Professional Documents
Culture Documents
POIS
POIS
• Team Decrypters
o Greeshma Amaraneni (2020101035)
o Konduru Nithin (2020101104)
o Rahul Mallavarapu (2020101053)
o Pranathi Kokkalla (2020101083)
o Charan Sahit (2020101011)
OVERVIEW
How it works?
• Secret sharing – Each party splits their data into pieces and distributes those to other parties
• Joint computation - Parties collaborate to perform a function on their combined input
• Result combining – Parties combine the results of their computations to get final outcome
MPC ONGOING RESEARCH
• Traditional blockchains reveal transaction details, compromising user
privacy
• Traditional MPC assumes all parties are honest, but malicious actors
can disrupt computations
• Securely storing and managing credentials in digital wallets
• Training machine learning models often involves sharing sensitive data
among competitors, raising privacy concerns
• Securely auditing blockchain data while preserving transaction
privacy
• Designing Scalable MPC protocols
LITERATURE REVIEW
Characterization of Secure Multiparty Computation Without Broadcast
• What it studies:
o This research asks: Can multiple parties securely calculate something together (e.g., find the highest
income) without revealing their own data, even if some parties cheat?
o It focuses on situations where all parties get the same result (think: everyone knowing the highest
income).
• Key finding:
o If there are more honest parties than cheaters , a special condition on the calculation is needed to
keep it secure without everyone being able to broadcast information.
o If cheaters are in the majority, secure calculations require both a special condition and the ability to
broadcast information securely.
• Why it matters:
o This helps us understand the limitations of secure calculations when some participants might be
dishonest.
ROUND OPTIMAL SECURE MULTIPARTY
COMPUTATION FROM MINIMAL ASSUMPTIONS
• What it achieves:
o This research introduces a new method for secure multiparty computation (MPC) that
allows parties to jointly calculate something without revealing their private data.
o This method achieves the best possible number of communication rounds (four).
• What's new:
o Existing MPC methods often rely on complex assumptions. This work uses a simpler
assumption: the existence of a specific cryptographic tool called "four-round oblivious
transfer."
• Why it's significant:
o This research simplifies and improves secure multiparty computation, potentially leading to
more efficient and practical applications. Four-round OT is a desirable primitive for efficient
MPC.
INFORMATION-THEORETICALLY SECURE MPC
AGAINST MIXED DYNAMIC ADVERSARIES
• What it Studies: Paper focuses on information-theoretically secure MPC in the
presence of dynamic adversaries. Unlike static adversaries, dynamic
adversaries can adjust their corruption strategies after observing the
protocol, posing a formidable challenge in ensuring security.
• Key Findings:
• Thresholds are identified for efficient dynamic secure function evaluation (SFE)
and reactive MPC under information-theoretic security.
• Conditions are established for achieving perfect security in dynamic SFE and
verifiable secret sharing (VSS) with guaranteed output delivery (G.O.D.).
• Notably, perfect dynamic SFE with G.O.D. is shown to be possible under specific
conditions regarding corruption thresholds.
SECURE MULTIPARTY COMPUTATION WITH
FREE BRANCHING
• What it Studies: This paper examines secure multi-party computation (MPC)
protocols tailored for branching circuits comprising multiple sub-circuits, with
the output being that of a single "active" branch.
• Key Findings:
• A generic framework for branching MPC supporting any number of
parties is introduced.
• The communication complexity of the proposed scheme is linked to the
size of the largest branch, improving efficiency compared to previous
approaches.
• Implementation and benchmarks are provided to illustrate the
practicality of the proposed approach.
FAIR AND ROBUST MULTI-PARTY COMPUTATION
USING A GLOBAL TRANSACTION LEDGER
• Background:
• Classical MPC results show limitations in achieving fairness (all-or-nothing output)
and robustness (guaranteed output delivery) against a dishonest majority.
• This Work:
• Introduces a formal model for MPC with compensation utilizing a secure ledger
• Provides the first composition theorem for MPC with compensation, allowing safe
composition with other protocols.
• Presents a robust MPC protocol with compensation:
• Guarantees fairness through compensation.
• Ensures output delivery to honest parties.
• Discourages cheaters from disrupting the process (denial-of-service attacks).
• Requires a constant number of communication rounds for efficiency.
• Significance:
• This work paves the way for practical, secure MPC even with a potential majority
of dishonest parties.
BLOCK CHAIN
• Peer to peer network
• Blocks – Transaction data, Hash, Previous block's hash
• Decentralization – No single entity controls the block
chain
• Consensus Mechanisms - Ensures agreement among
all nodes on the validity of transactions and the
current state of the ledger.
BENEFITS & APPLICATIONS
Benefits:
• Security – Difficult to tamper with data
• Transparency - All participants can view transaction history
• Immutability – Permanent and reliable record
• Efficiency – Automating transactions and eliminating intermediaries
Applications:
• Crypto currencies – Track ownership & secure peer-peer transactions
• Supply chain management – Track movement from origin to destination
• Financial services – Secure cross-border payments, trade finance, so on
• Record Management – Sensitive data (Eg. Medical records) stored and managed
CHALLENGE
Privacy vs Transparency
Example:
Scenario: Financial institutions want to settle transactions and
calculate net positions daily. They need privacy for individual
transactions but require an accurate and agreed-upon final
settlement.
PROBLEM STATEMENT
Secure Multi-Party Computation (MPC) as a privacy-preserving mechanism
in blockchains
KEY TECHNOLOGIES
• Adversary Capabilities:
o Can read all data on the blockchain and can attempt to infer
sensitive information from transaction patterns and network
metadata.
o Cannot break cryptographic primitives used in MPC protocols and
cannot compromise the majority of the computation nodes
simultaneously.
NETWORK ASSUMPTIONS
• Semi-Honest Behavior: Participants follow the protocol but are curious. They
attempt to learn additional information from the computation but do not
deviate from the protocol.
• Input Privacy: The inputs of each participant are kept private from all other
participants and observers.
• https://www.mdpi.com/2078-
2489/13/10/481
• https://iopscience.
iop.org/article/10.1088/1742-
6596/1998/1/012003/pdf
THANK YOU!