization l notions.

  31. Construction (1)

  32. Construction (1) l CP Construction for F using resource R: Trivial Idea: Resource R = Functionality F. l

  33. Construction (1) l CP Construction for F using resource R: Trivial Idea: Resource R = Functionality F. l l Issues: R depends on F l We show that to some extent such a − dependency is unavoidable. However at least R must only be − “programmable” but not fully “non-uniform”.

  34. Construction (1) l CP Construction for F using resource R: Trivial Idea: Resource R = Functionality F. l l Issues: R depends on F l We show that to some extent such a − dependency is unavoidable. However at least R must only be − “programmable” but not fully “non-uniform”. If R mis-behaves all bets are off. l Usually we don't care about this case. But trust − is a rare commodity.

  35. Fallback Security

  36. Fallback Security l Def. “Fallback Security” = Security attained when protocol is run using an arbitrary communication resource.

  37. Fallback Security l Def. “Fallback Security” = Security attained when protocol is run using an arbitrary communication resource. l Example: Protocol π CP-realizes R from F with GUC-Fallback Security. If π is run with R then F is CP-realized. l If π is run with any R* then F is GUC-realized. l

  38. Fallback Security l Def. “Fallback Security” = Security attained when protocol is run using an arbitrary communication resource. l Example: Protocol π CP-realizes R from F with GUC-Fallback Security. If π is run with R then F is CP-realized. l If π is run with any R* then F is GUC-realized. l l Now trivial construction no longer works because it achieves no fallback security.

  39. Construction (2)

  40. Construction (2) l Recall CF construction of Mediated Model of [ASV, AKLPSV]. Idea: “assisted SFE in the mediator's head” For functionality F, let protocol π = GMW(F). l “Mediator” resource M runs π on behalf of players “in l her head”. Player Pi's internal state in π shared between Pi and l M. Next protocol msg generated and Pi's state updated l via 2-party SFE between Pi and M.

Recommend


More recommend