Skip to main content

Secure risk propagation using distributed Paillier

Project description

TNO PET Lab - secure Multi-Party Computation (MPC) - Protocols - Risk Propagation

Secure Risk Propagation initially developed within the MPC4AML project.

PET Lab

The TNO PET Lab consists of generic software components, procedures, and functionalities developed and maintained on a regular basis to facilitate and aid in the development of PET solutions. The lab is a cross-project initiative allowing us to integrate and reuse previously developed PET functionalities to boost the development of new protocols and solutions.

The package tno.mpc.protocols.risk_propagation is part of the TNO Python Toolbox.

Limitations in (end-)use: the content of this software package may solely be used for applications that comply with international export control laws.
This implementation of cryptographic software has not been audited. Use at your own risk.

Documentation

Documentation of the tno.mpc.protocols.risk_propagation package can be found here.

Install

Easily install the tno.mpc.protocols.risk_propagation package using pip:

$ python -m pip install tno.mpc.protocols.risk_propagation

Note: If you are cloning the repository and wish to edit the source code, be sure to install the package in editable mode:

$ python -m pip install -e 'tno.mpc.protocols.risk_propagation'

If you wish to run the tests you can use:

$ python -m pip install 'tno.mpc.protocols.risk_propagation[tests]'

Note: A significant performance improvement can be achieved by installing the GMPY2 library.

$ python -m pip install 'tno.mpc.protocols.risk_propagation[gmpy]'

Protocol description

Risk propagation is an algorithm that propagates risk scores through a (transaction) network. Using distributed partial homomorphic encryption, the secure risk propagation implementation performs this algorithm on a network that is distributed among multiple parties. As input of the algorithm, every party possesses a list of nodes (i.e. bank accounts) with initial risk scores and has a list of transactions (weighted, directed edges) from and to its bank accounts. Using encrypted incoming risk scores scores from other parties, every party can securely update its risk scores using the formula for risk propagation. After a set number of iterations, the eventual risk scores are revealed to the parties that own the accounts, using the distributed private key.

In ERCIM News 126 (July 2021), we presented a more elaborate protocol descriptions. Figure 1 demonstrates a high-level overview of the idea behind the protocol. Figure 2 visualizes the decentralized approach.

Risk Propagation High Level Overview

Figure 1. We consider a three-bank scenario (Orange, Blue, and Purple). In this scenario the first (left) account at bank Orange is classified as high risk (due to e.g., large cash deposits) by bank Orange. This account wishes to launder its resources. To stay under the radar, the resources are funnelled through multiple accounts, at various banks, before arriving at their eventual destination, e.g., the account at bank Purple (right). To detect money laundering, we wish to follow (propagate) the risky money and classify the endpoint as high risk too. Full (global) knowledge of the network enables us to propagate the risk. However, how can we achieve something similar when there is only partial (local) knowledge of the entire network available? This is where MPC comes into play.

Risk Propagation Decentralized Approach

Figure 2. In our approach, the data is analyzed in a decentralized manner. From left-to-right, we visualize encryption, propagation and decryption. The parties encrypt their data using the additive homomorphic encryption scheme, no communication takes place. Once the data is encrypted locally, the distributed propagation (computation) over the encrypted data takes place. During this computation the data remains encrypted, the parties communicate intermediate (encrypted) results, and there is no central party. During the decryption phase, we need to decrypt the encrypted values with every party's key. We view the decryption from the green party's perspective. The lock on the risk scores belonging to the green party is opened part-by-part and the final opening happens by the green party. This ensures that only the green party gets to see the decrypted, propagated risk scores of his own bank accounts.

Usage

The protocol is symmetric. For determining a secure set of parameters for the distributed keygen we refer to protocols.distributed_keygen.

Input

For the input two numpy arrays are expected. The structure and types are given in the tables below:

Input of the accounts:

id risk_score
string float 64

Input of the transactions:

id_source bank_source id_destination bank_destination amount
string string string string int32

A string is expected to consist out of at most 100 unicode characters.

For example data see the folder example_data in tno/mpc/protocols/risk_propagation.

Example usage

example_usage.py

"""
   Example usage for performing secure risk propagation
   Run three separate instances e.g.,
   $ python example_usage.py -p Alice
   $ python example_usage.py -p Bob
   $ python example_usage.py -p Charlie
"""
import argparse
import asyncio

from tno.mpc.communication import Pool
from tno.mpc.protocols.distributed_keygen import DistributedPaillier

from tno.mpc.protocols.risk_propagation import Player
from tno.mpc.protocols.risk_propagation.test.test_data.small import input_data

"""
Default parameters for distributed keygen
"""
corruption_threshold = 1  # corruption threshold
key_length = 512  # bit length of private key
prime_thresh = 2000  # threshold for primality check
correct_param_biprime = 40  # correctness parameter for biprimality test
stat_sec_shamir = (
   40  # statistical security parameter for secret sharing over the integers
)


def parse_args():
   parser = argparse.ArgumentParser()
   parser.add_argument(
       "-p",
       "--player",
       help="Name of the sending player",
       type=str.lower,
       required=True,
       choices=["alice", "bob", "charlie", "all"],
   )
   args = parser.parse_args()
   return args


async def main(player, pool, nodes, transactions, distributed):
   distributed_paillier = await DistributedPaillier.from_security_parameter(
       pool,
       corruption_threshold,
       key_length,
       prime_thresh,
       correct_param_biprime,
       stat_sec_shamir,
       precision=8,
       distributed=distributed,
   )
   player_instance = Player(player, nodes, transactions, pool, distributed_paillier)

   await player_instance.run_protocol(iterations=3)
   print(player_instance.risk_scores)
   await asyncio.gather(
       *[shutdown(pool, player) for player in pool.pool_handlers.keys()]
   )


async def shutdown(pool, player):
   await pool.send(player, "Shutting down..")
   return await pool.recv(player)


async def generate_instance(player, distributed=True):
   parties = {
       "alice": {"address": "127.0.0.1", "port": 8080},
       "bob": {"address": "127.0.0.1", "port": 8081},
       "charlie": {"address": "127.0.0.1", "port": 8082},
   }

   port = parties[player]["port"]
   del parties[player]

   pool = Pool()
   pool.add_http_server(port=port)
   for name, party in parties.items():
       assert "address" in party
       pool.add_http_client(
           name, party["address"], port=party["port"] if "port" in party else 80
       )  # default port=80

   if player == "alice":
       transactions = input_data["numpy_transactions_A"]
       nodes = input_data["numpy_nodes_A"]
   elif player == "bob":
       transactions = input_data["numpy_transactions_B"]
       nodes = input_data["numpy_nodes_B"]
   elif player == "charlie":
       transactions = input_data["numpy_transactions_C"]
       nodes = input_data["numpy_nodes_C"]

   await main(player, pool, nodes, transactions, distributed)


async def all():
   await asyncio.gather(
       *[
           generate_instance("alice", distributed=False),
           generate_instance("bob", distributed=False),
           generate_instance("charlie", distributed=False),
       ],
       return_exceptions=True,
   )


if __name__ == "__main__":
   # Parse arguments and acquire configuration parameters
   args = parse_args()
   player = args.player
   loop = asyncio.get_event_loop()
   if player == "all":
       loop.run_until_complete(all())
   else:
       loop.run_until_complete(generate_instance(player))
  • Run three separate instances specifying the players:
    $ python example_usage.py -p Alice
    $ python example_usage.py -p Bob
    $ python example_usage.py -p Charlie
    

or

  • Run all three players in one Python instance:
    $ python example_usage.py -p all
    

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tno_mpc_protocols_risk_propagation-2.2.3.tar.gz (116.2 kB view details)

Uploaded Source

Built Distribution

File details

Details for the file tno_mpc_protocols_risk_propagation-2.2.3.tar.gz.

File metadata

File hashes

Hashes for tno_mpc_protocols_risk_propagation-2.2.3.tar.gz
Algorithm Hash digest
SHA256 897967d1ee92ac49c643267bd755fd5d7a870d97a9c9fc7eccf2d9c0bf87110a
MD5 e73698efb62888538cb8aafca00d5f6c
BLAKE2b-256 887be8d74ae2e07280f02c83bd691f6be68fff6d93a6ecf60ee54f12e21fc879

See more details on using hashes here.

File details

Details for the file tno.mpc.protocols.risk_propagation-2.2.3-py3-none-any.whl.

File metadata

File hashes

Hashes for tno.mpc.protocols.risk_propagation-2.2.3-py3-none-any.whl
Algorithm Hash digest
SHA256 c0bdab3e696fbd4824b7d2a5a2da7afa9cb2afb2f11875a9cfc160c7f4cf757f
MD5 fd1e533a0ce630c11af53edcf995a5ef
BLAKE2b-256 0d709029e6bfc29cb9f9993792133e4f8b5d8f2049b0cc2ff62ef718684e39db

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page