首页> 外文学位 >Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?
【24h】

Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?

机译:异构环境中的安全计算:如何使多方计算更接近实践?

获取原文
获取原文并翻译 | 示例

摘要

Many services that people use daily require computation that depends on the private data of multiple parties. While the utility of the final result of such interactions outweighs the privacy concerns related to output release, the inputs for such computations are much more sensitive and need to be protected. Secure multiparty computation (MPC) considers the question of constructing computation protocols that reveal nothing more about their inputs than what is inherently leaked by the output. There have been strong theoretical results that demonstrate that every functionality can be computed securely. However, these protocols remain unused in practical solutions since they introduce efficiency overhead prohibitive for most applications.;Generic multiparty computation techniques address homogeneous setups with respect to the resources available to the participants and the adversarial model. On the other hand, realistic scenarios present a wide diversity of heterogeneous environments where different participants have different available resources and different incentives to misbehave and collude. In this thesis we introduce techniques for multiparty computation that focus on heterogeneous settings. We present solutions tailored to address different types of asymmetric constraints and improve the efficiency of existing approaches in these scenarios. We tackle the question from three main directions:;• New Computational Models for MPC – We explore different computational models that enable us to overcome inherent inefficiencies of generic MPC solutions using circuit representation for the evaluated functionality. First, we show how we can use random access machines to construct MPC protocols that add only polylogarithmic overhead to the running time of the insecure version of the underlying functionality. This allows to achieve MPC constructions with computational complexity sublinear in the size for their inputs, which is very important for computations that use large databases.;We also consider multivariate polynomials which yield more succinct representations for the functionalities they implement than circuits, and at the same time a large collection of problems are naturally and efficiently expressed as multivariate polynomials. We construct an MPC protocol for multivariate polynomials, which improves the communication complexity of corresponding circuit solutions, and provides currently the most efficient solution for multiparty set intersection in the fully malicious case.;• Outsourcing Computation – The goal in this setting is to utilize the resources of a single powerful service provider for the work that computationally weak clients need to perform on their data. We present a new paradigm for constructing verifiable computation (VC) schemes, which enables a computationally limited client to verify efficiently the result of a large computation. Our construction is based on attribute-based encryption and avoids expensive primitives such as fully homomorphic encryption and probabilistically checkable proofs underlying existing VC schemes. Additionally our solution enjoys two new useful properties: public delegation and verification.;We further introduce the model of server-aided computation where we utilize the computational power of an outsourcing party to assist the execution and improve the efficiency of MPC protocols. For this purpose we define a new adversarial model of non-collusion, which provides room for more efficient constructions that rely almost completely only on symmetric key operations, and at the same time captures realistic settings for adversarial behavior. In this model we propose protocols for generic secure computation that offload the work of most of the parties to the computation server. We also construct a specialized server-aided two party set intersection protocol that achieves better efficiencies for the two participants than existing solutions.;Outsourcing in many cases concerns only data storage and while outsourcing the data of a single party is useful, providing a way for data sharing among different clients of the service is the more interesting and useful setup. However, this scenario brings new challenges for access control since the access control rules and data accesses become private data for the clients with respect to the service provide. We propose an approach that offers trade-offs between the privacy provided for the clients and the communication overhead incurred for each data access.;• Efficient Private Search in Practice – We consider the question of private search from a different perspective compared to traditional settings for MPC. We start with strict efficiency requirements motivated by speeds of available hardware and what is considered acceptable overhead from practical point of view. Then we adopt relaxed definitions of privacy, which still provide meaningful security guarantees while allowing us to meet the efficiency requirements. In this setting we design a security architecture and implement a system for data sharing based on encrypted search, which achieves only 30% overhead compared to non-secure solutions on realistic workloads.
机译:人们每天使用的许多服务都需要根据多方私有数据进行计算。尽管此类交互的最终结果的实用性超过了与输出释放相关的隐私问题,但此类计算的输入更为敏感,需要加以保护。安全多方计算(MPC)考虑了构建计算协议的问题,该协议仅能揭示其输入,而不会透露输出所固有的泄漏。有强大的理论结果表明,可以安全地计算每个功能。但是,这些协议在实际解决方案中仍未使用,因为它们引入了大多数应用程序无法承受的效率开销。通用的多方计算技术针对参与者可用的资源和对抗模型解决了同类设置。另一方面,现实情况呈现出各种各样的异构环境,其中不同的参与者具有不同的可用资源以及不同的行为不端和串通动机。在本文中,我们介绍了专注于异构设置的多方计算技术。我们提供了专门为解决不同类型的不对称约束而设计的解决方案,并提高了这些方案中现有方法的效率。我们从三个主要方向解决该问题:•MPC的新计算模型–我们探索了不同的计算模型,这些模型使我们能够使用电路表示来评估功能,从而克服通用MPC解决方案固有的效率低下的问题。首先,我们展示了如何使用随机访问机器来构造MPC协议,该协议仅将多对数开销添加到基础功能的不安全版本的运行时间上。这样就可以实现MPC构造,其输入的计算复杂度为次线性,这对于使用大型数据库的计算非常重要。;我们还考虑了多元多项式,对于它们实现的功能比在电路上产生更简洁的表示,并且在同时,大量问题自然而有效地表示为多元多项式。我们为多元多项式构造了一个MPC协议,该协议提高了相应电路解决方案的通信复杂性,并在完全恶意的情况下为多方集交集提供了当前最有效的解决方案。•外包计算–此设置的目标是利用单个功能强大的服务提供商的资源,用于计算能力较弱的客户端需要对其数据执行的工作。我们提出了一种构造可验证计算(VC)方案的新范例,该范例使受计算限制的客户端能够有效地验证大型计算的结果。我们的构造基于基于属性的加密,避免了昂贵的原语,例如完全同态加密和现有VC方案基础上的概率可检验的证明。此外,我们的解决方案还具有两个新的有用属性:公共委派和验证。我们进一步介绍了服务器辅助计算的模型,其中我们利用了外包方的计算能力来协助执行和提高MPC协议的效率。为此,我们定义了一个新的非共谋对抗模型,该模型为更高效的构造提供了空间,该构造几乎完全仅依赖于对称键操作,同时捕获了对抗行为的现实设置。在此模型中,我们提出了用于通用安全计算的协议,这些协议将大多数各方的工作分担给计算服务器。我们还构建了一种专门的服务器辅助两方集交叉协议,该协议可为两个参与者实现比现有解决方案更高的效率;在许多情况下,外包仅涉及数据存储,而外包单方数据则非常有用,这为服务的不同客户端之间的数据共享是更有趣和有用的设置。但是,由于访问控制规则和数据访问已成为客户端相对于服务提供而言的私有数据,因此此方案给访问控制带来了新的挑战。我们提出一种方法,该方法在为客户提供的隐私与每次数据访问所产生的通信开销之间进行权衡。;•有效的私人搜索实践–与传统设置相比,我们从不同的角度考虑私人搜索的问题MPC。我们从严格的效率要求入手,这些要求是由可用硬件的速度以及从实际角度来看可接受的开销所激发的。然后我们采用宽松的隐私定义,它仍然提供有意义的安全保证,同时使我们能够满足效率要求。在这种情况下,我们设计了一个安全体系结构,并实现了一个基于加密搜索的数据共享系统,与针对实际工作负载的非安全解决方案相比,该方法仅实现了30%的开销。

著录项

  • 作者

    Raykova, Mariana.;

  • 作者单位

    Columbia University.;

  • 授予单位 Columbia University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 300 p.
  • 总页数 300
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号