Multi-Party Computation beyond Custody Applications

DejanRadi1 167 views 25 slides Oct 02, 2024
Slide 1
Slide 1 of 25
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25

About This Presentation

Current applicability of MPC in the crypto space is primarily oriented towards custody in the case of providers such as Fireblocks who use it primarily for Threshold Signing capabilities. On the other hand, SMPC (Secure Multi Party Computation) is a cryptographic technique that allows multiple parti...


Slide Content

MPC beyond Custody Applications Dejan Radic - BlockSplit 5 - May 2024

What is the value if data is not processed? If everyone keeps the data, nobody benefits! If everyone gives the data, what is the value for data owners?

That’s where MPC comes into play!

MPC - Multi Party Computation MPC - protocol that for data processing while not disclosing the underlying data. It enables collaborative computation of multiple parties, where result end at designated location. Computation of function F Arithmetic (+, -, x, /) Logic (AND, OR, XOR) Comparison (=, >, <) Statistics Text!?

Yao's Millionaires' problem Andrew Yao, 1982 Two millionaires, Alice and Bob, who are interested in knowing which of them is richer without revealing their actual wealth.

Crypto Use Case - Threshold Signing

Additive Secret Sharing Example

7091 - 3894 + 13362 + 7751 = 24400 24400 / 4 = € 6100

Communication Throughput

Example with moderator

Example with moderator

What if a party is dishonest? Verifiability!

Verifiability Interactive challenging with half-results Proof of Stake style tokenization Trusted 3rd party Reputation scheme Commitment scheme

Associated Technologies PKI for authentication Symmetric encryption for inter-party confidentiality ZKP for correctness of computations Shamir Secret Sharing Homomorphic Encryption Federated Learning

Conclusion Not just custody applications through threshold signing Collaborative computation by keeping the data private Combining arithmetic & logic operations for analytics Verifiability to detect dishonest parties Engineering trade-off: throughput, decentralization, precision Data Ownership enabled through tokenization Model creation by using Federated learning

Questions?

Thank you!