Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add src/libspu/mpc/swift #984

Open
wants to merge 21 commits into
base: main
Choose a base branch
from
Open

add src/libspu/mpc/swift #984

wants to merge 21 commits into from

Conversation

lwxxxxxxx
Copy link
Contributor

Pull Request

What problem does this PR solve?

增加Swift协议,参考论文《SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning》(ref: https://eprint.iacr.org/2020/592) 中的三方恶意安全版本。

Issue Number: Fixed #

Possible side effects?

  • Performance:

  • Backward compatibility:

Copy link

@littlebeanfang littlebeanfang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

一些整体建议和疑问:

  1. 协议实现说明添加:没有silent、没有malicious TTP处理ideal func、没有online/offline分割、没有SOC的IO流程、只有三方协议
  2. 添加作者信息和联系邮箱
  3. 每个协议最好标注对应论文位置
  4. 和aby3对比,算子列表diff
    一共注册了32个算子
  • aby3的b2a有两个,byot和byppa,还有个selector
  • swift多出来的:CastTypeB、TruncA
  • swift缺少的:CommonTypeV、equalAA/equalAP、MulA1B、randB
  1. 建一个experimental文件夹放
  2. 通信addCommStatsManually调用不在真正通信的位置,是什么约定俗成的写法么?
  3. prsspair生成随机数,有的地方移位,有的地方不移位的原因:e.g. sharing、MulAA_semi、RssMul_semi

@rivertalk
Copy link

一些整体建议和疑问:

  1. 协议实现说明添加:没有silent、没有malicious TTP处理ideal func、没有online/offline分割、没有SOC的IO流程、只有三方协议
  2. 添加作者信息和联系邮箱
  3. 每个协议最好标注对应论文位置
  4. 和aby3对比,算子列表diff
    一共注册了32个算子
  • aby3的b2a有两个,byot和byppa,还有个selector
  • swift多出来的:CastTypeB、TruncA
  • swift缺少的:CommonTypeV、equalAA/equalAP、MulA1B、randB
  1. 建一个experimental文件夹放
  2. 通信addCommStatsManually调用不在真正通信的位置,是什么约定俗成的写法么?
  3. prsspair生成随机数,有的地方移位,有的地方不移位的原因:e.g. sharing、MulAA_semi、RssMul_semi

@gemini-code-assist Please double check if these concerns are resolved, thanks.

Copy link
Contributor

Thanks for your review, @rivertalk.

I'll address these points:

  • Protocol Implementation: I will add a section in the documentation detailing the specifics of the SWIFT protocol implementation, including the absence of silent/malicious TTP handling in the ideal function, the lack of online/offline separation, the absence of SOC IO flows, and the focus on the three-party protocol.
  • Author Information: I will add author information and contact email to the relevant files.
  • Paper References: I will add annotations indicating the corresponding paper locations for each protocol.
  • Operator List Comparison: I will provide a comparison of the operator lists between ABY3 and SWIFT, highlighting the differences in registered operators.
  • Experimental Folder: I will create an "experimental" folder to house the SWIFT protocol implementation.
  • Communication Statistics: I will investigate the addCommStatsManually calls and provide an explanation for their placement.
  • PRS SPair Random Numbers: I will clarify the reasons for shifting or not shifting in PRS SPair random number generation, specifically addressing the sharing, MulAA_semi, and RssMul_semi cases.


NdArrayRef fromShares(const std::vector<NdArrayRef>& shares) const override;

// std::vector<NdArrayRef> makeBitSecret(const PtBufferView& in) const
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

不需要的代码删掉哈


NdArrayRef alpha1(ty, in.shape());
NdArrayRef alpha2(ty, in.shape());
NdArrayRef beta(ty, in.shape());

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

虽然没看懂你的解释,不过本质上传这俩安全性一样,P0本地都可以反推出来,只是为了和论文描述保持一致而已,不改也行


auto reconstruct_w =
RSS_A2P(ctx, w, "reconstruct w in MulPre"); // comm => 1, 2k
// We need to change w from field_sigma_plus_k to field,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

好像不是因为 c = c0 + c1 + c2- 2^l, 是因为 c=a*b mod 2^l

Copy link

@littlebeanfang littlebeanfang Mar 23, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

应该是两种情况都有,但分片进位这种情况在环转换协议正确的情况下,应该是不存在的。理论上说,应该在密态下去处理这个ab出现的进位,不然是有安全问题的,泄漏了ab>2^l这一信息。


auto reconstruct_w =
RSS_A2P(ctx, w, "reconstruct w in MulPre"); // comm => 1, 2k
// We need to change w from field_sigma_plus_k to field,
Copy link

@littlebeanfang littlebeanfang Mar 23, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

应该是两种情况都有,但分片进位这种情况在环转换协议正确的情况下,应该是不存在的。理论上说,应该在密态下去处理这个ab出现的进位,不然是有安全问题的,泄漏了ab>2^l这一信息。

}

// extend each element from FieldType_in to FieldType_out
NdArrayRef RingChange(KernelEvalContext* ctx, const NdArrayRef& in,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

这个环转换协议有论文出处么,这里的实现看起来就是把分片直接转到大环上,那这个协议正确性是有问题的。小环转换大环上,是要处理分片进位的,才能保证数值正确性。

}

// matrix version of MulPre
NdArrayRef MatMulPre(KernelEvalContext* ctx, const NdArrayRef& lhs,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

reminder: 后续这个函数里面的mod 2^l也需要处理

// rd = \Sigma_{i=d}^{k-1} (2^{i-d} * r[i])
// so in swift : r = rshift(r, d)
// which cause the truncation result to be wrong
// so we need to guarantee the msb of r is 0,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

那是不是意味着使用trunc(v)=trunc(v-r)+trunc(r), open(v-r)的时候,会泄漏v的最高位?

// and use the following expression to calculate r and rd
// r = \Sigma_{i=0}^{k-1} (2^i * r[i])
// rd = \Sigma_{i=d}^{k-1} (2^{i-d} * r[i])
// so in swift : r = rshift(r, d)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

论文里面只处理了(d, . . . , l−1), 如果把高d位补充为最高位r[l-1],加到计算里面,是不是就能解决了?

Y = Y.transpose();
Q = Q.transpose();

tmp = matmul.proc(ctx, X, Y);

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

这里用matmul来实现内积,冗余计算太多了。numel个内积->矩阵乘的numel*numel个内积

// For the AndPre, the probability of accepting incorrect triple is 1/2
// However, when we are handling a boolean share with nbits, the probability
// will be 2^{-nbits}
NdArrayRef AndPre(KernelEvalContext* ctx, const NdArrayRef& lhs,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

对于boolean share是不是应该用你cite那篇文章里面的cut-and-choose的方法做check, 附录A.2.2


SPU_ENFORCE(start <= end);
SPU_ENFORCE(end <= SizeOf(field) * 8);
const size_t out_nbits = std::max(getNumBits(in), end);

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

end可以大于有效bits么?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

感觉如果end大于有效的nbits的话,reverse后的结果会是一个比较怪的形式,会将原来的 nbits 到 end中间的无效比特位转到start 和 end 中间。但目前的这些本地布尔操作的实现是参考已有的semi2k中的代码,也是取out_nbits = std::max(getNumBits(in), end),请问一下水乐老师这样处理是对的吗? @w-gc

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants