Secure Computation of Surveys - PowerPoint PPT Presentation

About This Presentation
Title:

Secure Computation of Surveys

Description:

Workshop on Secure Multiparty Protocols (SMP 2004) Secure Computation of Surveys Joan Feigenbaum Benny Pinkas Raphael S. Ryger Felipe Saint Jean Surveys and other ... – PowerPoint PPT presentation

Number of Views:65
Avg rating:3.0/5.0
Slides: 19
Provided by: yaleEdu21
Learn more at: http://www.cs.yale.edu
Category:

less

Transcript and Presenter's Notes

Title: Secure Computation of Surveys


1
Workshop on Secure Multiparty Protocols (SMP
2004)
  • Secure Computation of Surveys
  • Joan Feigenbaum
  • Benny Pinkas
  • Raphael S. Ryger
  • Felipe Saint Jean

2
Surveys and other Naturally Centralized
Multiparty Computations
  • Consider
  • Sealed-bid auctions
  • Elections
  • Referenda
  • Surveys
  • Each participant weighs the hoped-for payoffs
    against any revelation penalty (loss of
    privacy) and is concerned that the computation
    be fault-free and honest.
  • The implementor, in control of the central
    computation, must configure auxiliary payoffs and
    privacy assurances to encourage (honest)
    participation.

3
CRA Taulbee SurveyComputer Science Faculty
Salaries
  • Computer science departments in four tiers,
    12 12 12 all the rest
  • Academic faculty in four ranks
    full, associate, and assistant
    professors, and non-tenure-track
    teaching faculty
  • Intention Convey salary distribution statistics
    per tier-rank to the community at large
    without revealing department-specific information.

4
CRA Taulbee SurveyThe Current Computation
  • Inputs, per department and faculty rank
  • Minimum
  • Maximum
  • Median
  • Mean
  • Outputs, per tier and faculty rank
  • Minimum, maximum, mean of department minima
  • Minimum, maximum, mean of department maxima
  • Median of department means (not weighted)
  • Mean (weighted mean of department means)

5
CRA Taulbee SurveyThe Problem
  • CRA wishes to provide fuller statistics than the
    meager data currently collected can support.
  • The current level of data collection already
    compromises department-specific information.
    Asking for submission of full faculty-salary
    information greatly raises the threshold for
    trust in CRA's intentions and its security
    competence. Furthermore, detailed disclosure,
    even if anonymized, may be explicitly prohibited
    by the school.
  • Hence, there is a danger of significant
    non-participation in the Taulbee Survey.

6
Communication PatternGeneral Secure Function
Evaluation
7
Communication PatternSurveys (Insecure, Natural
Computation),or SFE Ideal Model (Trusted Party)
8
Communication PatternM-for-N-Party Secure
Function Evaluation
9
Real-World Human-InputNetwork Computation
  • Opportunistic participation Input is provided
    if/when humans, computers, and networking are
    available and operative. The exact participation
    is not predictable.
  • The function being computed, then, is not known
    until the input-collection phase is closed, at
    which point the participants are generally no
    longer available for interaction.
  • Solution Two major modular phases,
  • secure collection of (N) inputs into M-node hub
  • M-party secure function evaluation
  • The entire process to be supervised by a control
    node.

10
CRA Taulbee SurveySecure Input Collection
Participant
Control
Register
11
CRA Taulbee SurveySecure Input Collection
Participant
Control
Register
Log In
Participant
Control
Session ID
12
CRA Taulbee SurveySecure Input Collection
Participant
Control
Register
Session ID, Data Shares
Compute 1
Log In
Participant
Control
Session ID
Session ID, Data Shares
Compute 2
13
CRA Taulbee SurveySecure Input Collection
Participant
Control
Register
Session ID, Data Shares
Compute 1
Session ID, Data Points
Log In
Participant
Control
Session ID
Session ID, Data Points
Session ID, Data Shares
Compute 2
14
CRA Taulbee SurveySecure Input Collection
Participant
Control
Register
Session ID, Data Shares
Compute 1
Session ID, Data Points
Log In
Participant
Control
Session ID
Acknowledgment
Session ID, Data Points
Session ID, Data Shares
Compute 2
15
CRA Taulbee SurveySecurely evaluate what
function(s)?
  • The implemented prototype supports secure
    computation of salary distribution statistics in
    each tier-rank.
  • Exactly the same approach is applicable to the
    secure computation of distribution statistics for
    the departmental rank aggregates minima,
    maxima, medians, and means for each rank, for
    each tier.
  • The approach strives to compute as little as
    possible securely, a minimal secure computation
    feeding a postprocessing phase that computes the
    statistics CRA wishes to publish.

16
CRA Taulbee SurveyThe Proposed Computation (1)
  • Secure input collection (control aside)
  • Salary and rank data entry by department head
  • Per rank, in JavaScript, computation of XOR
    shares of the individual salaries for the two (M
    2) computation servers
  • Per rank, HTTPS transmission of XOR shares to
    their respective computation servers
  • CRA closes the input-collection phase, and then
    ...

17
CRA Taulbee SurveyThe Proposed Computation (2)
  • Per tier and rank, construction of a Boolean
    circuit to
  • reconstruct inputs by XOR-ing their shares
  • sort the inputs in an odd-even sorting network
  • Secure computation, per tier and rank
  • Fairplay implementation of the Yao two-party SFE
    protocol for the constructed circuit and the
    collected input shares
  • output is a sorted list of all salaries in the
    tier-rank
  • Postprocessing, per tier and rank
  • arbitrary, insecure computation on the sorted,
    cross-departmental salary list

18
Open Questions
  • Input sanity checking in a privacy-preserving
    system lacking strong natural incentives for
    truthfulness and accuracy
  • data-entry error trapping
  • detection/deterrence of intentional, possibly
    gross misrepresentation by participants
  • Traditional SFE considerations regarding
    maliciousness, as they arise in the M-for-N-party
    protocol setting
  • Economy of the core (symmetric) SFE protocols
  • Economy of the Boolean circuits and of their
    generation.
  • The legal difficulty uncharted territory.
Write a Comment
User Comments (0)
About PowerShow.com