ilic dejan - msc presentation: secure business computation by using garbled circuits in a web...
TRANSCRIPT
![Page 1: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/1.jpg)
Secure Business ComputationSecure Business Computationby using Garbled Circuits in a Web by using Garbled Circuits in a Web
EnvironmentEnvironment
da ILIĆ Dejan
svolta a SAP Research CEC KarlsruheGermania
Supervisori:[UNITS] DR. BARTOLI Alberto[SAP] M.Sc. SCHRÖPFER Axel
Università degli Studi di TriesteItalia
CDLS in Ingegneria dell’Informazione
![Page 2: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/2.jpg)
AgendaAgenda
Motivazione Preliminari sul Secure Computation Construzione del circuito binario
◦ Secure Business Computation Language◦ Binary Circuit Description Language
Web based Secure Business Computation◦ Funzione Joint Economic Lot Size
Conclusione
![Page 3: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/3.jpg)
AgendaAgenda
Motivazione Preliminari sul Secure Computation Construzione del circuito binario
◦ Secure Business Computation Language◦ Binary Circuit Description Language
Web based Secure Business Computation◦ Funzione Joint Economic Lot Size
Conclusione
![Page 4: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/4.jpg)
Pianificazione Della ProduzionePianificazione Della Produzione
Pian. della produzione
OrdineOrdine
Pian. della produzione[Parziale] spedizione [Parziale] spedizione
Repian. della produzione
Spedizione al mercato
Fornitore Acquirente
![Page 5: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/5.jpg)
Pianificazione Della ProduzionePianificazione Della Produzione
Pianificazione della produzione collaborativa
OrdineOrdine
Spedizione Spedizione
Spedizione al mercato
Pianificazione della produzione collaborativa
[Hosoda e Disney, 2006][Simatupang e Sridharan, 2002]
Fornitore
Un altroacquirente
Acquirente
![Page 6: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/6.jpg)
AgendaAgenda
Motivazione Preliminari sul Secure Computation Construzione del circuito binario
◦ Secure Business Computation Language◦ Binary Circuit Description Language
Web based Secure Business Computation◦ Funzione Joint Economic Lot Size
Conclusione
![Page 7: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/7.jpg)
Oblivious Transfer (OT)Oblivious Transfer (OT)
Bob posiede n valori, ma vuole condividerne solo uno
◦ M0, M1 ... Mn
Alice può sceglie solo un valore senza rivelazione della sua scelta c
◦ Mc
7
![Page 8: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/8.jpg)
Oblivious Transfer (OT)Oblivious Transfer (OT)
E(k)x0
x1
random messagesrandom message
k
encrypted
xCqk0 =
k1 =
M0
M1
- kc Mc=
M0
M1 c
D(q – xc)D(q – x0)
qD(q – x1)
[Catrina, 2008]
![Page 9: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/9.jpg)
Secure Circuit Evaluation ISecure Circuit Evaluation I
Codifica bit
Crea PEGTT
Bob Alice
![Page 10: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/10.jpg)
Permuted Encrypted Garbled Truth Permuted Encrypted Garbled Truth Table (PEGTT)Table (PEGTT)
x0 x1 y
0 0 0
0 1 1
1 0 1
1 1 0
x0 x1 y
w00 w1
0 w20
w00 w1
1 w21
w01 w1
0 w21
w01 w1
1 w20
x0 x1 y
w00 w1
0 Ew00(Ew1
0 (w2
0))
w00 w1
1 Ew00(Ew1
1 (w2
1))
w01 w1
0 Ew01(Ew1
0 (w2
1))
w01 w1
1 Ew01(Ew1
1 (w2
0))
x0 x1 y
w00 w1
1 Ew00(Ew1
1 (w2
1))
w01 w1
1 Ew01(Ew1
1 (w2
0))
w00 w1
0 Ew00(Ew1
0 (w2
0))
w01 w1
0 Ew01(Ew1
0 (w2
1))
(1) Truth table: (2) Garbled TT:
(3) Encrypted GTT: (4) Permuted EGTT:
![Page 11: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/11.jpg)
Secure Circuit Evaluation IISecure Circuit Evaluation II
Codificazione fili
Crea PEGTT
Encritta input
Circuito e Bob input
Receive input con OT
Valutare circuito
Circuito e Bob input
Risultato Risultato
[Yao, 1982]
Risultato
Bob Alice
![Page 12: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/12.jpg)
AgendaAgenda
Motivazione Preliminari sul Secure Computation Construzione del circuito binario
◦ Secure Business Computation Language◦ Binary Circuit Description Language
Web based Secure Business Computation◦ Funzione Joint Economic Lot Size
Conclusione
![Page 13: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/13.jpg)
Construzione Del Circuito Construzione Del Circuito BinarioBinario
I. (SBCL) Descrizione della formulaII. La formula in struttura di albero con
radiceIII. (BCDL) Oggetto descrittore del
circuito
![Page 14: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/14.jpg)
Secure Business Computation Secure Business Computation Language (SBCL)Language (SBCL)
Linguaggio specifico ad alto livello1. Dimensione delle
variabili d’ingresso2. Variabili e i loro
proprietari3. Formula
Quattro operazioni aritmetiche
SBCL Parser ad albero con radice
1: def aul t -bi t s: 32
2:3: a: Al i ce4: b: Bob5: c: Bob6: d: Al i ce7: x: Bob, Al i ce8:9: x = d/ c –
(a+b)
![Page 15: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/15.jpg)
Binary Circuit Description Binary Circuit Description Language (BCDL)Language (BCDL)
Circuito combinatorio
BCDL composto da:◦ Ingressi◦ Porte logice◦ Tabella di verità◦ Uscite◦ Proprietari
Quattro blocchi aritmetichi di construzione
Compilato da un albero con radice
/ +
–
d c a b
x = (d/c) – a+b
![Page 16: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/16.jpg)
AgendaAgenda
Motivazione Preliminari sul Secure Computation Construzione del circuito binario
◦ Secure Business Computation Language◦ Binary Circuit Description Language
Web based Secure Business Computation◦ Funzione Joint Economic Lot Size
Conclusione
![Page 17: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/17.jpg)
Web Based Secure Business Web Based Secure Business ComputationComputation
Computazione sicura tra due parti Sistema web based sul paradigma di SC
che segue il protocollo proposto da Yao◦ Scambio dei messagi tra i browser◦ Librerie crittografiche◦ Struttura della web applicazione SBC
Funzione Joint Economic Lot Size◦ Construzione dell’oggetto BCDL◦ Benchmark
![Page 18: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/18.jpg)
Scambio Dei Messagi Tra i Scambio Dei Messagi Tra i BrowserBrowser
Host/Join la sessione per lo scambio Message Box sul web server
◦ I comandi gestionali dello message box Multiple sessioni sullo web server
ses.ID
Host Guest
![Page 19: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/19.jpg)
Librerie Crittografiche Librerie Crittografiche (JavaScript)(JavaScript)
Oblivious Transfer Protocollo Yao
Le librerie svolte di RSA:◦ Chiave privata◦ Chiave publica
La libreria svolta per la tecnica 1-out-of-n◦ 1-out-of-2
La libreria svolta per OT in parallelo
Basato su Secure Hash Algorithm
E stata svolta la libreria SHA-1
Le librerie svolte per Garbled Circuits:◦ Generale◦ Host (encritta circuito)◦ Guest (valuta circuito)
![Page 20: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/20.jpg)
Struttura Della Web Struttura Della Web Applicazione SBCApplicazione SBC
Colorate: sviluppate come parte di questa tesi Jsbn.js – JavaScript BigInteger Numeri
AppYao Host
AppHost
AppOtHost
appAjaxReq.js
appDemo.jsp
Logica
UI
Service
AppBw2bw
Ot
AppGuest
Yao
appAjaxReq.js
appDemo.jsp
Bwjsbn.jsjsbn.js
Browser AJAX object Bw AJAX obj
![Page 21: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/21.jpg)
Web Based Secure Business Web Based Secure Business ComputationComputation
Sistema web based sul paradigma di SC che segue il protocollo proposto da Yao◦ Scambio dei messagi tra i browser◦ Librerie crittografiche◦ Struttura della web applicazione SBC
Funzione Joint Economic Lot Size◦ Construzione dell’oggetto BCDL◦ Benchmark
![Page 22: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/22.jpg)
Joint Economic Lot Size (JELS)Joint Economic Lot Size (JELS)
Produzione collaborativa (d publico) Fornitore tende a dimensione del lotto
più economico (fB,hB,c privati) Aquirente tende a quantità più
economica dell’ordine (fA,hA privati)
![Page 23: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/23.jpg)
Costi Del Supply Chain Contro La Costi Del Supply Chain Contro La Dimensione Del LottoDimensione Del Lotto
![Page 24: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/24.jpg)
Construzione Dell’Oggetto BCDLConstruzione Dell’Oggetto BCDL
Descrizione SBCL Oggetto BCDL
1: def aul t -bi t s: 322:3: _2df A: Al i ce4: hA: Al i ce5: _2df B: Bob6: dhB_c: Bob7: qJst ar2: Bob, Al i ce8:9: qJst ar2=
( _2df A+_2df B) / ( hA+dhB_c)
+ +
/
2dfA 2dfB hA dhB/c
qJ2
![Page 25: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/25.jpg)
Dimensioni Dell’Oggetto BCDL Dimensioni Dell’Oggetto BCDL
Porte logice
Dimensionedei variabili
Un blocco di:
(2*A[i]+D[i+1])
![Page 26: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/26.jpg)
Web Based Secure Business Web Based Secure Business ComputationComputation
Sistema web based sul paradigma di SC che segue il protocollo proposto da Yao◦ Scambio dei messagi tra i browser◦ Librerie crittografiche◦ Struttura della web applicazione SBC
Funzione Joint Economic Lot Size◦ Construzione dell’oggetto BCDL◦ Benchmark
![Page 27: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/27.jpg)
ImpostazioniImpostazioni
Work station◦ Windows Vista Enterprise SP1 32bit◦ Intel Core Duo T7300 2.0GHz◦ 2.00GB RAM
I browser◦ Mozilla FireFox 3.6◦ Google Chrome 4.0◦ Google Chrome 4.0 su macchina virtuale Linux
Ubuntu 8.4 Calcolare il tempo effettivo totale minimo
◦ Sul tempo effettivo spento fra i passi (host+guest)◦ Attorno a 10 prove
![Page 28: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/28.jpg)
JELS Benchmark Sul Tempo JELS Benchmark Sul Tempo EffettivoEffettivo
s
![Page 29: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/29.jpg)
AgendaAgenda
Motivazione Preliminari sul Secure Computation Construzione del circuito binario
◦ Secure Business Computation Language◦ Binary Circuit Description Language
Web based Secure Business Computation◦ Funzione Joint Economic Lot Size
Conclusione
![Page 30: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/30.jpg)
ConclusioneConclusione
SC è un argomento molto interessante per la crittografia moderna
Dimonstrazione della paradigma SC come il sistema basato sul web (DEMO)
Modello JELS estremamente rilevante dal punto di vista dell'industria
Lavoro futuro◦ Secure Multi-Party Computation (SMC)
![Page 31: ILIC Dejan - MSc presentation: Secure Business Computation by using Garbled Circuits in a Web Environment](https://reader036.vdocuments.mx/reader036/viewer/2022062710/55a1f9ef1a28ab756d8b479d/html5/thumbnails/31.jpg)
Grazie per l’attenzioneGrazie per l’attenzione
Le domande?