Re: [viff-devel] My dissertation

2010-04-23 Thread Martin Geisler
s.sriniva...@surrey.ac.uk writes:

Hi Sriram,

I'll CC this message to the VIFF mailinglist as well -- there are many
people there who can help you if I cannot. Please keep the list as CC on
your replies.

 Hi Martin

 I hope you have settled into your new workplace and enjoying yourself.

Thanks, it's going well in my new job.

 I had a few quick queries if you don't mind.

 I have been trying to get a grasp on MPC ideas over the past few days.
 I was wondering if you could point me a recent comprehensive, but not
 too heavy survey on MPC. If I could get an idea of how the field has
 progressed and various approaches to achieving MPC without getting
 bogged down in too much detail, it may be helpful for me at this
 stage.

I don't know of such a survey off the top of my head.

 As I understand, VIFF implements the underlying functionality using
 Shamir Secret Sharing. It seems there are other approaches possible as
 well and one of my colleagues wanted to know if VIFF also implements
 the ideas from the paper Multiparty Computation from Threshold
 Homomorphic Encryption by Ronald Cramer and Ivan Damgard and Jesper
 Buus Nielsen? My guess is No, but I am not not sure.

Right, we have not implemented the protocols from that paper.

 There are some papers that refer to this latter work, for example
 Efficient Binary Conversion for Paillier Encrypted Values by Berry
 Schoenmakers and Pim Tuyls. I was wondering if the application in
 this paper can be coded with the functionality provided by VIFF in
 principle, or there are some details which may prevent it from being
 so.

I'm sorry, but I'm not familiar with that paper. But you should think of
VIFF as having a number of layers:

1. basic player administration
2. network setup
3. secret sharing and reconstruction (Shamir-based)
4. secure addition and multiplication
5. more complex protocols

So depending on how the primitive above fits into the stack, you may be
able to reuse more or less code.

 Sorry if my queries don't make sense. I can admit I don't have much
 knowledge of the details and I am trying pick up stuff as I go along.

 Thanks in advance.

 Best Wishes

 Sriram

--
Martin Geisler
___
viff-devel mailing list (http://viff.dk/)
viff-devel@viff.dk
http://lists.viff.dk/listinfo.cgi/viff-devel-viff.dk


Re: [viff-devel] My dissertation

2010-04-23 Thread S.Srinivasan
Hi Martin

Thanks for your prompt reply. Much appreciated :)

If anyone on the list has any further pointers, I will be grateful for your 
response.

Thanks in advance

Kind Regards

Sriram


From: m...@mgsys.dk [...@mgsys.dk] On Behalf Of Martin Geisler 
[...@lazybytes.net]
Sent: 23 April 2010 18:04
To: Srinivasan S Mr (Computing); viff-devel@viff.dk
Subject: Re: My dissertation

s.sriniva...@surrey.ac.uk writes:

Hi Sriram,

I'll CC this message to the VIFF mailinglist as well -- there are many
people there who can help you if I cannot. Please keep the list as CC on
your replies.

 Hi Martin

 I hope you have settled into your new workplace and enjoying yourself.

Thanks, it's going well in my new job.

 I had a few quick queries if you don't mind.

 I have been trying to get a grasp on MPC ideas over the past few days.
 I was wondering if you could point me a recent comprehensive, but not
 too heavy survey on MPC. If I could get an idea of how the field has
 progressed and various approaches to achieving MPC without getting
 bogged down in too much detail, it may be helpful for me at this
 stage.

I don't know of such a survey off the top of my head.

 As I understand, VIFF implements the underlying functionality using
 Shamir Secret Sharing. It seems there are other approaches possible as
 well and one of my colleagues wanted to know if VIFF also implements
 the ideas from the paper Multiparty Computation from Threshold
 Homomorphic Encryption by Ronald Cramer and Ivan Damgard and Jesper
 Buus Nielsen? My guess is No, but I am not not sure.

Right, we have not implemented the protocols from that paper.

 There are some papers that refer to this latter work, for example
 Efficient Binary Conversion for Paillier Encrypted Values by Berry
 Schoenmakers and Pim Tuyls. I was wondering if the application in
 this paper can be coded with the functionality provided by VIFF in
 principle, or there are some details which may prevent it from being
 so.

I'm sorry, but I'm not familiar with that paper. But you should think of
VIFF as having a number of layers:

1. basic player administration
2. network setup
3. secret sharing and reconstruction (Shamir-based)
4. secure addition and multiplication
5. more complex protocols

So depending on how the primitive above fits into the stack, you may be
able to reuse more or less code.

 Sorry if my queries don't make sense. I can admit I don't have much
 knowledge of the details and I am trying pick up stuff as I go along.

 Thanks in advance.

 Best Wishes

 Sriram

--
Martin Geisler
___
viff-devel mailing list (http://viff.dk/)
viff-devel@viff.dk
http://lists.viff.dk/listinfo.cgi/viff-devel-viff.dk