SlideShare ist ein Scribd-Unternehmen logo
1 von 57
David Evans
University of Virginia
http://www.cs.virginia.edu/evans
http://MightBeEvil.com
Oregon Security Day
5 April 2013
(De)Motivating Application:
“Genetic Dating”
2
AliceBob
Genome Compatibility
Protocol
Your offspring will have
good immune systems!
Your offspring will have
good immune systems!
WARNING!
Don’t Reproduce
WARNING!
Don’t Reproduce
3
Cost to sequence human genome
Moore’s Law prediction
(halve every 18 months)
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
Aug2001
Feb2002
Aug2002
Feb2003
Aug2003
Feb2004
Aug2004
Feb2005
Aug2005
Feb2006
Aug2006
Feb2007
Aug2007
Feb2008
Aug2008
Feb2009
Aug2009
Feb2010
Aug2010
Feb2011
Aug2011
Feb2012
Aug2012
Feb2013
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
Aug2001
Feb2002
Aug2002
Feb2003
Aug2003
Feb2004
Aug2004
Feb2005
Aug2005
Feb2006
Aug2006
Feb2007
Aug2007
Feb2008
Aug2008
Feb2009
Aug2009
Feb2010
Aug2010
Feb2011
Aug2011
Feb2012
Aug2012
Feb2013
4
Cost to sequence human genome
Moore’s Law prediction
(halve every 18 months)
Ion torrent Personal Genome Machine
Human Genome Sequencing Using Unchained Base Reads on Self-Assembling DNA Nanoarrays. Radoje
Drmanac, Andrew B. Sparks, Matthew J. Callow, Aaron L. Halpern, Norman L. Burns, Bahram G. Kermani, Paolo
Carnevali, Igor Nazarenko, Geoffrey B. Nilsen, George Yeung, Fredrik Dahl, Andres Fernandez, Bryan Staker,
Krishna P. Pant, Jonathan Baccash, Adam P. Borcherding, Anushka Brownley, Ryan Cedeno, Linsu Chen, Dan
Chernikoff, Alex Cheung, Razvan Chirita, Benjamin Curson, Jessica C. Ebert, Coleen R. Hacker, Robert Hartlage,
Brian Hauser, Steve Huang, Yuan Jiang, Vitali Karpinchyk, Mark Koenig, Calvin Kong, Tom Landers, Catherine Le,
Jia Liu, Celeste E. McBride, Matt Morenzoni, Robert E. Morey, Karl Mutch, Helena Perazich, Kimberly Perry, Brock
A. Peters, Joe Peterson, Charit L. Pethiyagoda, Kaliprasad Pothuraju, Claudia Richter, Abraham M. Rosenbaum,
Shaunak Roy, Jay Shafto, Uladzislau Sharanhovich, Karen W. Shannon, Conrad G. Sheppy, Michel Sun, Joseph V.
Thakuria, Anne Tran, Dylan Vu, Alexander Wait Zaranek, Xiaodi Wu, Snezana Drmanac, Arnold R. Oliphant,
William C. Banyai, Bruce Martin, Dennis G. Ballinger, George M. Church, Clifford A. Reid. Science, January 2010.
6
Dystopia
Personalized Medicine
Secure Two-Party Computation
7
AliceBob
Bob’s Genome: ACTG…
Markers (~1000): *0,1, …, 0+
Alice’s Genome: ACTG…
Markers (~1000): [0, 0, …, 1]
Can Alice and Bob compute a function of their private
data, without exposing anything about their data besides the
result?
Secure Function Evaluation
Alice (circuit generator) Bob (circuit evaluator)
Garbled Circuit Protocol
Andrew Yao, 1982/1986
Regular Logic
Inputs Output
a b x
0 0 0
0 1 0
1 0 0
1 1 1
AND
a b
x
Computing with Meaningless Values?
Inputs Output
a b x
a0 b0 x0
a0 b1 x0
a1 b0 x0
a1 b1 x1
AND
a0 or a1 b0 or b1
x0 or x1
ai, bi, xi are random
values, chosen by the
circuit generator but
meaningless to the
circuit evaluator.
Computing with Garbled Tables
Inputs Output
a b x
a0 b0 Enca0,b0
(x0)
a0 b1 Enca0,b1
(x0)
a1 b0 Enca1,b0
(x0)
a1 b1 Enca1,b1
(x1)
AND
a0 or a1 b0 or b1
x0 or x1
Bobcanonlydecrypt
oneofthese!
Garbled And Gate
Enca0, b1
(x0)
Enca1,b1
(x1)
Enca1,b0
(x0)
Enca0,b0
(x0)
Random
Permutation
Garbled Gate
Enca0, b1
(x0)
Enca1,b1
(x1)
Enca1,b0
(x0)
Enca0,b0
(x0)
Garbled Circuit Protocol
Alice (circuit generator)
Sends ai to Bob
based on her input
value
Bob (circuit evaluator)
How does the Bob learn his own input wires?
Primitive: Oblivious Transfer
Alice Bob
Oblivious Transfer
Protocol
Oblivious: Alice doesn’t learn which secret Bob obtains
Transfer: Bob learns one of Alice’s secrets
Rabin, 1981; Even, Goldreich, and Lempel, 1985; many subsequent papers
Chaining Garbled Circuits
14
AND
a0 b0
x0
AND
a1 b1
x1
OR
x2
And Gate 1
Enca10, b11
(x10)
Enca11,b11
(x11)
Enca11,b10
(x10)
Enca10,b10
(x10)
Or Gate 2
Encx00, x11
(x21)
Encx01,x11
(x21)
Encx01,x10
(x21)
Encx00,x10
(x20)
…
We can do any computation privately this way!
Building Computing Systems
15
Encx00, x11
(x21)
Encx01,x11
(x21)
Encx01,x10
(x21)
Encx00,x10
(x20)
Digital Electronic Circuits Garbled Circuits
Operate on known data Operate on encrypted wire labels
One-bit logical operation requires
moving a few electrons a few
nanometers
(hundreds of Billions per second)
One-bit logical operation requires
performing (up to) 4 encryption
operations: very slow execution
Reuse is great! Reuse is not allowed for privacy:
huge circuits needed
Fairplay
16
Dahlia Malkhi, Noam Nisan,
Benny Pinkas and Yaron Sella
[USENIX Sec 2004]
SFDL Program
SFDL
Compiler
Circuit
(SHDL)
Alice Bob
Garbled Tables
Generator
Garbled Tables
Evaluator
SFDL
Compiler
Faster Circuit Execution
17
Yan Huang
(UVa PhD Student)
Graduate
Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster Secure
Two-Party Computation Using Garbled Circuits. USENIX Security 2011.
Pipelined Execution
Optimized Circuit Library
Partial Evaluation
Encx00, x11
(x21)
Encx01,x11
(x21)
Encx01,x10
(x21)
Encx20, x21
(x30)
Encx21,x21
(x30)
Encx21,x20
(x31)
Encx20, x31
(x41)
Encx21,x31
(x41)
Encx21,x30
(x40)
Encx40, x31
(x51)
Encx41,x31
(x50)
Encx41,x30
(x50)
Encx40, x51
(x61)
Encx41,x51
(x60)
Encx41,x50
(x60)
Encx30, x61
(x71)
Encx31,x61
(x70)
Encx31,x60
(x71)
Pipelined Execution
18
Circuit-Level
Application
GC Framework
(Evaluator)
GC Framework
(Generator)
Circuit StructureCircuit Structure
x41
x21
x31
x60
x51
x71
Saves memory: never need to keep whole circuit in memory
Pipelining
Circuit Generation
Circuit
Transmission
Circuit
Evaluation
Circuit Generation
Circuit Transmission
time
Circuit Evaluation
Waiting I d l i n g
19
Waiting
Saves time: reduces
latency and improves
throughput
0
0.2
0.4
0.6
0.8
1
1.2
Fairplay [PSSW09] TASTY Here
Billions
Results
0
2
4
6
8
10
Fairplay [PSSW09] TASTY Here
x10000
Performance
(10,000x non-free gates per second)
Scalability
(billions of gates)
[HEKM11]
[HEKM11]
20
100000gates/second
Semi-Honest is Half-Way There
Privacy
Nothing is revealed
other than the output
Correctness
The output of the
protocol is indeed f(x,y)
Generator Evaluator
As long as evaluator doesn’t send
result back, and a malicious-
resistant OT is used, privacy for
evaluator is guaranteed.
How can we get both correctness, and maintain
privacy while giving both parties result?
21
Dual Execution Protocols
Yan Huang, Jonathan Katz, and David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-
Honest Protocols with Dual Execution. IEEE Security and Privacy (Oakland) 2012.
Dual Execution Protocol
[Mohassel and Franklin, PKC’06+
Alice Bob
first round execution (semi-honest)generator evaluator
generatorevaluator
z=f(x, y)
Pass if z = z’ and correct wire labels
z’, learned
output
wire labels
second round execution (semi-honest)
z'=f(x, y)
z, learned
output
wire labels
fully-secure, authenticated equality test
Security Properties
Correctness: guaranteed by authenticated,
secure equality test
Privacy: Leaks one (extra) bit on average
adversarial circuit generator provides a
circuit that fails on ½ of inputs
Malicious generator can decrease likelihood of being caught, and
increase information leaked when caught (but decreases average
information leaked): at extreme, circuit fails on just one input
24
1-bit Leak
25
Cheating detected
Proving Security: Malicious
26
A B
Ideal World
y 'x'
Adversary
receives:
f (x‘, y‘)
TrustedPartyinIdealWorld
Standard Malicious Model: can’t prove this for Dual Execution
Real World
A B
y 'x'
Show equivalence
Corrupted
party behaves
arbitrarily
Secure Computation Protocol
Proof of Security: One-Bit Leakage
27
A B
Ideal World
y 'x'
Controlled by
malicious A
g R {0, 1}
g is an arbitrary
Boolean function
selected by
adversary
Adversary receives:
f (x‘, y') and g(x‘, y‘)
TrustedPartyinIdealWorld
Can prove equivalence to this for Dual Execution protocols
Implementation
Alice Bob
first round execution (semi-honest)generator evaluator
z=f(x, y)
Pass if z = z’ and correct wire labels
z’, learned
output
wire labels
generatorevaluator second round execution (semi-honest)
z'=f(x, y)
z, learned
output
wire labels
Recall: work to generate is 3x work to evaluate!
28
fully-secure, authenticated equality test
0
50
100
150
200
250
PSI (4096) ED (200x200) AES (100) AES (1)
Time(seconds)
Semi-honest
DualEx (dual-core)
DualEx (single-core)
Malicious
Performance
29
Circuits of arbitrary size can be done this way
[Kreuter et al., USENIX Security 2012]
Less than 1 second
Applications
30
Privacy-Preserving
Biometric Matching
Private
Personal
Genomics
Private Set Intersection
Private AES
Encryption
Problem
Best Previous
Result Our Result Speedup
Private Set Intersection (contact
matching, common disease carrier)
Competitive with best custom protocols,
scales to millions of 32-bit elements
Hamming Distance (Face
Recognition)
213s
[SCiFI, 2010]
0.051s 4176
Levenshtein Distance (genome,
text comparison) – two 200-
character inputs
534s
[Jha+, 2008]
18.4s 29
Smith-Waterman (genome
alignment) – two 60-nucleotide
sequences
[Not
Implementable]
447s -
AES Encryption 3.3s
[Henecka, 2010]
0.2s 16.5
Fingerprint Matching (1024-entry
database, 640x8bit vectors)
~83s
[Barni, 2010]
18s 4.6
31
NDSS
2011
USENIXSecurity2011
NDSS
2012
Crazy Things in Typical Code
32
a[i] = x
Circuit for Array Update
33
i == 0
a[0] x
a'[0]
a[i] = x
i == 1
a[1] x
a’[1]
i == 2
a[2] x
a’[2]
…
Easy (and Common) Case
34
for (i = 0; i < n; i++)
a[i] += 1
a[0] a[1] a[2] a[n-1]…
+1 +1 +1 +1
Design circuits to support typical
data structures efficiently
Non-trivial access patterns, but
patterns nonetheless
Main opportunities:
Locality and Batching
35
Samee Zahur and David Evans. Circuit Structures
for Improving Efficiency of Security & Privacy Tools.
IEEE Security and Privacy (Oakland) 2013.
Samee Zahur
(UVa PhD Student)
Locality: Stacks and Queues
36
if (x != 0)
a[i] += 1
if (a[i] > 10)
i += 1
a[i] = 5
t := a.top() + 1
a.cond_update(x != 0, t)
a.cond_push(x != 0 && t > 10, *)
a.cond_update(x != 0, 5)
Data-oblivious code
No branching allowed
Naïve Conditional Push
37
…p
x a[0] a[1] a[2] …
a’[0] a’[1] a’[2] …
Naïve Conditional Push
38
…True
7 2 9 3 …
7 2 9 …
More Efficient Stack
39
Level 0: 2 9 3
t = 3
Level 1: 4 7
t = 2
5 4
Level 2: 8 8 2 3 8
…
Block size = 2level
Each level has 5 blocks, at least 2 full and 2 empty
t = 3
40
2 9 3
t = 3
4 7
t = 2
5 4
Level 0
t = 3
Level 1 Level2
Conditional push (True, 7)
7 2 9 3
t = 4
4 7
t = 2
5 4
t = 3
Conditional push (True, 8)
8 7 2 9 3
t = 5
4 7
t = 2
5 4
t = 3
8 2 7
t = 3
4 7
t = 3
5 49 3
t = 3
Shift
41
2 9 3
t = 3
4 7
t = 2
5 4
Level 0
t = 3
Level 1 Level
7 2 9 3
t = 4
4 7
t = 2
5 4
t = 3
Conditional push (True, 8)
8 7 2 9 3
t = 5
4 7
t = 2
5 4
t = 3
8 2 7
t = 3
4 7
t = 3
5 49 3
t = 3
Amortized
Θ(log n) gates
per operation
0 2 7 9
'A'
'U'
'M'
'R'
'D'
'Y'
'K'
'C'
Arbitrary Array Accesses
(Associative Maps)
42
m[0] = 'A'
m[2] = 'U'
m[9] = 'M'
m[7] = 'R'
m[0] = 'D'
m[9] = 'Y'
m[9] = 'K'
m[7] = 'C'
Execution trace: indexes and
values are private values
43
m[0] = 'A'
m[2] = 'U'
m[9] = 'M'
m[7] = 'R'
m[0] = 'D'
m[9] = 'Y'
m[9] = 'K'
m[7] = 'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Batching Updates
44
m[0] = 'A'
m[2] = 'U'
m[9] = 'M'
m[7] = 'R'
m[0] = 'D'
m[9] = 'Y'
m[9] = 'K'
m[7] = 'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Batching Updates
45
'A'
'U'
'M'
'R'
'D'
'Y'
'K'
'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Compare
Adjacent
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
Batching Updates
46
'A'
'U'
'M'
'R'
'D'
'Y'
'K'
'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Compare
Adjacent
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
Batching Updates
47
Batching Updates
'A'
'U'
'M'
'R'
'D'
'Y'
'K'
'C'
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Compare
Adjacent
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
48
Sort by Key
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
stable sort!
Compare
Adjacent
m[0] = 'A'
m[0] = 'D'
m[2] = 'U'
m[7] = 'R'
m[7] = 'C'
m[9] = 'M'
m[9] = 'Y'
m[9] = 'K'
m[0] = 'D'
m[2] = 'U'
m[7] = 'C'
m[9] = 'K'
m[0] = 'A'
m[7] = 'R'
m[9] = 'M'
m[9] = 'Y'
Sortby
Liveness
output
wires
Discarded
Associative Map Cost
49
Oblivious Stable Sort
Comparisons and Liveness
Marking
Oblivious Sort
Liveness/Key
Circuit Size:
Θ(n log n) ⨯comparison
cost
Θ(n log2 n)
Example Application: DBScan
50
Density-based clustering:
depth-first search to find dense clusters
Martin Ester, Hans-Peter Kriegel, Jörg
Sander, Xiaowei Xu. KDD 1996
Alice’s Data Bob’s Data Joint Clusters
51
Private Input: P – array of points (combines
private points from both parties)
Public inputs: minpts, radius
Output: cluster number for each point
Conditional Push!
Array update!
52
0
5000
10000
15000
20000
25000
30000
35000
40000
60 120 240 480
ExecutionTime(seconds)
Data Size
Optimized Structures
Normal Data Structures
9.7 hours
55 minutes
53
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
Aug2001
Mar2002
Oct2002
May2003
Dec2003
Jul2004
Feb2005
Sep2005
Apr2006
Nov2006
Jun2007
Jan2008
Aug2008
Mar2009
Oct2009
May2010
Dec2010
Jul2011
Feb2012
Sep2012
Apr2013
Cost to sequence human genome
Moore’s Law prediction
(halve every 18 months)
54
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
Aug2001
Mar2002
Oct2002
May2003
Dec2003
Jul2004
Feb2005
Sep2005
Apr2006
Nov2006
Jun2007
Jan2008
Aug2008
Mar2009
Oct2009
May2010
Dec2010
Jul2011
Feb2012
Sep2012
Apr2013
FairPlay (2004) [10k*10k alignment]
Free XOR
HEKM
Schneider & Zhoner 2013
55
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
$1,000,000,000
$10,000,000,000
$100,000,000,000
Aug2001
Mar2002
Oct2002
May2003
Dec2003
Jul2004
Feb2005
Sep2005
Apr2006
Nov2006
Jun2007
Jan2008
Aug2008
Mar2009
Oct2009
May2010
Dec2010
Jul2011
Feb2012
Sep2012
Apr2013
Semi-Honest
56
$1,000
$10,000
$100,000
$1,000,000
$10,000,000
$100,000,000
$1,000,000,000
$10,000,000,000
$100,000,000,000
Aug2001
Mar2002
Oct2002
May2003
Dec2003
Jul2004
Feb2005
Sep2005
Apr2006
Nov2006
Jun2007
Jan2008
Aug2008
Mar2009
Oct2009
May2010
Dec2010
Jul2011
Feb2012
Sep2012
Apr2013
Active Security
Semi-Honest
KSS 2011
HKE 2013
1-bit leak
57
mightbeevil.com
Questions?

Weitere ähnliche Inhalte

Ähnlich wie Scaling Secure Computation

Deep Learning for New User Interactions (Gestures, Speech and Emotions)
Deep Learning for New User Interactions (Gestures, Speech and Emotions)Deep Learning for New User Interactions (Gestures, Speech and Emotions)
Deep Learning for New User Interactions (Gestures, Speech and Emotions)Olivia Klose
 
Find nuclei in images with U-net
Find nuclei in images with U-netFind nuclei in images with U-net
Find nuclei in images with U-netDing Li
 
Development of a low cost pc-based single-channel eeg monitoring system
Development of a low cost pc-based single-channel eeg monitoring systemDevelopment of a low cost pc-based single-channel eeg monitoring system
Development of a low cost pc-based single-channel eeg monitoring systemMd Kafiul Islam
 
Digit recognizer by convolutional neural network
Digit recognizer by convolutional neural networkDigit recognizer by convolutional neural network
Digit recognizer by convolutional neural networkDing Li
 
Gan seminar
Gan seminarGan seminar
Gan seminarSan Kim
 
SPIE Conference V3.0
SPIE Conference V3.0SPIE Conference V3.0
SPIE Conference V3.0Robert Fry
 
Combinational logic 1
Combinational logic 1Combinational logic 1
Combinational logic 1Heman Pathak
 
nlp dl 1.pdf
nlp dl 1.pdfnlp dl 1.pdf
nlp dl 1.pdfnyomans1
 
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...Aritra Sarkar
 
Computer architecture
Computer architectureComputer architecture
Computer architectureRvishnupriya2
 
Computer architecture
Computer architectureComputer architecture
Computer architecturevishnu973656
 
f33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.pptf33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.pptMaddulaCharishma
 
4366 chapter7
4366 chapter74366 chapter7
4366 chapter7Sai Kumar
 
Deep learning study 2
Deep learning study 2Deep learning study 2
Deep learning study 2San Kim
 
f37-book-intarch-pres-pt1.ppt
f37-book-intarch-pres-pt1.pptf37-book-intarch-pres-pt1.ppt
f37-book-intarch-pres-pt1.pptrickjones250264
 
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...Victor Asanza
 
clegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdfclegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdfaoecmtin
 

Ähnlich wie Scaling Secure Computation (20)

Deep Learning for New User Interactions (Gestures, Speech and Emotions)
Deep Learning for New User Interactions (Gestures, Speech and Emotions)Deep Learning for New User Interactions (Gestures, Speech and Emotions)
Deep Learning for New User Interactions (Gestures, Speech and Emotions)
 
Find nuclei in images with U-net
Find nuclei in images with U-netFind nuclei in images with U-net
Find nuclei in images with U-net
 
Development of a low cost pc-based single-channel eeg monitoring system
Development of a low cost pc-based single-channel eeg monitoring systemDevelopment of a low cost pc-based single-channel eeg monitoring system
Development of a low cost pc-based single-channel eeg monitoring system
 
Digit recognizer by convolutional neural network
Digit recognizer by convolutional neural networkDigit recognizer by convolutional neural network
Digit recognizer by convolutional neural network
 
Gan seminar
Gan seminarGan seminar
Gan seminar
 
SPIE Conference V3.0
SPIE Conference V3.0SPIE Conference V3.0
SPIE Conference V3.0
 
eel6935_ch2.pdf
eel6935_ch2.pdfeel6935_ch2.pdf
eel6935_ch2.pdf
 
Combinational logic 1
Combinational logic 1Combinational logic 1
Combinational logic 1
 
nlp dl 1.pdf
nlp dl 1.pdfnlp dl 1.pdf
nlp dl 1.pdf
 
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
Self-configuring Classical Logic Gate Circuits using Genetic Programming in J...
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
f33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.pptf33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.ppt
 
4366 chapter7
4366 chapter74366 chapter7
4366 chapter7
 
Deep learning study 2
Deep learning study 2Deep learning study 2
Deep learning study 2
 
14911259.ppt
14911259.ppt14911259.ppt
14911259.ppt
 
f37-book-intarch-pres-pt1.ppt
f37-book-intarch-pres-pt1.pptf37-book-intarch-pres-pt1.ppt
f37-book-intarch-pres-pt1.ppt
 
Chapter 5 boolean algebra
Chapter 5 boolean algebraChapter 5 boolean algebra
Chapter 5 boolean algebra
 
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
 
clegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdfclegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdf
 

Mehr von David Evans

Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!David Evans
 
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksTrick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksDavid Evans
 
Hidden Services, Zero Knowledge
Hidden Services, Zero KnowledgeHidden Services, Zero Knowledge
Hidden Services, Zero KnowledgeDavid Evans
 
Anonymity in Bitcoin
Anonymity in BitcoinAnonymity in Bitcoin
Anonymity in BitcoinDavid Evans
 
Midterm Confirmations
Midterm ConfirmationsMidterm Confirmations
Midterm ConfirmationsDavid Evans
 
Scripting Transactions
Scripting TransactionsScripting Transactions
Scripting TransactionsDavid Evans
 
Mining Economics
Mining EconomicsMining Economics
Mining EconomicsDavid Evans
 
Becoming More Paranoid
Becoming More ParanoidBecoming More Paranoid
Becoming More ParanoidDavid Evans
 
Asymmetric Key Signatures
Asymmetric Key SignaturesAsymmetric Key Signatures
Asymmetric Key SignaturesDavid Evans
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyDavid Evans
 
Class 1: What is Money?
Class 1: What is Money?Class 1: What is Money?
Class 1: What is Money?David Evans
 
Proof of Reserve
Proof of ReserveProof of Reserve
Proof of ReserveDavid Evans
 
Blooming Sidechains!
Blooming Sidechains!Blooming Sidechains!
Blooming Sidechains!David Evans
 
Useful Proofs of Work, Permacoin
Useful Proofs of Work, PermacoinUseful Proofs of Work, Permacoin
Useful Proofs of Work, PermacoinDavid Evans
 
Alternate Cryptocurrencies
Alternate CryptocurrenciesAlternate Cryptocurrencies
Alternate CryptocurrenciesDavid Evans
 

Mehr von David Evans (20)

Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!Cryptocurrency Jeopardy!
Cryptocurrency Jeopardy!
 
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksTrick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for Cypherpunks
 
Hidden Services, Zero Knowledge
Hidden Services, Zero KnowledgeHidden Services, Zero Knowledge
Hidden Services, Zero Knowledge
 
Anonymity in Bitcoin
Anonymity in BitcoinAnonymity in Bitcoin
Anonymity in Bitcoin
 
Midterm Confirmations
Midterm ConfirmationsMidterm Confirmations
Midterm Confirmations
 
Scripting Transactions
Scripting TransactionsScripting Transactions
Scripting Transactions
 
Bitcoin Script
Bitcoin ScriptBitcoin Script
Bitcoin Script
 
Mining Economics
Mining EconomicsMining Economics
Mining Economics
 
Mining
MiningMining
Mining
 
The Blockchain
The BlockchainThe Blockchain
The Blockchain
 
Becoming More Paranoid
Becoming More ParanoidBecoming More Paranoid
Becoming More Paranoid
 
Asymmetric Key Signatures
Asymmetric Key SignaturesAsymmetric Key Signatures
Asymmetric Key Signatures
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Class 1: What is Money?
Class 1: What is Money?Class 1: What is Money?
Class 1: What is Money?
 
Proof of Reserve
Proof of ReserveProof of Reserve
Proof of Reserve
 
Silk Road
Silk RoadSilk Road
Silk Road
 
Blooming Sidechains!
Blooming Sidechains!Blooming Sidechains!
Blooming Sidechains!
 
Useful Proofs of Work, Permacoin
Useful Proofs of Work, PermacoinUseful Proofs of Work, Permacoin
Useful Proofs of Work, Permacoin
 
Alternate Cryptocurrencies
Alternate CryptocurrenciesAlternate Cryptocurrencies
Alternate Cryptocurrencies
 
Script
ScriptScript
Script
 

Kürzlich hochgeladen

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Scaling Secure Computation

Hinweis der Redaktion

  1. Circuit structure is small and can be reused;Each GT can be used only once.Significance: 1) allow GC to easily scale to arbitrary problem size; 2) indirectly improves time efficiency;
  2. People have done this before. What’s new here is achieving performance &amp; scalability needed for realistic problems.