Title: Trusted Computing Amidst Untrustworthy Intermediaries
1Trusted Computing Amidst Untrustworthy
Intermediaries
Mike Langston Department of Computer
Science University of Tennessee currently on
leave to Computer Science and Mathematics
Division Oak Ridge National Laboratory USA
2Overview
Highly Parallel Scalable Network Variable
Topology Internet Like But Untrusted!
Programs
Data
3Possible Solutions
- Accept faulty results.
- Uh, no thanks.
- Authenticate/verify by central authority.
- Unrealistic, does not scale.
- Exploit complexity and checkability.
- Problems in NP can be hard to solve -- but
they are - always easy to check!
- No need for centralized control,
ownership, - or verification.
4A Little Complexity Theory
The Classic View
easy
P
NP
S
P
PSPACE
2
5A Little Complexity Theory
easy
NP-complete
P
NP
S
P
PSPACE
2
hard
6A Little Complexity Theory
fuggettaboutit
easy
P
NP
S
P
PSPACE
2
hard
7Parameter Sensitivity Instance(n,k)
- Suppose our problem is, say, NP-complete.
- Consider an algorithm with a time bound such as
O(2kn). - And now one with a time bound more like O(2kn).
8Parameter Sensitivity Instance(n,k)
- Suppose our problem is, say, NP-complete.
- Consider an algorithm with a time bound such as
O(2kn). - And now one with a time bound more like O(2kn).
- Both are exponential in parameter value(s).
9Parameter Sensitivity Instance(n,k)
- Suppose our problem is, say, NP-complete.
- Consider an algorithm with a time bound such as
O(2kn). - And now one with a time bound more like O(2kn).
- Both are exponential in parameter value(s).
- But what happens when k is fixed?
10Parameter Sensitivity Instance(n,k)
- Suppose our problem is, say, NP-complete.
- Consider an algorithm with a time bound such as
O(2kn). - And now one with a time bound more like O(2kn).
- Both are exponential in parameter value(s).
- But what happens when k is fixed?
- Fixed Parameter Tractability confines
superpolynomial behavior to the parameter.
11Complexity Theory, Revised
Hence, the Parameterized View
solvable (even if NP-complete)
W1
W2
XP
FPT
12Complexity Theory, Revised
The Parameterized View
solvable (even if NP-hard!)
W1
W2
XP
FPT
heuristics only
13Complexity Theory, Revised
The Parameterized View
I said fuggettaboutit!
solvable (even if NP-hard!)
W1
W2
XP
FPT
heuristics only
14Target Problems
- Not membership in P (assuming P?NP)
- hard to compute
-
15Target Problems
- Not membership in P (assuming P?NP)
- hard to compute
-
- Membership in NP
- easy to check
-
16Target Problems
- Not membership in P (assuming P?NP)
- hard to compute
-
- Membership in NP
- easy to check
-
- Fixed Parameter Tractable
- use kernelization and branching
17Kernelization
- Consider Clique and Vertex Cover
-
- High Degree Rule(s)
- Low Degree Rule(s)
- LP, Crown Reductions
- kernel of linear size, and extreme density
- the hard part of the problem instance
18Branching
- Lets stay with Clique and Vertex Cover
- Bounded tree search
- Depth at most k
- With this technique, we can now solve vertex
cover in O(1.28kn) time - Easily parallelizable
- No processor sees anothers work, nor the
original graph
19Branching as A Form of Cyber Security
Data decomposition
Answer check (NP certificate)
.
Untrusted intermediaries cannot deduce data
Nor can they spoof answers
. . . . . .
20Overall Appeal
- Verifiability
- easy to check answers a faulty or malicious
processor cannot invalidate or subvert
computations
21Overall Appeal
- Verifiability
- easy to check answers a faulty or malicious
processor cannot invalidate or subvert
computations - Security
- damage from intrusion contained strong
concealment of the total problem is a natural
part of this method
22Overall Appeal
- Verifiability
- easy to check answers a faulty or malicious
processor cannot invalidate or subvert
computations - Security
- damage from intrusion contained strong
concealment of the total problem is a natural
part of this method - Scalability
- branching translates into partitioning no a
priori bounds on the degree of parallelism
23Overall Appeal
- Verifiability
- easy to check answers a faulty or malicious
processor cannot invalidate or subvert
computations - Security
- damage from intrusion contained strong
concealment of the total problem is a natural
part of this method - Scalability
- branching translates into partitioning no a
priori bounds on the degree of parallelism - Robustness
- subtrees are compartmentalized processes can be
reassigned at will
24Research Thrusts
- Range of amenable problems?
- FPT
- non FPT
- Ubiquity of untrustworthy processors?
- grid computing
- unbrokered resource sharing
- Relationship to traditional forms of security?
- internet-style lightweight security
- no heavyweight authentication needed