Download presentation

Presentation is loading. Please wait.

Published byKaleb Storm Modified over 2 years ago

1
Secure Computation on Mobile Devices Peter Chapman http://www.cs.virginia.edu/~pmc8p CS 1120 December 2, 2011

2
Microsoft Research (Summer 2011) Web Side-Channel Leaks (2010-2011) Secure Computation on Mobile Devices (2011-Present)

3
Mutual Contact Discovery Alice Bob Sharing contact list with a stranger is unacceptable Discover! Someone nearby also knows Alice and 8 other contacts of yours!

4
Trust someone else? Alice Bob

5
The Dilemma Can we interact with others and control our data?

6
Secure Two-Party Computation Private Data: a Private Data: b Bob Alice Garbled Circuit Protocol Andrew Yao, 1982/1986

7
Yao’s Garbled Circuits InputsOutput abx 000 010 100 111 AND a b x

8
Computing with Meaningless Values? InputsOutput abx a0a0 b0b0 x0x0 a0a0 b1b1 x0x0 a1a1 b0b0 x0x0 a1a1 b1b1 x1x1 AND a 0 or a 1 b 0 or b 1 x 0 or x 1 a i, b i, x i are random values, chosen by the circuit generator but meaningless to the circuit evaluator.

9
Computing with Garbled Tables InputsOutput abx a0a0 b0b0 Enc a 0,b 0 (x 0 ) a0a0 b1b1 Enc a 0,b 1 (x 0 ) a1a1 b0b0 Enc a 1,b 0 (x 0 ) a1a1 b1b1 Enc a 1,b 1 (x 1 ) AND a 0 or a 1 b 0 or b 1 x 0 or x 1 a i, b i, x i are random values, chosen by the circuit generator but meaningless to the circuit evaluator. Bob can only decrypt one of these! Garbled And Gate Enc a 0, b 1 (x 0 ) Enc a 1,b 1 (x 1 ) Enc a 1,b 0 (x 0 ) Enc a 0,b 0 (x 0 )

10
Chaining Garbled Circuits AND a0a0 b0b0 x0x0 a1 b1b1 x1x1 OR x2x2 And Gate 1 Enc a1 0, b 1 1 (x1 0 ) Enc a1 1,b1 1 (x1 1 ) Enc a1 1,b1 0 (x1 0 ) Enc a1 0,b1 0 (x1 0 ) Or Gate 2 Enc x0 0, x 1 1 (x2 1 ) Enc x0 1,x1 1 (x2 1 ) Enc x0 1,x1 0 (x2 1 ) Enc x0 0,x1 0 (x2 0 ) … We can do any computation privately this way!

12
Yao’s Garbled Circuits InputsOutput abx 000 010 100 111 AND a b x

13
Computing with Meaningless Values? InputsOutput abx a0a0 b0b0 x0x0 a0a0 b1b1 x0x0 a1a1 b0b0 x0x0 a1a1 b1b1 x1x1 a i, b i, x i are random values, chosen by the circuit generator but meaningless to the circuit evaluator.

14
We use 80-Bit Random Numbers 11111111111111111111111111111111111111111110100001000000010001000011011000001000 1,208,925,819,614,527,173,703,176 1 septillion, 208 sextillion, 925 quintillion, 819 quadrillion, 614 trillion, 527 billion, 173 million, 703 thousand, and 176

15
Computing with Meaningless Values? InputsOutput abx a0a0 b0b0 x0x0 a0a0 b1b1 x0x0 a1a1 b0b0 x0x0 a1a1 b1b1 x1x1

16
Computing with Meaningless Values? InputsOutput abx 193b0b0 x0x0 b1b1 x0x0 a1a1 b0b0 x0x0 a1a1 b1b1 x1x1 Really 80-Bit Numbers

17
Computing with Meaningless Values? InputsOutput abx 193b0b0 x0x0 b1b1 x0x0 465b0b0 x0x0 b1b1 x1x1 Really 80-Bit Numbers

18
Computing with Meaningless Values? InputsOutput abx 193657x0x0 193b1b1 x0x0 465657x0x0 465b1b1 x1x1 Really 80-Bit Numbers

19
Computing with Meaningless Values? InputsOutput abx 193657x0x0 193255x0x0 465657x0x0 465255x1x1 Really 80-Bit Numbers

20
Computing with Meaningless Values? InputsOutput abx 193657844 193255844 465657844 465255x1x1 Really 80-Bit Numbers

21
Computing with Meaningless Values? InputsOutput abx 193657844 193255844 465657844 465255123 Really 80-Bit Numbers

22
Computing with Garbled Tables InputsOutput abx 193657Enc 193;657 (844) 193255Enc 193;255 (844) 465657Enc 465;657 (844) 465255Enc 465;255 (123) Bob can only decrypt one of these! Garbled And Gate Enc 193;255 (844) Enc 465;657 (123) Enc 465;657 (844) Enc 193;657 (844) Really 80-Bit Numbers

23
Garbled And Gate Enc 193;255 (844) Enc 465;657 (123) Enc 465;657 (844) Enc 193;657 (844) AliceBob Garbled And Gate Enc 193;255 (844) Enc 465;657 (123) Enc 465;657 (844) Enc 193;657 (844) a0a0 193

24
Oblivious Transfer AliceBob b0b0 657 b1b1 255 657 Garbled And Gate Enc 193;255 (844) Enc 465;657 (123) Enc 465;657 (844) Enc 193;657 (844) 193 844 0

25
Potential Applications Common Contacts Favorite Movies Hyper-Targeted Advertising Voting, Auctions & more! Collaborative Scheduling

26
http://MightBeEvil.com/mobile/

27
Research Advice Don’t be afraid.

29
Attributions “iPhone” symbol from thenounproject.com collection. "Lock" symbol from thenounproject.com collection.

Similar presentations

OK

Hidden Access Control Policies with Hidden Credentials Keith Frikken, Mikhail Atallah, Jiangtao Li CERIAS and Department of Computer Sciences Purdue University.

Hidden Access Control Policies with Hidden Credentials Keith Frikken, Mikhail Atallah, Jiangtao Li CERIAS and Department of Computer Sciences Purdue University.

© 2018 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on water pollution download Full ppt on electron beam machining video Ppt on network switching types Ppt on air pollution for students Ppt on ganga action plan Ppt on data collection methods for qualitative research Ppt on online shopping cart project in java Ppt on nuclear family and joint family band Ppt on population census 2011 Ppt on job evaluation sample