22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

feature of the framework is that it is fully asynchronous: local computations are independent of<br />

the relative ordering of messages coming from different communication channels. This allows<br />

for much simpler modeling and analysis of cryptographic protocols, which does not need a<br />

sequential ordering of all events. Besides making the formal proof of secure computation<br />

protocols more manageable, the framework has also potential efficiency benefits: as messages<br />

can be transmitted as soon as they can be computed (without compromising the security of the<br />

protocol), this may results in distributed protocols with lower latency. As a proof of concept, the<br />

paper analyzes two simple protocols, one for secure broadcast, and one for verifiable secret<br />

sharing, which demonstrate how the framework is capable to deal with probabilistic protocols,<br />

still in a simple and equational way.<br />

Stanford’s work has focused on different forms of homomorphic encryption and began with<br />

introducing a concept called "targeted malleability" which is designed to limit the homomorphic<br />

operations that can be done on encrypted data[13]. The primary motivation for this is to limit<br />

what can be done on ciphertexts. For example, a spam filter operating on encrypted data should<br />

only be allowed to run the spam predicate and nothing else. Several constructions for this<br />

concept have been provided.<br />

Next, Sanford turned to optimizing fully homomorphic encryption. They first developed a variant<br />

of the BGV system that eliminates the need for the expensive modulus switching step[6]. This<br />

variant also enables us to use any modulus, including a power of 2, which can result in more<br />

efficient arithmetic. The resulting system has become known as Brakerski's FHE, named after<br />

the post-doc who developed it as part of the PROCEED program. Along the same lines Stanford<br />

also looked at a recent proposal for FHE due to Bogdanov and Lee which constructs an efficient<br />

FHE from coding theoretic assumptions[14]. They showed that the Bogdanov-Lee proposal is<br />

insecure, and in fact, any construction using their approach will be insecure[15].<br />

Using these new FHE systems the team at Stanford built a prototype system that computes<br />

statistics on encrypted data, such as mean, standard deviation, and linear regression. The<br />

implementation is based on an optimized version of Brakerski's FHE that takes advantage of its<br />

arithmetic properties. Stanford also used large-scale batching to speed-up much of the<br />

computation. The resulting system can perform linear regression on moderate size encrypted data<br />

sets within a few hours on a single laptop. Parallelism can bring this down to a few minutes.<br />

Finally, since the underlying mechanism behind FHE is based on hard problems on lattices,<br />

which are assumed to remain secure in the presence of quantum computers, Stanford looked at<br />

secure cryptographic primitives in the age of quantum computation. In particular, they built<br />

Message Authentication Codes that remains secure even when the devices using them are<br />

quantum[16]. One of the team’s instantiations is a lattice-based MAC the presumably remains<br />

secure in a post-quantum settings.<br />

4.2 Technology Transitions and Deliverables<br />

The Stanford team developed a prototype system for performing statistical analysis on encrypted<br />

data. Their work focused on two tasks: computing the mean and variance of univariate and<br />

multivariate data as well as performing linear regression on a multidimensional, encrypted<br />

corpus. Due to the high overhead of homomorphic computation, previous implementations of<br />

Approved for Public Release; Distribution Unlimited.<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!