A Brief Story of Computing on Private Data Ten H Lai Ohio State University.

Slides:



Advertisements
Similar presentations
FULLY HOMOMORPHIC ENCRYPTION
Advertisements

Public Key Infrastructure and Applications
Fully Homomorphic Encryption over the Integers
Lattices, Cryptography and Computing with Encrypted Data
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
+ Accelerating Fully Homomorphic Encryption on GPUs Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar ECE Dept., Worcester Polytechnic Institute.
Paper by: Craig Gentry Presented By: Daniel Henneberger.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Digital Signatures. Anononymity and the Internet.
FULLY HOMOMORPHIC ENCRYPTION
1 Information Security – Theory vs. Reality , Winter 2011 Lecture 14: More on vulnerability and exploits, Fully homomorphic encryption Eran.
FULLY HOMOMORPHIC ENCRYPTION IBM T. J. Watson Vinod Vaikuntanathan from the Integers Joint Work with M. van Dijk (MIT & RSA labs), C. Gentry (IBM), S.
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
Outsourcing Private RAM Computation Daniel Wichs Northeastern University with: Craig Gentry, Shai Halevi, Mariana Raykova.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Cryptography
Two Round MPC via Multi-Key FHE Daniel Wichs (Northeastern University) Joint work with Pratyay Mukherjee.
Simons Institute, Cryptography Boot Camp
CSC2110 Discrete Mathematics Tutorial 6 Chinese Remainder Theorem, RSA and Primality Test Hackson Leung.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Homomorphic Encryption: WHAT, WHY, and HOW
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Quantum Homomorphic Encryption
Network Encryption Vince Ceccarelli Group 7 TC 200.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits (cont.), fully homomorphic encryption Eran Tromer.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
P1. Public-Key Cryptography and RSA 5351: Introduction to Cryptography Spring 2013.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
* Write in your agenda : * Preposition Practice * Fiction/Plot * Homework: Read for AR * Honors: All American Slurp (Plot Diagram and Summary)
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Secure Multi-party Computation Minimizing Online Rounds Seung Geol Choi Columbia University Joint work with Ariel Elbaz(Columbia University) Tal Malkin(Columbia.
Succinct Functional Encryption: d Reusable Garbled Circuits and Beyond
Polynomially Homomorphic Signatures Dan Boneh Stanford University Joint work with David Freeman.
FULLY HOMOMORPHIC ENCRYPTION WITH POLYLOG OVERHEAD Craig Gentry and Shai Halevi IBM Watson Nigel Smart Univ. Of Bristol.
Elliptic Curve Cryptography
FHE Introduction Nigel Smart Avoncrypt 2015.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 4, 2014 Homomorphic Encryption over Polynomial Rings.
Encryption CS110: Computer Science and the Internet.
1 Information Security – Theory vs. Reality , Winter Lecture 11: Fully homomorphic encryption Lecturer: Eran Tromer Including presentation.
Based on work with: Sergey Gorbunov and Vinod Vaikuntanathan Homomorphic Commitments & Signatures Daniel Wichs Northeastern University.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 3, 2014 Fully Homomorphic Encryption and Bootstrapping.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 3, 2014 Somewhat Homomorphic Encryption.
KEYNOTE OF THE FUTURE 1: CIARA MOORE CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
The Many Faces of Garbled Circuits MIT Vinod Vaikuntanathan.
Fully Homomorphic Encryption (FHE) By: Matthew Eilertson.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Digital Signatures.
Lesson 7: Public Key Cryptography Lesson 8: Rapid Research - Cybercrime Day 37.
Attack on Fully Homomorphic Encryption over Principal Ideal Lattice
Verifiable Oblivious Storage
Rivest, Shamir and Adleman
Rishab Goyal Venkata Koppula Brent Waters
Oblivious Transfer.
Presentation transcript:

A Brief Story of Computing on Private Data Ten H Lai Ohio State University

Agenda Computing on private data Fully homomorphic encryption (FHE) Gentry’s bootstrapping theorem Our result

FHE: The Holy Grail of Cryptography

Cloud Computing ServersStoragesNetworksApplications

天上有多少星星 城裡有多少姑娘 但人間只有一個妳 天上只有一顆月亮

Cloud Computing 6 Cloud server Internet Encrypt

Computing on private data 7 Cloud server Internet Encrypt

Computing on private data Cloud 8  A question proposed by Rivest, Aldeman, Dertouzos in 1978 (one year after RSA was invented).

C-Homomorphism

C-homomorphic

RSA is multiplicatively homomorphic

Fully Homomorphic Encryption (FHE)

15

16

17

18 Bootstrapping

19 m m sk A Decrypt m encrypted under a pink key pk A Evaluate Decrypt m

m m sk A m m Decrypt Evaluate Decrypt 20 Encrypt under a blue key pk B Evaluate Decrypt

sk A NAND m 1 NAND m 2 NAND-augmented Decrypt circuit: 21 m1m1 m2m2

Decrypt sk A c 1 sk A c 2 NAND m 1 NAND m 2 Evaluate 22 fresh m1m1 m2m2

23 m 1 NAND m 2 23 fresh m1m1 m2m2 sk A Under a pink key PK A Under a blue key PK B

24 m1m1 m2m2 m 1 NAND m 2 Increased noise

25

sk A m 1 m 2 m 1 NAND m 2 Evaluate Decrypt-NAND sk A m 3 m 4 m 3 NAND m 4 Evaluate Decrypt-NAND m 1 NAND m 2 m 3 NAND m 4 Evaluate Decrypt-NAND sk B (m 1 NAND m 2 ) NAND (m 3 NAND m 4 ) 26

sk A m 1 m 2 m 1 NAND m 2 Evaluate Decrypt-NAND sk A m 3 m 4 m 3 NAND m 4 Evaluate Decrypt-NAND m 1 NAND m 2 m 3 NAND m 4 Evaluate Decrypt-NAND sk B (m 1 NAND m 2 ) NAND (m 3 NAND m 4 ) 27

28 Decrypt NAND

29

30 Encryption key Decryption key Evaluation key

31 Decrypt

32

33 Encryption key Decryption key Evaluation key

34

35

… level d level 1 36

… Decrypt circuits level d level 1 37

Decrypt circuits … 38

39

40

41 Encryption key Decryption key Evaluation key

42

43

44 Decrypt NAND

45

46 Secret-key independent, Computationally intensive, Done with encryption Secret-key dependent Decryption algorithm

47

48 FHE is still in its infantry

Multi-Key/Multi-Scheme FHE

Single-key FHE 50

Is Multi-key FHE Possible? 51

Is Multi-scheme FHE Possible? 52

53

54

55

56

Evaluate circuit C Evaluate(C) Problem

Eval(C) If under pk 1 C

Eval(C) Eval( Eval(C) ) Under pk 2 C

Evaluate(C) ? C

?

62

Trivial encryptions

Eval(C) Eval( Eval(C) ) Summary of ideas C

65 C

69