English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113313/144292 (79%)
Visitors : 50949603      Online Users : 984
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/73572
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/73572


    Title: 安全多方計算腳本語言smcSL之效能改進
    Performance enhancements for smcSL, a scripting language for secure multi-party computation
    Authors: 李家宇
    Li, Jia Yu
    Contributors: 陳恭
    Chen, Kung
    李家宇
    Li, Jia Yu
    Keywords: 安全多方計算
    隱私保護
    領域專屬語言
    編譯器優化
    Secure multi-party computation
    Privacy protection
    Domain-specific language
    Optimizing compiler
    Date: 2014
    Issue Date: 2015-03-02 10:13:24 (UTC+8)
    Abstract: 安全多方計算(Secure multi-party computation, SMC)的研究主要是針對分散環境下的兩方或多方在計算一個約定函數問題時,能夠在不透漏彼此私有資料的情況下,不失安全性的計算出結果。smcSL 爲一個安全多方計算腳本語言,是為了能夠自動化使用符合安全需求的函式庫(SMC-Protocol)而發展出來的。目前此腳本語言runtime以Ruby執行,且產生盡量多的smc運算來確保安全性。我們的研究將針對以上兩個限制去改寫編譯器,讓它能夠產生C++目的碼並在不失安全性的前提下改寫expression運算,進而減少smc運算的數量以達到效率的提升。由於數學中二元運算存在Rule1:交換律和結合律、Rule2:分配律等性質, 使得expression的改寫能不影響運算結果。編譯器會透過重排順序、提出因數等方式改寫expression,讓不必要的 smc二元運算子降為local運算,使得smcSL的效能獲得改進。
    Secure multiparty computation (SMC) involves computing functions with inputs from two or more parties in a distributed network while ensuring that no additional information, other than what can be inferred from each participant`s input and output, is revealed to parties not privy to that information.
    Recently, language-based tools are emerging to better support the systematic development of SMC protocols. In particular, smcSL is a scripting language developed by our laboratory for automating the development of complex protocols for an information-theoretical approach to secure multiparty computation. This scripting language models the participating parties in a peer-to-peer symmetric manner that each party holds their private data as well as any intermediate results jointly. The smcSL language enables users to express their requirements of "the right to use a piece of data" in a simple yet abstract way and its compiler can detect any potential breaches of those security requirements specified in a user script.
    However, for safety purpose, the compiler generates object code by using a lot of SMC protocols. This conservative strategy leads to inefficient runtime performance. This thesis investigates how to apply compiler optimization techniques such as algebraic simplification to improve the runtime performance of generated code. Specifically, we enhance the compiler with an optimization module that uses associative, commutative and distributive law to rewrite computation expressions so that unnecessary invocations of SMC protocols will be replaced by execution of local computations. As a result, the computation and communication cost of generated code will be reduced explicitly.
    Reference: [1] Andrew C. Yao . Protocols for secure computation. SFCS 1982: Proceedings of 23rd Annual IEEE Symposium on Foundations of Computer Science; 1982 Nov 3-5; 1982. P. 160-4

    [2] Andrew C. Yao. How to generate and exchange secrets. In IEEE Symposium on Foundations of Computer Science(FOCS’ 86), pages 162-167.IEEE, 1986.

    [3] Pascal Paillier, Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology – EUROCRYPT’ 99, volume 1592 of LNCS, pages 223 – 238. Springer, 1999.

    [4] Ivan Damgard and Mats Jurik. A generalization, a simplification and some applications of paillier’s probabilistic public-key system. In Public-Key Cryptography(PKC’ 01), volume 1992 of LNCS, page 119-136.Springer, 2001.

    [5] Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. Fully homomorphic encryption over the integers. In Advances in Cryptology – EUROCRYPT’ 10, LNCS, page 24-43. Springer, 2010.

    [6] Donald Beaver. Commodity-based cryptography(extended abstract), STOC 1997: Proceedings of the 29th Annual ACM Symposium on Theory of Computing; 1997 May 4-6; El Paso, Texas, USA. New York, NY, USA: ACM Press; 1997. p.446-55.

    [7] Wenliang Du, Zhijun Zhan. A practical approach to solve Secure Multi-party Computation problems, NSPW 2002: Proceedings of the 2002 Workshop on New Security Paradigms; 2002 Sep 23-26; Virginia Beach, Virginia USA. New York, NY, USA:ACM Press; 2002. p. 127-35

    [8] Da-Wei Wang, Chrun-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu, “Information Theoretical Analysis of Two-Party Secret Computation,”Data and Application Security, Lecture Notes in Computer Science, number 4127, Springer, page 310-317, July 2006.

    [9] Chih-HaoShen, Justin Zhan, Da-Wei Wang, Tsan-Sheng Hsu, Churn-Jung Liau, “Information-Theoretically Secure Number-Product Protocol,” 2007 International Conference on Machine Learning and Cybernetics, volume 5, pages 3006-3011, August 2007.

    [10] I-Cheng Wang, Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-Jung Liau, and Da-Wei Wang, “Towards Empirical Aspects of Secure Scalar Product,” IEEE Transactions on Systems, Man, and Cybernetics, volume 39, pages 440-447, July 2009.

    [11] 蕭名宏,基於多方安全計算之算術運算,國立政治大學資訊科學系,碩士論文,民99年7月。

    [12] 黃文楷,安全多方計算協定描述語言之設計與實作,國立政治大學資訊科學系,碩士論文,民100年7月。

    [13] 翁宸暉,模組化之安全多方計算領域專屬腳本語言,國立政治大學資訊科學系,碩士論文,民102年7月。

    [14] Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella. Fairplay – a secure two-party computation system. In Proceedings of USENIX Security Symposium, pages 287 -302, Aug. 2004.

    [15] Janus Dam Nielsen and Micheal I. Schwartzbach. A domain-specific programming language for secure multiparty computation. In Workshop on Programming Languages and Analysis for Security(PLAS’ 07), page 21-30. ACM, 2007.

    [16] Peter Bogetoft, Dan Lund Christensen, Ivan Damg˚ard, Martin Geisler,
    Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas Toft. Secure Multparty Computation Goes Live. In 13th International Conference on Financial Cryptography and Data Security; 2009 Feb 23-26; Barbados. 2009. p. 325-43.

    [17] Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg. TASTY: Tool for Automating Secure Two-partY computations. In ACM Conference on Computer and Communication Security(ACM CCS’ 10), page 451-462. ACM, 2010.
    [18] I.C. Wang, Kung Chen, J.H. Lee, T.S. Hsu, C.J. Liau, P.Y. Wang, and D.W. Wang, ”On Applying Secure Multiparty Computation: A Case Report”, Proc. Of Asia-Pacific Association Medical Informatics(APAMI 2009), Hiroshima, Japan, Nov. 22-24, 2009.

    [19] 疾病管制局,登革色疾病負擔之估計與應用,行政院衛生署疾病管制局97年度科技研究發展計畫。

    [20] Chih-Hao Shen, Justin Zhany, Da-Wei Wang, Tsan-sheng Hsu, Churn-Jung Liau. Information-theoretically Secure Number-product Protocol. Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, 19-22 August 2007.

    [21] Florian Kerschbaum, “Expression Rewriting for Optimizing Secure Computation”, In Conference on Data and Application Security and Privacy, 2013.
    Description: 碩士
    國立政治大學
    資訊科學學系
    101753033
    103
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0101753033
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat
    303301.pdf2532KbAdobe PDF2576View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback