Reflections on trusting distributed trust

10/14/2022
by   Emma Dauterman, et al.
0

Many systems today distribute trust across multiple parties such that the system provides certain security properties if a subset of the parties are honest. In the past few years, we have seen an explosion of academic and industrial cryptographic systems built on distributed trust, including secure multi-party computation applications (e.g., private analytics, secure learning, and private key recovery) and blockchains. These systems have great potential for improving security and privacy, but face a significant hurdle on the path to deployment. We initiate study of the following problem: a single organization is, by definition, a single party, and so how can a single organization build a distributed-trust system where corruptions are independent? We instead consider an alternative formulation of the problem: rather than ensuring that a distributed-trust system is set up correctly by design, what if instead, users can audit a distributed-trust deployment? We propose a framework that enables a developer to efficiently and cheaply set up any distributed-trust system in a publicly auditable way. To do this, we identify two application-independent building blocks that we can use to bootstrap arbitrary distributed-trust applications: secure hardware and an append-only log. We show how to leverage existing implementations of these building blocks to deploy distributed-trust systems, and we give recommendations for infrastructure changes that would make it easier to deploy distributed-trust systems in the future.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/04/2020

Building secure distributed applications the DECENT way

Remote attestation (RA) enables distributed applications that deploy tru...
research
12/03/2022

Generating Synthetic Data in a Secure Federated General Adversarial Networks for a Consortium of Health Registries

In this work, we review the architecture design of existing federated Ge...
research
08/28/2022

DP-PSI: Private and Secure Set Intersection

One way to classify private set intersection (PSI) for secure 2-party co...
research
06/03/2020

A Distributed Trust Framework for Privacy-Preserving Machine Learning

When training a machine learning model, it is standard procedure for the...
research
09/04/2020

2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets

Dedicated, after acceptance and publication, in memory of the late Vasso...
research
05/02/2020

Who Needs Trust for 5G?

There has been much recent discussion of the criticality of the 5G infra...
research
10/13/2020

SafetyPin: Encrypted Backups with Human-Memorable Secrets

We present the design and implementation of SafetyPin, a system for encr...

Please sign up or login with your details

Forgot password? Click here to reset