TPMPC 2024
The 10. Theory and Practice of Multi-Party Computation Workshop (TPMPC 2024) will be held in Darmstadt, Germany from Monday, June 3rd to Thursday, June 6th, 2024.
Location: TU Darmstadt, City Campus, Hochschulstr., 64289 Darmstadt, Germany
Registration
Registration is open and can be done here. The deadline for registration is 12 May 2024, 11:59 PM (AoE).
For those requiring a visa invitation letter for travel, kindly send your request via email to tpmpc2024@encrypto.cs.tu-darmstadt.de with the following subject: "Visa invitation letter: <Your name>".
Preliminary program
The program consists of talks by invited speakers as well as several contributed talks and a rump session. The preliminary program is as follows.
Monday, 3 June 2024
08:00-08:45: -------------------------------------------REGISTRATION-------------------------------------------------
08:45-09:00: -------------------------------------------OPENING REMARKS-------------------------------------------
09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------
09:00-09:50: Invited Talk - Distributed Discrete Logarithms and Applications, Part I.
Pierre Meyer (Aarhus University)
09:50-10:40: Invited Talk - Distributed Discrete Logarithms and Applications, Part II.
Lawrence Roy (Aarhus University)
10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------
11:10-12:25: -------------------------------------------SESSION 2--------------------------------------------------------
11:10-11:35: Advanced FHE and MPC Protocols for the Blockchain.
Daniel Demmler (Zama)
11:35-12:00: Analysing Dutch public transport data with MPC.
Meilof Veeningen (Roseman Labs)
12:00-12:25: Integrating Sharemind MPC into Carbyne Stack.
Riivo Talviste (Cybernetica)
12:25-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------
14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------
14:00-14:50: Invited Talk - Verifiable Homomorphic Secret Sharing.
Aarushi Goel (NTT Research)
14:50-15:15: Scalable Multiparty Computation from Non-linear Secret Sharing.
Mingyuan Wang (UC Berkley)
15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------
15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------
15:45-16:35: Invited Talk - Achieving Asynchronous MPC with Linear Communication and Optimal Resilience.
Yifan Song (Tsinghua University)
16:35-17:00: Perfect Asynchronous MPC with Linear Communication Overhead.
Arpita Patra (Indian Institute of Science)
17:00 ----------------------------------------------------END OF THE DAY-----------------------------------------------
Tuesday, 4 June 2024
09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------
09:00-09:50: Invited Talk - A Bigger Picture of Secure Multi-Party Computation.
Marina Blanton (University of Buffalo)
09:50-10:15: Malicious Security for Sparse Private Histograms.
Lennart Braun (Aarhus University)
10:15-10:40: Willow: Secure Aggregation with Asynchronous Clients.
Phillipp Schoppmann (Google)
10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------
11:10-12:25: -------------------------------------------SESSION 2: DIVERSITY EVENT-------------------------------
12:25-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------
14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------
14:00-14:50: Invited Talk - Practical Secure Machine Learning.
Divya Gupta (Microsoft Research, India)
14:50-15:15: Sigma: Secure GPT Inference with Function Secret Sharing.
Neha Jawalkar (Indian Institute of Science)
15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------
15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------
15:45-16:35: Invited Talk - Sharing without Showing: Building Secure Collaborative Systems by Co-designing Systems and Cryptography.
Wenting Zheng (Carnegie Mellon University)
16:35-17:00: Revitalizing Privacy-Preserving Machine Learning: Introducing FANNG-MPC for Actively Secure MLaaS.
Abdelrahaman Aly and Ajith Suresh (Technology Innovation Institute)
17:30-19:00 -------------------------------------------GUIDED TOUR TO MATHILDENHÖHE----------------------
19:00 ----------------------------------------------------END OF THE DAY-----------------------------------------------
Wednesday, 5 June 2024
09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------
09:00-09:50: Invited Talk - On the round-complexity of secure multi-party computation.
Michele Ciampi (University of Edinburgh)
09:50-10:15: Rational Secure Computation: New Definitions and Constructions.
Siddharth Agarwal (Indian Institute of Science)
10:15-10:40: On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC.
Jan Bobolz (University of Edinburgh)
10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------
11:10-12:25: -------------------------------------------SESSION 2--------------------------------------------------------
11:10-12:00: Invited Talk - The Communication Complexity of Oblivious Transfer.
Nico Döttling (CISPA)
12:00-12:25: Multipars: Reduced-Communication MPC over Z2k.
Sebastian Hasler (University of Stuttgart)
12:25-12:35: -------------------------------------------GROUP PHOTO--------------------------------------------------
12:35-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------
14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------
14:00-14:50: Invited Talk - On Broadcast and Identifiability in MPC.
Divya Ravi (University of Amsterdam)
14:50-15:15: Distributed Randomness using Weighted VRFs.
Benny Pinkas (Bar-Ilan University)
15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------
15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------
15:45-16:10: Garbling gadgets and its applications to oblivious garbling.
Rahul Satish (ITU Copenhagen)
16:10-16:35: Adaptive Distributional Security for Garbling Schemes with O(|x|) Online Complexity.
Kirthivaasan Puniamurthy (Aalto University)
16:35-17:00:Threshold Garbled Circuits with Low Overhead.
Schuyler Rosefield (Northeastern University)
17:00-17:45 -------------------------------------------INDUSTRY EVENT----------------------------------------------
17:45-20:00 -------------------------------------------RUMP SESSION AND DINNER--------------------------------
20:00 ----------------------------------------------------END OF THE DAY-----------------------------------------------
Thursday, 6 June 2024
09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------
09:00-09:50: Invited Talk - Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity.
Peihan Miao (Brown University)
09:50-10:15: Optimizing Preprocessing for Maliciously Secure MPC: Faster Matrix Multiplications and Convolutions without Sacrifice.
Marc Rivinius (University of Stuttgart)
10:15-10:40: Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs.
Nikolas Melissaris (Aarhus University)
10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------
11:10-12:25: -------------------------------------------SESSION 2--------------------------------------------------------
11:10-12:00: Invited Talk - Private Set Union (PSU).
Ni Trieu (Arizona State University)
12:00-12:25: Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators.
Amit Agarwal (University of Illinois Urbana-Champaign)
12:25-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------
14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------
14:00-14:25: Asterisk: Super-fast MPC with a Friend.
Protik Paul (Indian Institute of Science)
14:25-14:50: Preprocessing 4 Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer.
Matan Hamilis (Reichman University)
14:50-15:15: Threshold ECDSA in Three Rounds.
Yashvanth Kondi (Silence Laboratories)
15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------
15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------
15:45-16:10: A lesson about the UC security of optimized MPC implementations.
Peter Scholl (Aarhus University)
16:10-16:35: Malicious Security for SCALES - Outsourced Computation with Ephemeral Servers.
Anasuya Acharya (Bar-Ilan University)
16:35-17:00: SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation.
Robin William Hundt (Technical University of Darmstadt)
17:00-17:10 -------------------------------------------CLOSING REMARKS----------------------------------------------
Student stipends
We have a limited number of stipends to support students to attend the workshop. Preference will be given to students who have limited funding from other sources (e.g., from institutions without access to large travel funds).
The deadline for stipend applications is 04 April 2024.
Initial decisions will be made by 19 April 2024.
Requests can be made after 04 April 2024, but they will not be considered until the initial decisions are made.
To be considered for the stipend, the applicant should send an email to tpmpc2024@encrypto.cs.tu-darmstadt.de with the subject: "TPMPC student stipend application" containing the following details.
Name
Email ID
Status (Master's student/PhD student/Post doc/...)
Gender (F/M/D)
Affiliation
Country
Are you a contributed talk speaker?
An estimate of the expected funding for attending the workshop together with detailed breakdown of expenses excluding the registration fee but including costs such as travel expenses (by land/air), accommodation, etc.
A single PDF containing your CV, recent transcripts that corroborate the grades listed in the CV, and letter of motivation addressing why you should be funded
Please keep your supervisor in CC and ask them to confirm your application by email.
Applicants should note that the stipend may not be able to cover the entire attendance cost and that they may need to fund the remaining cost from other sources.
Accepted contributed talks
Perfect Asynchronous MPC with Linear Communication Overhead. Ittai Abraham (Intel Labs), Gilad Asharov (Bar-Ilan University, Israel), Shravani Patil (Indian Institute of Science, Bangalore, India) and Arpita Patra (Indian Institute of Science, Bangalore, India).
Scalable Multiparty Computation from Non-linear Secret Sharing. Sanjam Garg (UC Berkeley), Abhishek Jain (NTT Research and Johns Hopkins University), Pratyay Mukherjee (Supra Research) and Mingyuan Wang (UC Berkeley).
Garbling gadgets and its applications to oblivious garbling. Tomer Ashur (3MI Labs, Belgium), Carmit Hazay (Bar-Ilan University, Israel) and Rahul Satish (IT University of Copenhagen, Denmark).
A lesson about the UC security of optimized MPC implementations. Alexander Kyster (Aarhus University), Frederik Huss Nielsen (Aarhus University), Sabine Oechsner (Vrije Universiteit Amsterdam) and Peter Scholl (Aarhus University).
Malicious Security for Sparse Private Histograms. Lennart Braun (Aarhus University), Adrià Gascón (Google), Mariana Raykova (Google), Phillipp Schoppmann (Google) and Karn Seth (Google).
Distributed Randomness using Weighted VRFs. Sourav Das (University of Illinois at Urbana Champaign), Benny Pinkas (Aptos Labs, Bar-Ilan University), Alin Tomescu (Aptos Labs) and Zhuolun Xiang (Aptos Labs).
Sigma: Secure GPT Inference with Function Secret Sharing. Kanav Gupta (University of Maryland, College Park), Neha Jawalkar (Indian Institute of Science), Ananta Mukherjee (Microsoft Research India), Nishanth Chandran (Microsoft Research India), Divya Gupta (Microsoft Research India), Ashish Panwar (Microsoft Research India) and Rahul Sharma (Microsoft Research India).
Threshold ECDSA in Three Rounds. Jack Doerner (Technion, Reichman University, Brown University), Yashvanth Kondi (Silence Labs), Eysa Lee (Brown University) and abhi shelat (Northeastern University).
Optimizing Preprocessing for Maliciously Secure MPC: Faster Matrix Multiplications and Convolutions without Sacrifice. Marc Rivinius (University of Stuttgart, Germany), Pascal Reisert (University of Stuttgart, Germany), Sebastian Hasler (University of Stuttgart, Germany), Toomas Krips (University of Tartu, Estonia) and Ralf Küsters (University of Stuttgart, Germany).
Preprocessing 4 Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer. Matan Hamilis (Reichman University), Ariel Nof (Bar-Ilan University), Elette Boyle (NTT Research and Reichman University), Yuval Ishai (Technion) and Niv Gilboa (Ben-Gurion University).
Adaptive Distributional Security for Garbling Schemes with O(|x|) Online Complexity. Estuardo Alpírez Bock (Xiphera, Finland), Sabine Oechsner (Vrije Universiteit Amsterdam), Chris Brzuska (Aalto University, Finland), Pihla Karanko (Aalto University, Finland) and Kirthivaasan Puniamurthy (Aalto University, Finland).
Revitalizing Privacy-Preserving Machine Learning: Introducing FANNG-MPC for Actively Secure MLaaS. Najwa Aaraj (Technology Innovation Institute), abdelrahaman aly (Technology Innovation Institute), Tim Güneysu (Ruhr-University Bochum), Chiara Marcolla (Technology Innovation Institute), Johannes Mono (Ruhr-University Bochum), Rogerio Paludo (Technology Innovation Institute), Iván Santos-González (Technology Innovation Institute), Mireia Scholz (Technology Innovation Institute), Eduardo Soria-Vazquez (Technology Innovation Institute), Victor Sucasas (Technology Innovation Institute) and Ajith Suresh (Technology Innovation Institute).
Asterisk: Super-fast MPC with a Friend. Banashri Karmakar (Indian Institute of Science, Bangalore), Nishat Koti (Technical University of Darmstadt, Germany), Arpita Patra (Indian Institute of Science, Bangalore), Sikhar Patranabis (IBM Research India), Protik Paul (Indian Institute of Science, Bangalore) and Divya Ravi (University of Amsterdam, Netherlands).
Threshold Garbled Circuits with Low Overhead. Schuyler Rosefield (Northeastern University), abhi shelat (Northeastern University) and LaKyah Tyner (Northeastern University).
Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators. Amit Agarwal (University of Illinois Urbana-Champaign), Elette Boyle (NTT Research and Reichman University), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion), Mahimna Kelkar (Cornell Tech) and Yiping Ma (University of Pennsylvania).
Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. Carsten Baum (Technical University of Denmark), Nikolas Melissaris (Aarhus University), Rahul Rachuri (Visa Research) and Peter Scholl (Aarhus University).
Multipars: Reduced-Communication MPC over Z2k. Sebastian Hasler (University of Stuttgart, Germany), Pascal Reisert (University of Stuttgart, Germany), Marc Rivinius (University of Stuttgart, Germany) and Ralf Küsters (University of Stuttgart, Germany).
On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC. Johannes Blömer (Paderborn University), Jan Bobolz (University of Edinburgh) and Henrik Bröcher (Paderborn University).
Rational Secure Computation: New Definitions and Constructions. Siddharth Agarwal (Indian Institute of Science, Bengaluru), Chaya Ganesh (Indian Institute of Science, Bengaluru) and Bhavana Kanukurthi (Indian Institute of Science, Bengaluru).
Malicious Security for SCALES -- Outsourced Computation with Ephemeral Servers. Anasuya Acharya (Bar-Ilan University), Carmit Hazay (Bar-Ilan University), Vladimir Kolesnikov (Georgia Institute of Technology) and Manoj Prabhakaran (Indian Institute of Technology Bombay).
Integrating Sharemind MPC into Carbyne Stack. Sharemind team at Cybernetica AS.
SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation. Robin William Hundt (Technical University of Darmstadt, Germany), Nora Khayata (Technical University of Darmstadt, Germany), and Thomas Schneider (Technical University of Darmstadt, Germany).
Analysing Dutch public transport data with MPC. Meilof Veeningen (Roseman Labs).
Willow: Secure Aggregation with Asynchronous Clients. James Bell (Google), Adrià Gascón (Google), Baiyu Li (Google), Mariana Raykova (Google) and Phillipp Schoppmann (Google).
Advanced FHE and MPC Protocols for the Blockchain. Kelong Cong, Morten Dahl, Clément Danjou, Daniel Demmler, Tore Frederiksen, Petar Ivanov, Marc Joye, Benoît Libert, Dragos Rotaru, Nigel P. Smart*, Titouan Tanguy, Louis Tremblay Thibault (Zama, Paris, France; *imec-COSIC, KU Leuven, Leuven, Belgium).
Invited speakers
We are delighted to have talks from the following 12 confirmed invited speakers.
Talk title: A Bigger Picture of Secure Multi-Party Computation
Abstract: Secure multi-party computation is a mature area that enables computation over private data. Products utilizing secure computation techniques are now increasingly being built by tech companies for privacy-preserving data analytics and other purposes. For many years, progress in this area has focused on mechanisms for securely realizing different functionalities, i.e., on how to perform secure function evaluation. In this talk, we argue that other aspects of privacy-preserving computation deserve the attention of the research community. They include ensuring the trustworthiness of inputs to the computation, achieving security of linked computations, and selecting functions to ensure that the (authorized) information disclosure from the output is limited. We investigate the last component in more detail on the example of average salary computation, inspired by the Boston privacy-preserving gender pay gap study carried out in 2015-2017.
Bio: Marina Blanton is an Associate Professor in the Department of Computer Science and Engineering at the University at Buffalo (UB). She also serves as the Faculty Director of Women in Science and Engineering (WiSE) program at UB. Dr. Blanton received her MS in EECS from Ohio University in 2002, MS in CS from Purdue University in 2004, and PhD in CS from Purdue University in 2007. Her research interests are centrally in information security, privacy, and applied cryptography and recent projects span areas such as secure computation and outsourcing, integrity of outsourced computation and storage, and private biometric and genomic computation. Dr. Blanton has over 80 refereed publications, has served on the technical program committees of top conferences such as USENIX Security, IEEE S&P, and CCS, and is currently an associate editor of IEEE Transactions on Dependable and Secure Computing. She has received multiple awards for her research, including a 2013 AFOSR Young Investigator Award, the 2015 ACM CCS Test of Time Award, and a 2018 Google Faculty Research Award.
Talk title: On the round-complexity of secure multi-party computation
Abstract: In multi-party computation (MPC), multiple entities, each having some inputs want to jointly compute a function of these inputs with the guarantee that nothing aside from the output of the function will be leaked. In this talk, we are going to investigate how many messages the parties of an MPC need to exchange to securely realize any functionality with simulation-based security in the case where there is no setup and the majority of the parties can be corrupted. We will then consider a relaxation of the standard simulation-based paradigm, and show that this relaxation leads to more efficient MPC protocols that still realize non-trivial functionalities with meaningful security.
Bio: Michele Ciampi is a Chancellor’s Fellow (equivalent to Assistant Professor) at the School of Informatics at the University of Edinburgh. His work focuses on theoretical aspects of cryptography, including multi-party computation protocols, zero-knowledge proofs, and blockchain.
Talk title: The Communication Complexity of Oblivious Transfer
Abstract: Oblivious Transfer (OT) is the central primitive in the study of secure two-party computation; classical results in the area show that any secure two-party computation task can be realized from OT. However, until recently essentially all OT protocols (with very few exceptions) only achieved rate below 1/2. Here, the rate refers to the ratio between the communication size of the best insecure protocol and that of the protocol under consideration. The barrier at rate 1/2 is somewhat natural, as achieving OT with a rate above 1/2 implies highly desirable cryptographic concepts such as private information retrieval, which remain elusive from low-rate OT.
In this talk I will discuss a line of work which has led to communication-optimal OT protocols across a wide spectrum of assumptions and settings. Specifically, I will discuss the string-OT setting, the batch-OT setting as well as semi-honest security, statistical sender privacy and fully malicious security. A key concept pivotal to the development of communication-optimal OT is that of trapdoor hash functions, which have given rise to unexpected and compelling applications in their own right.
Bio: Nico Döttling is a tenured faculty at the Helmholtz Center for Information Security (CISPA) in Saarbrücken, where he leads a research group in the field of public-key cryptography and secure computation. After studying Computer Science at the Karlsruhe Institute of Technology (then Technical University of Karlsruhe), he finished his PhD in 2014 at the Karlsruhe Institute of Technology. His PhD thesis won the biennial Erika and Dr. Wolfgang Eichelberger Dissertation Award. After postdoctoral studies at Aarhus University and UC Berkeley, he joined Friedrich-Alexander-University Erlangen Nürnberg as an assistant professor in 2017 and CISPA as a tenure-track faculty in 2018. His research is currently supported by the European Union via an ERC Starting Grant for his project “Next-Generation Laconic Cryptography".
Talk title: Verifiable Homomorphic Secret Sharing
Abstract: A homomorphic secret sharing (HSS) scheme allows a client to delegate a computation to a group of untrusted servers while achieving input privacy as long as at least one server is honest. In recent years, many HSS schemes have been constructed that have, in turn, found numerous applications to cryptography.
Prior work on HSS focuses on the setting where the servers are semi-honest. In our work, we lift HSS to the setting of malicious evaluators. We propose the notion of verifiable HSS (vHSS) that guarantees correctness of output even when all the servers are corrupted. vHSS retains all the attractive features of HSS and adds the new feature of succinct (public) verification of output.
We present black-box constructions of vHSS by devising generic transformations for semi-honest HSS schemes (with negligible error). This provides a new non-interactive method for verifiable and private outsourcing of computation to a group of untrusted servers.
This is joint work with Arka Rai Choudhuri, Aditya Hegde and Abhishek Jain.
Bio: Aarushi Goel is a postdoctoral researcher in the Cryptography and Information Security Lab at NTT Research, mentored by Sanjam Garg. Previously, she was a Ph.D. student at Johns Hopkins University, where she was advised by Abhishek Jain. Her research interests span broadly across cryptography and related areas of security and theoretical computer science.
Talk title: Practical Secure Machine Learning
Abstract: With the rise of data silos, it is becoming increasingly important to enable private data collaboration, i.e., securely computing on data owned by different entities without any exchange or sharing of data in the clear. While theoretically, secure multiparty computation (MPC) enables this scenario with strong formal security guarantees, its general application suffers from many challenges, namely, performance, scalability and ease-of-use. In my talk, I will primarily focus on computations occurring in collaborative machine learning, namely, ML inference, training and validation. Over the last decade, the crypto and security communities have worked hard to address these challenges for secure machine learning. In fact, one of our recent works shows that secure inference has reached a tipping point: latency of secure inference for certain model classes matches that of cleartext. In another work, we improve the latency and scalability of secure transformer inference by more than an order of magnitude and enable secure inference of GPT-2 model in 1.6 seconds. My talk will discuss these recent developments, how we get there and what problems remain.
Bio: Divya Gupta is a Principal Researcher at Microsoft Research India. Her research interest is cryptography and its applications to security and privacy. Currently her work at MSR focusses on secure multiparty computation and blockchains, and in particular, making cryptography practical, usable, and performant. She has published several papers in top computer science conferences such as Crypto, Eurocrypt, IEEE S&P, ACM CCS, OSDI, and so on and holds 3 US Patents. Before joining MSR, she was a postdoc at UC Berkeley hosted by Sanjam Garg. She completed her PhD at University of California at Los Angeles with Amit Sahai. Her PhD dissertation was recognized by the Dissertation Fellowship and the Dimitris N. Chorafas Dissertation Award, given for outstanding work in engineering sciences, medicine and the natural sciences. She got her bachelors and masters degree in Computer Science and Engineering from Indian Institute of Technology, Delhi.
Talk title: Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity
Abstract: Private set intersection (PSI) allows two mutually distrusting parties each holding a private set of elements, to learn the intersection of their sets without revealing anything beyond the intersection. Recent work by Badrinarayanan et al. (PoPETS'22) initiates the study of updatable PSI (UPSI), which allows the two parties to compute PSI on a regular basis with sets that constantly get updated, where both the computation and communication complexity only grow with the size of the small updates and not the large entire sets. However, there are several limitations of their presented protocols, which we address in this work.
We study UPSI in both the addition-only and addition-deletion settings. We present new protocols for both settings that support plain PSI as well as extended functionalities including PSI-Cardinality and PSI-Sum, achieving one-sided output with semi-honest security. In the addition-only setting, we also present a protocol for a more general functionality Circuit-PSI that outputs secret shares of the intersection. All of our protocols have worst-case computation and communication complexity that only grow with the set updates instead of the entire sets (except for a polylogarithmic factor). We implement our new UPSI protocols, which outperform the state-of-the-art protocols when the total set sizes are sufficiently large, the new updates are sufficiently small, or in networks with low bandwidth.
Based on joint work with Saikrishna Badrinarayanan, Xinyi Shi, Max Tromanhauser, and Ruida Zeng.
Bio: Peihan Miao is an assistant professor in the Department of Computer Science at Brown University. Her research interests lie broadly in cryptography, theory, and security, with a focus on secure multi-party computation. She received her PhD from the University of California, Berkeley in 2019. Before joining Brown, she had brief stints at the University of Illinois Chicago as an assistant professor and Visa Research as a staff research scientist. She is a recipient of a Meta Privacy Enhancing Technologies Award, Google Research Scholar Award, and Amazon Research Award.
Talk title: Distributed Discrete Logarithms and Applications, Part I / Part II
Abstract: In this two-parts talk we will introduce the "distributed discrete logarithm" problem (DDL) and present many of the exciting applications it has enabled in recent years. DDL is a crucial tool in recent share-conversion protocols and has enabled many exciting such as MPC with sub-linear complexity, homomorphic- and function secret-sharing, pseudorandom correlation generators, garbling, and more. We will give examples of DDL protocol from established assumptions, and dive into some of the applications.
Bio: Pierre Meyer is currently a Postdoc at Aarhus University, hosted by Claudio Orlandi. Previously, he completed his PhD at Reichman University and Université Paris Cité, advised by Elette Boyle and Geoffroy Couteau. His research mostly focuses on theoretical aspects of cryptography, and of MPC in particular.
Lawrence Roy is currently a postdoc at Aarhus University, Denmark. He completed his PhD at Oregon State University, advised by Mike Rosulek. His research interests include homomorphic secret sharing, oblivious transfer, and garbled circuits.
Talk title: On Broadcast and Identifiability in MPC
Abstract: Many existing deployments of Secure Multiparty Computation (MPC) protocols are susceptible to denial of service attacks unless they incorporate mechanisms to pinpoint cheating participants responsible for disruptions. However, identifying cheaters typically demands significant resources, which includes costly broadcast channels. Notably, use of broadcast is known to be necessary for unanimous identification of cheaters by all participants.
In this talk, we delve into the established correlations between the use of broadcast and identifiability within MPC protocols. Furthermore, we introduce a new notion of identifiability that does not require broadcast but nevertheless satisfies practical identifiability requirements. Specifically, this notion enables an honest party to provably identify an attacker to any external auditor, even when the protocol operates solely over point-to-point channels. Additionally, our identification mechanism distinguishes between unresponsive participants and those actively deviating from the protocol, facilitating handling of such qualitative distinctions at higher logic levels. Finally, we demonstrate the application of this notion to a new honest majority ECDSA signing protocol that supports cheater identification.
Bio: Divya is currently an Assistant Professor at the University of Amsterdam, Netherlands. Prior to this, she was a postdoctoral researcher at the Aarhus Crypto group and completed her PhD at Indian Institute of Science, India. Her primary research interests include feasibility and efficiency of tasks related to secure MPC under various adversarial and network models.
Talk title: Private Set Union (PSU)
Abstract: Private set intersection (PSI) and private set union (PSU) are two fundamental set operations with widespread applications in various privacy-sensitive contexts. Over the last decade, a substantial body of research has focused on PSI, whereas PSU has received relatively little attention. In this talk, I will review the existing literature on PSU protocols. Most recent PSU protocols have been tailored specifically for the two-party scenario, following the framework outlined by Kolesnikov et al. (Asiacrypt 2019) based on oblivious transfer (OT). Subsequently, I will present our new result on multi-party PSU (MPSU), enabling more than two parties to compute the union of their private datasets without revealing additional information. Our protocol avoids computationally expensive homomorphic operations or generic multi-party computation, thus providing an efficient solution for MPSU. It shows an improvement of up to $37.82\times$ in terms of running time and $389.85\times$ bandwidth cost compared to the existing state-of-the-art protocols.
Bio: Ni Trieu is currently an Assistant Professor at Arizona State University (ASU). Her research interests lie in the area of cryptography and security, with a specific focus on secure computation and its applications such as private set operation, secure bio-computing. Her work has been published in top-tier Cryptography & Security conferences. She received my Ph.D. degree from Oregon State University. Before joining ASU, she was a postdoctoral researcher at UC Berkeley.
Talk title: Achieving Asynchronous MPC with Linear Communication and Optimal Resilience
Abstract: Secure multiparty computation (MPC) allows a set of n parties to jointly compute a function over their private inputs. The seminal works of Ben-Or, Canetti and Goldreich [STOC '93] and Ben-Or, Kelmer and Rabin [PODC '94] settled the feasibility of MPC over asynchronous networks. Despite the significant line of work devoted to improving the communication complexity, current protocols with information-theoretic security and optimal resilience t<n/3 communicate \Omega(n^4C) field elements for a circuit with C multiplication gates. In contrast, synchronous MPC protocols with \Omega(nC) communication have long been known.
In this talk, I will introduce our recent progress that gives the first information-theoretic AMPC with communication complexity O(nC) field elements. Our construction is obtained from the following two results:
- We first build an asynchronous complete secret-sharing (ACSS) protocol with linear communication complexity. ACSS allows a dealer to share a batch of Shamir sharings such that all parties eventually receive their shares. ACSS is an important building block in AMPC. We improve the previously best-known result by Choudhury and Patra [J. Cryptol '23], which requires O(n^3) elements per sharing, by a factor of n^2.
- We then provide a novel MPC protocol that makes black-box use of ACSS, where the cost per multiplication reduces to the cost of distributing a constant number of sharings via ACSS, improving a linear factor over the state of the art by Choudhury and Patra [IEEE Trans. Inf. Theory '17].
Bio: Yifan Song is an assistant professor at Tsinghua University. He received the Ph.D. degree from Carnegie Mellon University in 2022, advised by Prof. Vipul Goyal. Before that, he received the Bachelor degree from Yao Class at Tsinghua University in 2017. Yifan Song is generally interested in theoretical Cryptography and has a special focus on secure multiparty computation. He has published more than 10 papers in the top conferences of Cryptography. He was a committee member of Eurocrypt 2023 and PKC 2024, and served as an external reviewer for many top conferences in Cryptography.
Talk title: Sharing without Showing: Building Secure Collaborative Systems by Co-designing Systems and Cryptography
Abstract: The recent revolution in advanced data analytics and machine learning have made it possible to extract unprecedented value from user data. However, this comes at the cost of user privacy in many application workflows. In this talk, I will discuss some ideas around building systems that enable privacy-preserving computation via a co-design of systems and cryptography. In the first part of the talk, I will present Bolt (IEEE S&P 2024), a new system for privacy-preserving two-party inference for a large language model like BERT using secure multiparty computation (MPC). With our system, a user can safely outsource prediction to a third party without revealing their sensitive data and or learning about the third party’s proprietary model parameters. In the second part, I will talk about building systems for democratizing cryptography. In Silph (IEEE S&P 2023), we develop a framework that can automatically compile a program written in a high-level language to an optimized, hybrid MPC protocol that mixes multiple MPC primitives securely and efficiently. This makes it possible for any programmer with no expertise in cryptography to create efficient MPC protocols from scratch.
Bio: Wenting Zheng is an assistant professor in the Computer Science Department at CMU. Her research interests are in computer systems, security, and applied cryptography. She aims to bridge the gap between theory and practice through a co-design of cryptography and systems. She does so by building practical cryptosystems with provable security guarantees, designing novel cryptographic primitives and protocols, and building systems for democratizing and accelerating cryptography. She is a recipient of NSF CAREER Award, Google Research Scholar Award, Distinguished Paper Award at IEEE Euro S&P, IBM PhD Fellowship, and Berkeley Fellowship. She obtained her Ph.D. in EECS from UC Berkeley.
Accommodation
We have negotiated special rates for TPMPC participants with the following two hotels in Darmstadt. We encourage you to reserve your rooms promptly to take advantage of these exclusive offers.
Maritim Hotel Darmstadt: Rooms are available at discounted rates if you book by 14 April 2024. Please mention the code TPMPC2024 when booking or use this link, which will take you directly to the booking at discounted rates. For bookings after 14 April 2024, the usual prices apply.
Hotel THE Darmstadt: Rooms are available at special rates when using the following login credentials during booking.
Login ID: TU
Password: tu
Organization
Local Organizers
Thomas Schneider (Technical University of Darmstadt)
Nishat Koti (Technical University of Darmstadt)
Administrative Organization
Petra Fuhrmann (Technical University of Darmstadt): fuhrmann@encrypto.cs.tu-darmstadt.de)
Program Committee
Carsten Baum (Technical University of Denmark)
Ivan Damgård (Aarhus University)
Carmit Hazay (Bar-Ilan University)
Nishat Koti (Technical University of Darmstadt)
Arpita Patra (Indian Institute of Science Bangalore)
Mike Rosulek (Oregon State University)
Thomas Schneider (Technical University of Darmstadt)
Peter Scholl (Aarhus University)
Ajith Suresh (Technology Innovation Institute)
Christian Weinert (Royal Holloway University of London)
Steering Committee
Ivan Damgård (Aarhus University)
Carmit Hazay (Bar-Ilan University)
Claudio Orlandi (Aarhus University)
Arpita Patra (Indian Institute of Science Bangalore)
Mike Rosulek (Oregon State University)
Thomas Schneider (Technical University of Darmstadt)
Call for contributed talks (closed)
Submission Deadline: Mon, February 26, 2024, 23:59 (AoE)
Notification: Fri, March 22, 2024
The 10th TPMPC Workshop seeks submissions for contributed talks in the area of the theory and/or practice of secure multiparty computation. The workshop does not have proceedings and hence, the submission can be based on either work in progress, papers in submission, or papers already published at a conference, workshop or journal. Areas of interest broadly include
Theoretical foundations of multiparty computation: feasibility, assumptions, asymptotic efficiency, etc.
Efficient MPC protocols for general or specific tasks of interest
Implementations, applications of, and tools for MPC
The TPMPC program committee will select talks with the aim of constructing a balanced program that will be of high interest to the audience.
Submission Details:
Contributed talks will be 20-30 minutes in-person talks in Darmstadt.
The submission deadline for contributed talks is on Monday, February 26, 2024 (anywhere on Earth).
Notification of acceptance can be expected by Friday, March 22, 2024.
Please submit by sending an email to tpmpc2024@encrypto.cs.tu-darmstadt.de with the subject "TPMPC Contributed Talk: <YOUR TALK TITLE>" with the following details:
Title
Authors and affiliations (also cc all contact authors on the email)
Speaker's name (who will register and give the presentation in person)
Speaker's position (e.g., PhD student, postdoc, ...)
Link to full paper (optional)
Published at (optional)
PDF containing a short summary (up to 2 pages excluding references, in LNCS format using \usepackage{fullpage}, need not be anonymized) of your proposed talk