ajith suresh - ndss symposium

52
Ajith Suresh CrIS Lab, IISc https://www.csa.iisc.ac.in/~cris * Indian Institute of Science (IISc), Bangalore ^ Aarhus University, Denmark

Upload: others

Post on 19-Apr-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ajith Suresh - NDSS Symposium

Ajith Suresh CrIS Lab, IISc

https://www.csa.iisc.ac.in/~cris* Indian Institute of Science (IISc), Bangalore^ Aarhus University, Denmark

Page 2: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Outline

q Privacy Preserving Machine Learning (PPML)

q Secure Multi-party Computation (MPC)

q Overview of Trident Protocol

q Benchmarking Results

Page 3: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Machine Learning (ML) Prediction – An Abstraction

ModelParameters

Query

Result

Privacy ??Aladdin(Client)

Jasmine(Model Owner)

ML Algorithm

Page 4: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

ModelParameters

Query

Result

Privacy ??Aladdin(Client)

Jasmine(Model Owner)

ML Algorithm

Machine Learning (ML) Prediction – An Abstraction

Page 5: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

ModelParameters

Query

Result

Privacy ??Aladdin(Client)

Jasmine(Model Owner)

ML Algorithm

Machine Learning (ML) Prediction – An Abstraction

Page 6: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

ModelParameters

Query

Result

MPC meets ML Aladdin(Client)

Jasmine(Model Owner)

PPML Algorithm

Privacy Preserving Machine Learning (PPML)

Page 7: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Secure Multi-party Computation (MPC) [Yao’82]

ü A set of parties with private inputs wish to compute some joint function of their inputs.

ü Goals of MPC:

§ Correctness – Parties should correctly evaluate the function output.

§ Privacy – Nothing more than the function output should be revealed

Page 8: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Secure Multi-party Computation (MPC) [Yao’82]

Trusted Third Party (TTP)

Page 9: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Trusted Third Party (TTP)

Page 10: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

MPC

MPC emulates TTP

Page 11: Ajith Suresh - NDSS Symposium

AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

Page 12: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Ø A new 4PC protocol over ring in the pre-processing model

Trident protocol

Page 13: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Ø A new 4PC protocol over ring in the pre-processing model

v 4 partiesv Honest majorityv At most 1 corruption

Trident protocol

Page 14: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Ø A new 4PC protocol over ring in the pre-processing model

v Data independent pre-processingv Fast online phase

Trident protocol

Page 15: Ajith Suresh - NDSS Symposium

Sharing Semantics

Page 16: Ajith Suresh - NDSS Symposium

Pre-processing

Page 17: Ajith Suresh - NDSS Symposium

Pre-processing

Page 18: Ajith Suresh - NDSS Symposium

Online

+

=

Page 19: Ajith Suresh - NDSS Symposium

Shares of

Page 20: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Ø A new 4PC protocol over ring in the pre-processing model

Ø Malicious security with guarantee of fairness

Trident protocol

Page 21: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Ø A new 4PC protocol over ring in the pre-processing model

Ø Malicious security with guarantee of fairness

Corrupt parties arbitrarily deviate

Trident protocol

Page 22: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Ø A new 4PC protocol over ring in the pre-processing model

Ø Malicious security with guarantee of fairness

Honest parties get output whenever corrupt parties

get output

Trident protocol

Page 23: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Multiplication (!. #)

Ref Pre-processing(#elements)

Online(#elements)

Security

Araki et al’17 (3PC) 12 9 Abort

Page 24: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Multiplication (!. #)

Ref Pre-processing(#elements)

Online(#elements)

Security

Araki et al’17 (3PC)

ASTRA (3PC)

12

21

9

4

Abort

Fair

Page 25: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Multiplication (!. #)

Ref Pre-processing(#elements)

Online(#elements)

Security

Araki et al’17 (3PC)

ASTRA (3PC)

Gordon et al.’18 (4PC)

12

21

2

9

4

4

Abort

Fair

Abort

Page 26: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Multiplication (!. #)

Ref Pre-processing(#elements)

Online(#elements)

Security

Araki et al’17 (3PC)

ASTRA (3PC)

Gordon et al.’18 (4PC)

Trident

12

21

2

3

9

4

4

3

Abort

Fair

Abort

Fair

Page 27: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Ø A new 4PC protocol over ring in the pre-processing model

Ø Malicious security with guarantee of fairness

Ø Efficient Mixed World Conversions

Trident protocol

Page 28: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions

BooleanBoolean World

o Comparison, Bit Extraction …

Page 29: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions

Boolean

Arithmetic

Boolean World

o Comparison, Bit Extraction …

Arithmetic World

o Addition, Multiplication …

Page 30: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions

Boolean

Arithmetic Garbled

Boolean World

o Comparison, Bit Extraction …

Arithmetic World

o Addition, Multiplication …

Garbled World

o Division over rings …

Page 31: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions

Boolean

Arithmetic Garbled

B2A

A2B G2B

B2G

A2G

G2A

Online RoundsOnline

Communication

Up to 7x 2x - 67x

Range of improvement over ABY3

Page 32: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

min(%& + %(, %*)%,

Page 33: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

!" + x%

Page 34: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

!" + x%

Arithmetic

Page 35: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

!" + x% min(!" + !%, !+)

Arithmetic

A2B

Page 36: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

!" + x% min(!" + !%, !+)

Arithmetic Boolean

A2B

Page 37: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

!" + x% min(!" + !%, !+)

Arithmetic Boolean

A2B

B2G

Page 38: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

!" + x% min(!" + !%, !+)

!-

Arithmetic Boolean

A2B

A2G

B2G

Page 39: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

!" + x% min(!" + !%, !+)

min !" + !%, !+ ÷ !. !.

Arithmetic Boolean

A2B

A2G

B2G

Page 40: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

!" + x% min(!" + !%, !+)

min !" + !%, !+ ÷ !. !.

Arithmetic Boolean

A2B

A2G

B2G

Garbled

Page 41: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Mixed World Conversions – An Example

min(%& + %(, %*)%,

%& + x( min(%& + %(, %*)

min %& + %(, %* ÷ %, %,

Arithmetic Boolean

Garbled

A2B

G2A A2G

B2G

Page 42: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Ø A new 4PC protocol over ring in the pre-processing model

Ø Malicious security with guarantee of fairness

Ø Efficient Mixed World Conversions

Ø Special tools for PPML

Trident protocol

Page 43: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Dot Product

Ref Pre-processing(#elements)

Online(#elements)

Security

ABY3 (3PC) 12d 9d Abort

d – #elements in each vector

!∎# = %&'(

)*+ . -+

Page 44: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Dot Product

Ref Pre-processing(#elements)

Online(#elements)

Security

ABY3 (3PC)

ASTRA (3PC)

12d

21d

9d

2d+2

Abort

Fair

d – #elements in each vector

!∎# = %&'(

)*+ . -+

Page 45: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Dot Product

Ref Pre-processing(#elements)

Online(#elements)

Security

ABY3 (3PC)

ASTRA (3PC)

Trident

12d

21d

3

9d

2d+2

3

Abort

Fair

Fair

d – #elements in each vector

!∎# = %&'(

)*+ . -+

Page 46: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Tools for PPML

Dot Product

Truncation

Fixed Point Arithmetic

Comparison

Bit to Arithmetic

Bit Injection

Non-linear Activation Functions

Page 47: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Trident protocol

Ø A new 4PC protocol over ring in the pre-processing model

Ø Malicious security with guarantee of fairness

Ø Efficient Mixed World Conversions

Ø Special tools for PPML

Ø Lower monetary cost in the outsourced setting

Page 48: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Trident protocol

Ø A new 4PC protocol over ring in the pre-processing model

Ø Malicious security with guarantee of fairness

Ø Efficient Mixed World Conversions

Ø Special tools for PPML

Ø Lower monetary cost in the outsourced setting

Computation is outsourced to a set of

hired servers

Page 49: Ajith Suresh - NDSS Symposium

Benchmarking

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Ø Implemented both Trident and ABY3, using the ENCRYPTO library.

Ø Benchmarked the protocols over LAN (40 Mbps) and WAN (1 Gbps) with the Google Cloud Platform.

Ø Servers located in West Europe, East Australia, South Asia, and South East Asia.

Ø For benchmarking, we used batch sizes up to 512 and feature sizes up to 1000.

Page 50: Ajith Suresh - NDSS Symposium

Summary of Our Benchmarking Results

ML AlgorithmImprovement in terms of Online

Throughput over ABY3

Training Prediction

Linear Regression 251.84x 145.81x

Logistic Regression 34.58x 149.63x

Neural Networks 63.71x 407.12x

Convolutional Neural Networks 42.81x 741.56x

*Throughput for Training - #iterations processed by servers / minute*Throughput for Prediction - #queries processed by servers / minute

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

Page 51: Ajith Suresh - NDSS Symposium

AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020

Page 52: Ajith Suresh - NDSS Symposium

26-02-2020AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC

References

1. Andrew Chi-Chih Yao. Protocols for secure computations (extended abstract). In FOCS, pages 160-164, 1982.

2. P. Mohassel, M. Rosulek, and Y. Zhang. Fast and Secure Three party Computation: Garbled Circuit Approach. In CCS, 2015.

3. T. Araki, A. Barak, J. Furukawa, T. Lichter, Y. Lindell, A. Nof, K. Ohara, A. Watzman, and O. Weinstein. OptimizedHonest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier. In IEEE S&P, 2017.

4. J. Furukawa, Y. Lindell, A. Nof, and O. Weinstein. High-Throughput Secure Three-Party Computation for Malicious Adversariesand an Honest Majority. In EUROCRYPT, 2017.

5. K. Chida, D. Genkin, K. Hamada, D. Ikarashi, R. Kikuchi, Y. Lindell, and A. Nof. Fast Large-Scale Honest-Majority MPC forMalicious Adversaries. In CRYPTO, 2018.

6. P. Mohassel and P. Rindal, ABY3: A Mixed Protocol Framework for Machine Learning. In ACM CCS, 2018.

7. H. Chaudhari, A. Choudhury, A. Patra and A. Suresh. ASTRA: High-throughput 3PC over Rings with Application toSecure Prediction, In ACM CCSW, 2019.

8. S. D. Gordon and S. Ranellucci and X. Wang. Secure Computation with Low Communication from Cross-checking. InASIACRYPT, 2018.