-
Notifications
You must be signed in to change notification settings - Fork 93
Security Thoughts on Untrusted Nodes
David Aronchick edited this page Feb 18, 2022
·
6 revisions
One of the biggest challenges we will face relative to executing compute over data will be how to execute over encrypted/secure data.
We do not have a current plan of attack other than our current plan of:
- Using public data (only) to start
- Encouraging the use of subnets on trusted nodes.
However, there is quite a bit of thinking in the context of MPC (multi-party compute). Below is a partial list of folks who have already thought about it (in alpha order):
- ABY^3 - a semi-honest implementation of ABY 3 and Fast Database Joins for Secret Shared Data. https://github.com/ladnir/aby3
- Awesome Homomorphic Encryption (HE) - list of resources around HE https://github.com/jonaschn/awesome-he
- Batch DualEx - https://github.com/osu-crypto/batchDualEx
- Crypten - Privacy Preserving Machine Learning built on PyTorch https://github.com/facebookresearch/CrypTen
- EMP - Efficient, multi-party computation toolkit - https://github.com/emp-toolkit/emp-tool
- Honeybadger MPC - HoneyBadgerMPC is a robust MPC-based confidentiality layer for blockchains. https://github.com/initc3/HoneyBadgerMPC
- JIFF - Secure Javascript for multiparty compute - https://github.com/multiparty/jiff/
- MOTION - Mixed protocol multi party compute - https://github.com/encryptogroup/MOTION
- MPyC - multiparty compute in python - https://www.win.tue.nl/~berry/mpyc/
- Multi-protocol SPDZ - benchmarking for MPC - https://github.com/data61/MP-SPDZ
- Nucypher - enables proxy re-encryption without access to the private keys and/or plaintext https://www.nucypher.com/
- Obliv-C - Data oblivious computation with a gcc wrapper - https://oblivc.org/
- Rosetta - Privacy-preserving framework based on TF - https://github.com/LatticeX-Foundation/Rosetta/
- Swanky - Rust privacy preserving framework https://github.com/GaloisInc/swanky
- TF Encrypted - a framework for encrypted machine learning in TensorFlow https://github.com/tf-encrypted/tf-encrypted
- Refereed Delegation of Computation - https://www.cs.tau.ac.il/~canetti/CRR11.pdf
- Incentivizing Outsourced Computation - http://netecon.seas.harvard.edu/NetEcon08/Papers/Belenkiy_08.pdf