Size-Hiding Computation for Multiple Parties Kazumasa Shinagawa 1,2 Koji Nuida 2,3 Takashi Nishide 1 Goichiro Hanaoka 2 Eiji Okamoto 1 1: University of Tsukuba, 2: AIST, 3: JST PRESTO 1
Secure Multiparty Computation lο Each party π " has some private input π¦ " lο The parties wish to compute a function π§ = π(π¦ ( , β―, π¦ + ) without revealing the inputs lο Consider the single output, semi-honest, π β 1 corruption π¦ 0 π¦ ( π¦ 4 π¦ 1 π¦ 2 π¦ 3 2
Size-Hiding Computation lο can hide some of input/output-sizes from some of parties lο Each private size can be hidden from different set of parties lο It is known that some of size-hiding is impossible in general lο Which type of size-hiding is possible in general? This Talk complete characterization for the feasibility (assuming the existence of FHE) 3
Set Intersection lο Police has a list of terrorists π lο Company has a list of customers π lο Police wants to compute π β© π without revealing |π| lο NaΓ―ve approach: Padding lο Padding is inefficient Compute π β© π π π 4
Millionaire Problem lο Aliens: βWhich planet has the largest population?β lο The population is related to the military power lο The input-size is also related to the military power lο Padding doesnβt work β΅ The largest population in the universe is too large 5
NEW NEW NEW NEW NEW NEW NEW NEW Outline lο Notations lο Classification for two-party [LNO13] lο Classification for multiparty uοΆ Almost all sizes cannot be hidden lο Strong secure channel (SSC) model uοΆ It is implementable by steganography lο Classification for multiparty in SSC model uοΆ Many sizes can be hidden in SSC model 6
Notations : π 9 can know |π¦ " | π Β‘ Β‘π : who must not know the output size γ» A size-hiding class Β‘1 Β‘2 ΓΌο½ π 0 must not know |π¦ ( | ΓΌο½ π 1 must not know the output-size 3 Def. A class is feasible if general MPC is possible 7
Two-party Cases [LNO13] Hiding two or more sizes is infeasible in two-party case Private Private |π¦ 0 |, |π§| 2 Β‘1 nothing Β‘1 Β‘2 π¦ 0 Β‘1 Β‘2 1 |π¦ 0 |, |π§| Β‘2 |π§| 2 Β‘1 Β‘1 |π¦ ( , |π¦ 0 Β‘2 2 |π¦ ( , |π¦ 0 , |π§| Β‘1 Feasible Infeasible 8
NEW NEW NEW NEW NEW NEW NEW NEW Outline lο Notations lο Classification for two-party [LNO13] lο Classification for multiparty uοΆ Almost all sizes cannot be hidden lο Strong secure channel (SSC) model uοΆ It is implementable by steganography lο Classification for multiparty in SSC model uοΆ Many sizes can be hidden in SSC model 9
Multiparty Cases (Our Result) Our result in standard model Even in MPC, it is infeasible to hide two sizes lο The infeasibility is proven by techniques of [LNO13] lο The protocol for hiding |π¦ ( | uοΆ The parties invoke KeyGen for threshold FHE uοΆ Each party π " sends πΉππ(π¦ " ) to π ( uοΆ π ( computes [π§] and broadcast it uοΆ They invoke Decryption 10
Limitation of standard channel 3 Infeasible Infeasible 2 2 1 1 (with additional party) π ( cannot send πΉππ(π¦ ( ) π 1 can know π¦ ( and π¦ 0 but π 0 cannot send πΉππ(π¦ 0 ) β΅ channel may leak the number of communication bits 11
Strong Secure Channel (SSC) Secure channel model π |π| Adv ? SSC model πβ² lο It is implementable by steganography 12
NEW NEW NEW NEW NEW NEW NEW NEW Outline lο Notations lο Classification for two-party [LNO13] lο Classification for multiparty uοΆ Almost all sizes cannot be hidden lο Strong secure channel (SSC) model uοΆ It is implementable by steganography lο Classification for multiparty in SSC model uοΆ Many sizes can be hidden in SSC model 13
Our Result in SSC model lο Complete classification in SSC model lο Maximum number of private sizes is π # of private sizes 1 2 3 4 β¦ β β β Secure channel β¦ β β / β β / β β / β SSC model β¦ β 14
Case 1 When the output-size is public 15
Case 1 (public output-size) lο Suppose the output-size is public lο Size-hiding computation is feasible in SSC model β for every and Β‘ Β‘π Β‘ Β‘π β or : Β‘ Β‘π Β‘ Β‘π Β‘ Β‘π Β‘ Β‘π or Β‘ Β‘π Β‘ Β‘π Β‘ Β‘π Β‘ Β‘π Infeasible Feasible! 16
Main Idea for Construction lο Invoke Sharing Protocols for π ( , π 0 , π 1 [π¦] : FHE ciphertext Sharing Protocol for π ( : Β‘2 Β‘3 π 1 sends to π ( : [1 Β‘π¦ 1 ] π 0 sends to π ( : Β‘1 [1 Β‘0 J K L J M Β‘π¦ 0 ] If π¦ ( β₯ π¦ 0 Otherwise [0 Β‘0 J K ] Longest input One of them can obtain all flagged ciphertexts! β [π(π¦ ( , π¦ 0 , π¦ 1 )] can be computed 17
Infeasibility (Reduced to [LNO13]) Β‘3 Β‘2 Β‘3 Β‘2 P B P A Β‘1 Β‘4 Β‘1 Β‘4 πΊ π¦ ( ,π¦ 0 ,π¦ 1 ,π¦ 2 lο Suppose the class is feasible lο Let πΊ π¦ ( , π¦ 0 , π¦ 1 ,π¦ 2 = π π¦ ( , π¦ 0 lο Two private sizes (in two-party) is feasible lο It contradicts [LNO13] 18
Case 2 When the output-size is private 19
Case 2 (private output-size) lο Suppose the output-size is private lο Size-hiding computation is feasible in SSC model β for every ΓΌο½ The party can know all input-sizes; and ΓΌο½ β : Feasible! Infeasible 20
Main Idea for Construction (1) 3 4 + Β‘1 Β‘2 FHE MPC lο π 1 , π 2 are not involved in KeyGen β΅ π 1 , π 2 must not join threshold Decryption of π lο π 1 , π 2 do Evaluation , and obtain π§ with zero paddings Thanks to the padding, they can do this without knowing |π§| 21
Main Idea for Construction (2) 3 4 lο π ( , π 0 do KeyGen lο π 1 , π 2 get encrypted input-shares lο π 1 , π 2 do Evaluate using MPC Β‘1 Β‘2 lο π ( , π 0 do threshold Decryption If π ( , π 1 or π 2 is honest π 0 are corrupted Security by MPC FHE does not work If π 1 , π ( or π 0 is honest 2 are corrupted π Security by FHE MPC does not work FHE or MPC guarantee the security! 22
Infeasibility (Reduced to [LNO13]) P B 2 2 3 1 3 1 P A πΊ π¦ ( ,π¦ 0 ,π¦ 1 lο Suppose the class is feasible lο Let πΊ π¦ ( , π¦ 0 , π¦ 1 = π π¦ ( , π¦ 0 lο Two private sizes (in two-party) is feasible lο It contradicts [LNO13] 23
Conclusion lο Hiding two is infeasible (standard model) lο SSC model is rich for size-hiding lο Some of them are still infeasible Thank you for your attention! 24
Q&A lο How to implement SSC by steganography? uοΆ A party can hide message of an arbitrary length Adv ? Q3&5?9A8K7#*AS4W356 25
Q&A lο How to implement SSC by steganography? uοΆ A party can hide message of an arbitrary length Adv ? Q3&5?9A8K7#*AS4W356 26
Conclusion Background lο [LNO13] constructed size-hiding protocol for two parties lο They also proved the strong limitation This work lο We introduce the strong secure channel (SSC) model lο We construct size-hiding protocols in the SSC model lο We also prove the (weaker) limitation for the SSC model Thank you for your attention! 27
Set Intersection lο Police has a list of terrorists π lο Company has a list of customers π lο Police wish to compute π β© π without revealing |π| lο NaΓ―ve approach, Padding, is inefficient γ» Millionaire Problem (Population version) lο Aliens: βWhich planet has the largest population?β lο The population is related to the military power lο Its size is also related to the military power lο Padding doesnβt work since the upper-bound is too large 28
Recommend
More recommend