7 - Secure Multi-Party Computation [ID:33868]
50 von 693 angezeigt

Welcome to the lecture Secure Multi-Party Computation.

We are now at Lecture number 6 and my name is Dominik Schröder.

So let me briefly recall what we did in the last lecture and then I will give an outline

what we are going to cover in this part of the lecture.

In the previous lecture we essentially took a look at the simpler definition.

And the simpler definition in fact covered the case of deterministic functionalities.

Simpler definitions are very useful for many reasons because first of all if they cover

many functionalities then they are much easier to work with and also in many cases they are

in fact easier to understand.

So deterministic functionalities are actually functionalities that are quite common.

So if you essentially think about oblivious transfer, right once you fix the inputs then

the functionality itself is deterministic.

Next we introduced the very beautiful and amazing protocol of Yaw called Yaw Scabbard

circuit.

And the amazing idea of Yaw Scabbard circuit of course is first of all to transfer the

algorithm that you would like to compute in a circuit.

I mean that's not his idea but his idea was to work on circuits.

And then essentially his observation that if you look at Boolean circuits, something

like an OR or an AND for example, then if we basically look at the corresponding truth

table, then his idea was essentially to transform this truth table into something that loses

the connection to its inputs and that was essentially the step of replacing the input

with random values which means we then get also truth table but for example with keys

k00, k01 and k10, k11.

And then the observation was to essentially use these keys as an encryption key and then

to encrypt the resulting value which is a 0 or 1 that was also interpreted as a key

and to perform this double encryption of this value.

And this you are then repeating for all of the entries.

And then the main question was now how can this circuit be evaluated and that was essentially

done in two steps.

Just let me very briefly write a very simplified version.

We have the sender and the receiver.

The sender is the one that gobbles the circuit and the basic idea was that he essentially

sends the gobbled version and the keys corresponding to its own inputs k0, ks1 until ksn.

And afterwards they are essentially running an oblivious transfer protocol where the sender

inputs the remaining keys and the receiver gets the keys corresponding to its own inputs.

So this was a very rough description of course of the protocol.

So what we are going to do in this lecture is essentially take a look again at Yaw's

protocol.

And in particular we are looking at the security proof.

So the security proof that you see in this lecture was given in the previous lecture

and I essentially combined the two videos.

So I hope you like the topic so far.

I look forward to seeing you in the question and answer session and thank you for your

attention.

I mean a short version of Yaw's protocol.

Of course if you look at the foundations of gobbled circuit paper you can do this way

more formal but I think for the intuition what is really going on this is totally fine.

So the sender has the input x and the receiver has the input y.

And the auxiliary input is the Boolean circuit that they would like to compute.

So this is known to both parties.

Teil einer Videoserie :

Zugänglich über

Offener Zugang

Dauer

01:17:06 Min

Aufnahmedatum

2021-06-07

Hochgeladen am

2021-06-07 16:37:06

Sprache

en-US

Proof of Yao 

Einbetten
Wordpress FAU Plugin
iFrame
Teilen