Secure risk propagation using distributed Paillier
Project description
TNO PET Lab - secure Multi-Party Computation (MPC) - Protocols - Risk Propagation
Secure Risk Propagation initially developed within the MPC4AML project.
PET Lab
The TNO PET Lab consists of generic software components, procedures, and functionalities developed and maintained on a regular basis to facilitate and aid in the development of PET solutions. The lab is a cross-project initiative allowing us to integrate and reuse previously developed PET functionalities to boost the development of new protocols and solutions.
The package tno.mpc.protocols.risk_propagation
is part of the TNO Python Toolbox.
Limitations in (end-)use: the content of this software package may solely be used for applications that comply with international export control laws.
This implementation of cryptographic software has not been audited. Use at your own risk.
Documentation
Documentation of the tno.mpc.protocols.risk_propagation
package can be found
here.
Install
Easily install the tno.mpc.protocols.risk_propagation
package using pip
:
$ python -m pip install tno.mpc.protocols.risk_propagation
Note: If you are cloning the repository and wish to edit the source code, be sure to install the package in editable mode:
$ python -m pip install -e 'tno.mpc.protocols.risk_propagation'
If you wish to run the tests you can use:
$ python -m pip install 'tno.mpc.protocols.risk_propagation[tests]'
Note: A significant performance improvement can be achieved by installing the GMPY2 library.
$ python -m pip install 'tno.mpc.protocols.risk_propagation[gmpy]'
Protocol description
Risk propagation is an algorithm that propagates risk scores through a (transaction) network. Using distributed partial homomorphic encryption, the secure risk propagation implementation performs this algorithm on a network that is distributed among multiple parties. As input of the algorithm, every party possesses a list of nodes (i.e. bank accounts) with initial risk scores and has a list of transactions (weighted, directed edges) from and to its bank accounts. Using encrypted incoming risk scores scores from other parties, every party can securely update its risk scores using the formula for risk propagation. After a set number of iterations, the eventual risk scores are revealed to the parties that own the accounts, using the distributed private key.
In ERCIM News 126 (July 2021), we presented a more elaborate protocol descriptions. Figure 1 demonstrates a high-level overview of the idea behind the protocol. Figure 2 visualizes the decentralized approach.
Usage
The protocol is symmetric. For determining a secure set of parameters for the distributed keygen we refer to protocols.distributed_keygen.
Input
For the input two numpy arrays are expected. The structure and types are given in the tables below:
Input of the accounts:
id | risk_score |
---|---|
string | float 64 |
Input of the transactions:
id_source | bank_source | id_destination | bank_destination | amount |
---|---|---|---|---|
string | string | string | string | int32 |
A string is expected to consist out of at most 100 unicode characters.
For example data see the folder example_data
in tno/mpc/protocols/risk_propagation
.
Example usage
example_usage.py
""" Example usage for performing secure risk propagation Run three separate instances e.g., $ python example_usage.py -p Alice $ python example_usage.py -p Bob $ python example_usage.py -p Charlie """ import argparse import asyncio from tno.mpc.communication import Pool from tno.mpc.protocols.distributed_keygen import DistributedPaillier from tno.mpc.protocols.risk_propagation import Player from tno.mpc.protocols.risk_propagation.test.test_data.small import input_data """ Default parameters for distributed keygen """ corruption_threshold = 1 # corruption threshold key_length = 512 # bit length of private key prime_thresh = 2000 # threshold for primality check correct_param_biprime = 40 # correctness parameter for biprimality test stat_sec_shamir = ( 40 # statistical security parameter for secret sharing over the integers ) def parse_args(): parser = argparse.ArgumentParser() parser.add_argument( "-p", "--player", help="Name of the sending player", type=str.lower, required=True, choices=["alice", "bob", "charlie", "all"], ) args = parser.parse_args() return args async def main(player, pool, nodes, transactions, distributed): distributed_paillier = await DistributedPaillier.from_security_parameter( pool, corruption_threshold, key_length, prime_thresh, correct_param_biprime, stat_sec_shamir, precision=8, distributed=distributed, ) player_instance = Player(player, nodes, transactions, pool, distributed_paillier) await player_instance.run_protocol(iterations=3) print(player_instance.risk_scores) await asyncio.gather( *[shutdown(pool, player) for player in pool.pool_handlers.keys()] ) async def shutdown(pool, player): await pool.send(player, "Shutting down..") return await pool.recv(player) async def generate_instance(player, distributed=True): parties = { "alice": {"address": "127.0.0.1", "port": 8080}, "bob": {"address": "127.0.0.1", "port": 8081}, "charlie": {"address": "127.0.0.1", "port": 8082}, } port = parties[player]["port"] del parties[player] pool = Pool() pool.add_http_server(port=port) for name, party in parties.items(): assert "address" in party pool.add_http_client( name, party["address"], port=party["port"] if "port" in party else 80 ) # default port=80 if player == "alice": transactions = input_data["numpy_transactions_A"] nodes = input_data["numpy_nodes_A"] elif player == "bob": transactions = input_data["numpy_transactions_B"] nodes = input_data["numpy_nodes_B"] elif player == "charlie": transactions = input_data["numpy_transactions_C"] nodes = input_data["numpy_nodes_C"] await main(player, pool, nodes, transactions, distributed) async def all(): await asyncio.gather( *[ generate_instance("alice", distributed=False), generate_instance("bob", distributed=False), generate_instance("charlie", distributed=False), ], return_exceptions=True, ) if __name__ == "__main__": # Parse arguments and acquire configuration parameters args = parse_args() player = args.player loop = asyncio.get_event_loop() if player == "all": loop.run_until_complete(all()) else: loop.run_until_complete(generate_instance(player))
- Run three separate instances specifying the players:
$ python example_usage.py -p Alice $ python example_usage.py -p Bob $ python example_usage.py -p Charlie
or
- Run all three players in one Python instance:
$ python example_usage.py -p all
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file tno_mpc_protocols_risk_propagation-2.2.3.tar.gz
.
File metadata
- Download URL: tno_mpc_protocols_risk_propagation-2.2.3.tar.gz
- Upload date:
- Size: 116.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.9.18
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 897967d1ee92ac49c643267bd755fd5d7a870d97a9c9fc7eccf2d9c0bf87110a |
|
MD5 | e73698efb62888538cb8aafca00d5f6c |
|
BLAKE2b-256 | 887be8d74ae2e07280f02c83bd691f6be68fff6d93a6ecf60ee54f12e21fc879 |
File details
Details for the file tno.mpc.protocols.risk_propagation-2.2.3-py3-none-any.whl
.
File metadata
- Download URL: tno.mpc.protocols.risk_propagation-2.2.3-py3-none-any.whl
- Upload date:
- Size: 111.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.9.18
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c0bdab3e696fbd4824b7d2a5a2da7afa9cb2afb2f11875a9cfc160c7f4cf757f |
|
MD5 | fd1e533a0ce630c11af53edcf995a5ef |
|
BLAKE2b-256 | 0d709029e6bfc29cb9f9993792133e4f8b5d8f2049b0cc2ff62ef718684e39db |