The appropriate circumstances for each privacy protection methods #164
-
QuestionGeneral question 1Homomorphic encryption makes possible simple computation, such as addition and multiplication, in encrypted space. I have question "Even if private keys are different, still is it possible to compute in encrypted space?". In other words, let Enc1 be General question 2In the "Alice and Bob" example in SMPC, does the third-party indicate one of Alice or Bob? So, is it a sort of HE because we can think of the data Alice holds as the private key for the original data holder? Simulation studyIn Lesson 4, I learned several important privacy protection methods(DP, HE, SMPC). Important thing is thinking about how to combine them in real life, rather than using only one of technique,. So, I've made several virtual situations to clarify when each methods(DP, HE, SMPC) are appropriate and when some of them should not be used. Mentors' opinions on my thoughts will be helpful. SituationsI'll use the term "communication" for the number of times each clients send a message. Consider when each clients must send their messages multiple times(communications), e.g. Federated Learning setting. Single input source
Multiple input sources and Single communication
Multiple input sources and Multiple communications
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 1 reply
-
General Question 1:To the best of my knowledge it is possible to perform arithmetic operations on ciphertexts encrypted under different keys and it's called Multi-Key Homomorphic Encryption (MKHE). General Question2 :Can you explain what do you mean by the original data holder ? The core idea of SMPC is that you have multiple data holders that can contribute in a computation and only a specific party will know the result of this computation without those paticipating parties learning anything about the different data parts that any of the participants has. |
Beta Was this translation helpful? Give feedback.
-
For General Question 1: Please check the link @ZSoumia shared. For General Question 2: In SMPC, the purpose of having a third-party is to limit the participants to obtain the ability to "guess" or trace back to the original data. Therefore, Alice or Bob being the third-party will give them an unfair advantage. Based on my understanding of SMPC, the third-party should not be any of the share holders of the data, neither the original data owner. Please someone correct me if my understanding is wrong :) |
Beta Was this translation helpful? Give feedback.
For General Question 1: Please check the link @ZSoumia shared.
For General Question 2: In SMPC, the purpose of having a third-party is to limit the participants to obtain the ability to "guess" or trace back to the original data. Therefore, Alice or Bob being the third-party will give them an unfair advantage. Based on my understanding of SMPC, the third-party should not be any of the share holders of the data, neither the original data owner. Please someone correct me if my understanding is wrong :)