(Ever More) Efficient Protocols for Secure Jonathan Katz Associate Professor Dept. of Computer Science
|
|
- Mervin Reynolds
- 5 years ago
- Views:
Transcription
1 (Ever More) Efficient Protocols for Secure Jonathan Katz Associate Professor Dept. of Computer Science
2 x 7 x 6 x 1 (y 1,y 2,,y n ) = f(x 1,x 2,,x n ) x 5 x 2 x 4 x 3
3 x 7 xy 7 x 6 x 1 xy 1 xy 6 xy 5 x 2 xy 2 xy 3 xy 4 (y 1,y 2,,y n ) = f(x 1,x 2,,x n ) x 5 x 4 x 3
4 Drawbacks? May not be a single party trusted by everyone Trusted party learns all inputs + outputs May be problemaac for legal/policy reasons Trusted party may later be compromised Trusted party becomes a high- value target If compromised, all security lost
5
6 A protocol is secure (within some specified threat model) if it emulates the use of a trusted party In paracular: The computed results are correct ParAes inputs remain private (except for what is implied by the outputs) ParAes inputs are chosen independently
7 Threat models Assumed bound on the number of corrupted (and colluding) paraes Types of misbehavior: Semi- honest Malicious
8 Distributed Used to compute the market- clearing price for sugar beets in Denmark (2008) Financial Compute HHIs for int l insatuaons to look for unsafe levels of exposure Privacy- preserving malware analysis
9 PrevenAng satellite collisions Sharemind (cf. youtube) Searching on encrypted data (Without fully homomorphic encrypaon ) Funded projects by DARPA, IARPA, ERC,
10 Is secure possible? Protocols for secure computaaon of any funcaon, with security against malicious behavior of any number of paraes, have been known since the 80s These protocols are generic, and work for any funcaon represented as a boolean circuit
11 Is secure Hopelessly inefficient Fairplay (two paraes, semi- honest) mula- party; malicious smartphone app improvements, tailored protocols, (faster computers)
12 Progress (2- party, semi- honest) x non- free gates/s gates/ Billions max gates Fairplay [PSSW09] TASTY Here 0 Fairplay [PSSW09] TASTY Here Performance Scalability 1 billion gates at 10 µs/gate
13 Generic vs. tailored protocols? (E.g., PSI) security level
14 Other Problem Best Previous Result Our Result Speedup Hamming Distance (face 213s 0.051s 4000x recogniaon) 900- bit vectors [SCiFI, 2010] An alternaave approach would have been to apply [a] generic secure two- party protocol. This would have required expressing Edit Distance (genome, the text algorithm as a circuit 534s and then sending 18.4s and compuang 30x that comparison) 200- character circuit. [We] believe [Jha+, that 2008] the performance of our protocols is strings, 8- bit alphabet significantly be`er than that of applying generic protocols. Smith- Waterman (genome [Not Osadchy Implementable] et al., IEEE Security & 447s Privacy (Oakland), alignment) 60- nucleoade sequences Oblivious AES Evalua@on 3.3s [H + 10] 0.2s 16x
15 Recent work Secure computaaon with sublinear work More efficient protocols with security against malicious behavior Relaxed security guarantees ( one- bit leakage ) Full malicious security
16 Secure 2PC over large data? Consider lookup in a (sorted) database Person 1 Person 2 Person n Is passenger X on the no-fly list? The circuit for this funcaon has size Ω(n) The circuit for any (non- trivial) funcaon has size Ω(n) Could have computed it (insecurely) in O(log n) Ame
17 Secure 2PC over large data? (At least) linear complexity is inherent for secure computaaon of any non- trivial f If the server never touches the ith record, then it learns that the ith record was irrelevant
18 Secure 2PC over large data Ideas: 1. Instead of secure 2PC based on circuits, explore secure 2PC based on RAMs 2. Consider secure 2PC in a senng where f is evaluated mul-ple Ames, and we aim for good amor-zed complexity
19 Experimental results 1600 (512- bit entries) Our Protocol Basic Yao Time (s) Log 2 (# entries)
20 Malicious adversaries? In principle, a malicious adversary aoacking a semi- honest protocol can completely violate privacy/correctness Can we guarantee any protecaon? Best known malicious protocols roughly 200x slower than semi- honest protocols * ( * In recent work we improve this by a factor of 3)
21 Malicious adversaries? What if we relax the security requirements? Here: 1- bit leakage The best a malicious adversary can do is learn is one bit of disallowed informaaon Cannot affect correctness
22 Performance Time (seconds) Semi- honest DualEx (dual- core) DualEx (single- core) Malicious [Kreuter et al., USENIX Security 2012] 0 PSI (4096) ED (200x200) AES (100) AES (1) 22
23 Current work Bridging PL and cryptography Beoer compilers for secure computaaon Beoer understanding of what is leaked by (even ideally) secure computaaon computaaon Bridging game theory and cryptography
24 Conclusions Secure computaaon is already (for moderate- sized circuits, and semi- honest security) Privacy- preserving applicaaons can run orders of magnitude faster than previously thought Secure computaaon will be deployed in <10 years
25 Acknowledgments Collaborators Yan Huang, Dave Evans, Lior Malka Dov Gordon, Vlad Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis Mike Hicks, Elaine Shi Research supported by NSF ( TC: Large: CollaboraAve Research: PracAcal Secure ComputaAon: Techniques, Tools, and ApplicaAons ) DARPA ( Toward PracAcal Cryptographic Protocols for Secure InformaAon Sharing ) ARL- ITA ( Secure InformaAon Flow in Hybrid CoaliAon Networks )
26 Selected Y. Huang et al., Faster Secure Two- Party ComputaGon Using Garbled Circuits, USENIX Security Symposium 2011 Y. Huang et al., Private Set IntersecGon: Are Garbled Circuits BeOer than Custom Protocols? NDSS 2012 D. Gordon et al., Secure Two- Party ComputaGon in Sublinear (AmorGzed) Time, ACM CCCS 2012 Y. Huang et al., Quid Pro Quo- tocols: Strengthening Semi- Honest Protocols with Dual ExecuGon, IEEE Security & Privacy (Oakland) 2012 Papers and code linked from h`p://
Securely Outsourcing Garbled Circuit Evaluation
Securely Outsourcing Garbled Circuit Evaluation USENIX Security Symposium 2013 Henry Hank Carter Patrick Traynor Benjamin Mood Kevin Butler SMC on mobile devices Mobile devices loaded with private and
More informationSecure Two-Party Computation in Sublinear (Amortized) Time
Secure Two-Party omputation in Sublinear (Amortized) Time S. Dov Gordon olumbia University gordon@cs.columbia.edu Jonathan Katz University of Maryland jkatz@cs.umd.edu Fernando Krell olumbia University
More informationPractical Secure Two-Party Computation and Applications
Practical Secure Two-Party Computation and Applications Lecture 2: Private Set Intersection Estonian Winter School in Computer Science 2016 Overview of this lecture Private Set Intersection Special Purpose
More informationFaster Private Set Intersection based on OT Extension
Faster Private Set Intersection based on OT Extension Michael Zohner (TU Darmstadt) Joint work with Benny Pinkas (Bar Ilan University) Thomas Schneider (TU Darmstadt) 22.08.14 Faster PSI based on OT extension
More informationFaster Secure Two-Party Computation Using Garbled Circuits
Faster Secure Two-Party Computation Using Garbled Circuits Yan Huang David Evans University of Virginia Jonathan Katz University of Maryland Lior Malka Intel Abstract Secure two-party computation enables
More informationBlind Seer: Scalable Private DB Querying
Blind Seer: Scalable Private DB Querying Columbia-Bell Labs work on IARPA SPAR project Vladimir Kolesnikov (Bell Labs), Steve Bellovin, Seung Geol Choi, Ben Fisch, Angelos Keromytis, Fernando Krell, Tal
More information2018: Problem Set 1
crypt@b-it 2018 Problem Set 1 Mike Rosulek crypt@b-it 2018: Problem Set 1 1. Sometimes it is not clear whether certain behavior is an attack against a protocol. To decide whether something is an attack
More informationSecure Function Evaluation using an FPGA Overlay Architecture
Secure Function Evaluation using an FPGA Overlay Architecture Xin Fang Stratis Ioannidis Miriam Leeser Dept. of Electrical and Computer Engineering Northeastern University Boston, MA, USA FPGA 217 1 Introduction
More informationWhitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices Annual Computer Security Applications Conference 2014 Henry Hank Carter, Charles Lever, Patrick Traynor SMC on mobile devices Mobile
More informationQuid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution
In 33 rd IEEE Symposium on Security and Privacy ( Oakland ), San Francisco, May 212 Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution Yan Huang University of Virginia yhuang@virginia.edu
More informationOutsourcing Secure Two-Party Computation as a Black Box
Outsourcing Secure Two-Party Computation as a Black Box Abstract. Secure multiparty computation (SMC) offers a technique to preserve functionality and data privacy in mobile applications. Current protocols
More informationPrivacy-Preserving Applications on Smartphones
In 6 th USENIX Workshop on Hot Topics in Security, San Francisco, 9 August 2011 Privacy-Preserving Applications on Smartphones Yan Huang Peter Chapman University of Virginia http://www.mightbeevil.org/mobile/
More informationSecure Multiparty Computation: Introduction. Ran Cohen (Tel Aviv University)
Secure Multiparty Computation: Introduction Ran Cohen (Tel Aviv University) Scenario 1: Private Dating Alice and Bob meet at a pub If both of them want to date together they will find out If Alice doesn
More informationMichael Zohner (TU Darmstadt)
Efficient OT Extension and its Impact on Secure Computation Pushing the Communication Barrier of Passive Secure Two-Party Computation Michael Zohner (TU Darmstadt) Joint work with Ghada Dessouky, Ahmad-Reza
More informationPrivacy-Preserving Distributed Linear Regression on High-Dimensional Data
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data Borja Balle Amazon Research Cambridge (work done at Lancaster University) Based on joint work with Adria Gascon, Phillipp Schoppmann,
More informationOutsourcing Secure Two-Party Computation as a Black Box
Outsourcing Secure Two-Party Computation as a Black Box Henry Carter Georgia Institute of Technology carterh@gatech.edu Benjamin Mood University of Florida bmood@ufl.edu Kevin Butler University of Florida
More informationCS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong
CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationPreserving Privacy through Processing Encrypted Data
Preserving Privacy through Processing Encrypted Data Prof. Miriam Leeser Department of Electrical and Computer Engineering Northeastern University Boston, MA mel@coe.neu.edu Joint work with Prof. Stratis
More informationJack Doerner [Northeastern U] An Introduction to Practical Multiparty Computation
Jack Doerner [Northeastern U] An Introduction to Practical Multiparty Computation This Talk MPC Frameworks - General Computation Circuit Structures - Solving Specific Problems The Memory Problem - A Perpetual
More informationfrom circuits to RAM programs in malicious-2pc
from circuits to RAM programs in malicious-2pc Abstract: Secure 2-party computation (2PC) is becoming practical in some domains However, most approaches are limited by the fact that the desired functionality
More informationCSC 5930/9010 Cloud S & P: Cloud Primitives
CSC 5930/9010 Cloud S & P: Cloud Primitives Professor Henry Carter Spring 2017 Methodology Section This is the most important technical portion of a research paper Methodology sections differ widely depending
More informationSecure Outsourced Garbled Circuit Evaluation for Mobile Devices
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Henry Carter, Georgia Institute of Technology Benjamin Mood, University of Oregon Patrick Traynor, Georgia Institute of Technology Kevin
More informationRational Oblivious Transfer
Rational Oblivious Transfer Xiong Fan xfan@cs.umd.edu Kartik Nayak kartik1507@gmail.com May 14, 2014 Abstract Oblivious transfer is widely used in secure multiparty computation. In this paper, we propose
More informationPrivacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute Hung Dang, Anh Dinh, Ee-Chien Chang, Beng Chin Ooi School of Computing National University of Singapore The Problem Context:
More informationCompacting Privacy-Preserving k-nearest Neighbor Search using Logic Synthesis
Compacting Privacy-Preserving k-nearest Neighbor Search using Logic Synthesis Ebrahim M. Songhori Dept. of ECE Rice University Houston, TX, USA ebrahim@rice.edu Siam U. Hussain Dept. of ECE Rice University
More informationGarbled Circuits via Structured Encryption Seny Kamara Microsoft Research Lei Wei University of North Carolina
Garbled Circuits via Structured Encryption Seny Kamara Microsoft Research Lei Wei University of North Carolina Garbled Circuits Fundamental cryptographic primitive Possess many useful properties Homomorphic
More informationIntroduction to Secure Multi-Party Computation
Introduction to Secure Multi-Party Computation Many thanks to Vitaly Shmatikov of the University of Texas, Austin for providing these slides. slide 1 Motivation General framework for describing computation
More informationImproved Blind Seer System With Constant Communication Rounds
Improved Blind Seer System With Constant Communication Rounds Zhangxiang Hu June 13, 2017 Abstract Private query brings new challenges to the design of Database Management System (DBMS). A recent work
More informationAn Overview of Active Security in Garbled Circuits
An Overview of Active Security in Garbled Circuits Author: Cesar Pereida Garcia Supervisor: Pille Pullonen Department of Mathematics and Computer Science. University of Tartu Tartu, Estonia. December 15,
More informationSecure Multiparty Computation
Secure Multiparty Computation Li Xiong CS573 Data Privacy and Security Outline Secure multiparty computation Problem and security definitions Basic cryptographic tools and general constructions Yao s Millionnare
More informationOutsourcing secure two-party computation as a black box
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:2261 2275 Published online 20 March 2016 in Wiley Online Library (wileyonlinelibrary.com)..1486 RESEARCH ARTICLE Outsourcing secure two-party
More informationHow to (not) Share a Password:
How to (not) Share a Password: Privacy preserving protocols for finding heavy hitters with adversarial behavior Moni Naor Benny Pinkas Eyal Ronen Passwords First modern use in MIT's CTSS (1961) Passwords
More informationCBMC-GC: An ANSI C Compiler for Secure Two-Party Computations
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations Martin Franz 1, Andreas Holzer 2, Stefan Katzenbeisser 3, Christian Schallhart 4, and Helmut Veith 3 1 Deutsche Bank 2 TU Wien 3 TU Darmstadt
More informationSecurity Protections for Mobile Agents
Stephen R. Tate Dept. of Computer Science and Engineering University of North Texas Talk describes joint work with Ke Xu and Vandana Gunupudi Research supported by the National Science Foundation class
More informationVlad Kolesnikov Bell Labs
Vlad Kolesnikov Bell Labs DIMACS/Northeast Big Data Hub Workshop on Privacy and Security for Big Data Apr 25, 2017 You are near Starbucks; here is a special Legislation may require user consent each time
More informationM 2 R: ENABLING STRONGER PRIVACY IN MAPREDUCE COMPUTATION
1 M 2 R: ENABLING STRONGER PRIVACY IN MAPREDUCE COMPUTATION TIEN TUAN ANH DINH, PRATEEK SAXENA, EE-CHIEN CHANG, BENG CHIN OOI, AND CHUNWANG ZHANG, NATIONAL UNIVERSITY OF SINGAPORE PRESENTED BY: RAVEEN
More informationSecure Multi-party Computation
Secure Multi-party Computation What it is, and why you d care Manoj Prabhakaran University of Illinois, Urbana-Champaign SMC SMC SMC conceived more than 30 years back SMC SMC conceived more than 30 years
More informationFAST DETECTION OF TRANSFORMED DATA LEAKS
RESEARCH ARTICLE International Journal of Computer Techniques Volume 4 Issue 3, May June 2017 FAST DETECTION OF TRANSFORMED DATA LEAKS V.Prathibha 1, E.Dilipkumar 2 1 PG Student, 2 Assistant Professor
More informationSecure Multiparty Computation
CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationSecure Computation of MIPS Machine Code
Secure Computation of MIPS Machine Code Xiao Shaun Wang S. Dov Gordon Allen McIntosh Jonathan Katz Abstract Existing systems for secure computation require programmers to express the program to be securely
More informationSecure Remote Storage Using Oblivious RAM
Secure Remote Storage Using Oblivious RAM Giovanni Malloy Mentors: Georgios Kellaris, Kobbi Nissim August 11, 2016 Abstract Oblivious RAM (ORAM) is a protocol that allows a user to access the data she
More informationSecure Computation Towards Practical Applications. Fernando Krell Loy
Secure Computation Towards Practical Applications Fernando Krell Loy Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences
More informationSecure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity
Secure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity Ayman Jarrous 1 and Benny Pinkas 2,* 1 University of Haifa, Israel. 2 Bar Ilan University,
More informationSecure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining
CS573 Data Privacy and Security Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining Li Xiong Slides credit: Chris Clifton, Purdue University; Murat Kantarcioglu, UT
More informationMEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones
JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, DECEMBER 2017 1 MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones Qing Yang, Ge Peng, Paolo Gasti, Member, IEEE, Kiran S. Balagani,
More informationCryptographic Primitives and Protocols for MANETs. Jonathan Katz University of Maryland
Cryptographic Primitives and Protocols for MANETs Jonathan Katz University of Maryland Fundamental problem(s) How to achieve secure message authentication / transmission in MANETs, when: Severe resource
More informationVERIFIABLE SYMMETRIC SEARCHABLE ENCRYPTION
VERIFIABLE SYMMETRIC SEARCHABLE ENCRYPTION DATE 09/03/2016 SÉMINAIRE EMSEC - RAPHAEL BOST Searchable Encryption Outsource data securely keep search functionalities Generic Solutions We can use generic
More informationPrivate Set Intersection for Unequal Set Sizes with Mobile Applications
Private Set Intersection for Unequal Set Sizes with Mobile Applications Ágnes Kiss (TU Darmstadt) Jian Liu (Aalto University) Thomas Schneider (TU Darmstadt) N. Asokan (Aalto University) Benny Pinkas (Bar-Ilan
More informationCollabora've, Privacy Preserving Data Aggrega'on at Scale
Collabora've, Privacy Preserving Data Aggrega'on at Scale Michael J. Freedman Princeton University Joint work with: Benny Applebaum, Haakon Ringberg, MaHhew Caesar, and Jennifer Rexford Problem: Network
More informationResearch Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.
Research Statement Yehuda Lindell Dept. of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il www.cs.biu.ac.il/ lindell July 11, 2005 The main focus of my research is the theoretical foundations
More informationMulti-Party 2 Computation Part 1
ECRYPT.NET Cloud Summer School Multi-Party 2 Computation Part 1 Claudio Orlandi, Aarhus University Plan for the next 3 hours Part 1: Secure Computation with a Trusted Dealer Warmup: One-Time Truth Tables
More informationHow to (not) Share a Password:
How to (not) Share a Password: Privacy preserving protocols for finding heavy hitters with adversarial behavior Moni Naor Benny Pinkas Eyal Ronen Passwords First modern use in MIT's CTSS (1961) Passwords
More informationEfficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation Vladimir Kolesnikov 1, Ranjit Kumaresan 2, and Abdullatif Shikfa 3 1 Bell Labs Research, Alcatel-Lucent, Murray
More informationChameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications M. Sadegh Riazi UC San Diego mriazi@eng.ucsd.edu Christian Weinert TU Darmstadt, Germany christian.weinert@crisp-da.de
More informationA Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and Their Modular Design
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and Their Modular Design Vladimir Kolesnikov Alcatel-Lucent Bell Laboratories Murray Hill, NJ 07974,
More informationSecure Multi-Party Computation. Lecture 13
Secure Multi-Party Computation Lecture 13 Must We Trust? Can we have an auction without an auctioneer?! Declared winning bid should be correct Only the winner and winning bid should be revealed Using data
More informationDistributed Systems. Rik Sarkar James Cheney. University of Edinburgh Spring 2014
Distributed Systems Rik Sarkar James Cheney University of Edinburgh Spring 2014 Course InformaAon Instructors: James Cheney (IF 5.29, jcheney@inf.ed.ac.uk) Rik Sarkar (IF 3.45, rsarkar@inf.ed.ac.uk) TA:
More informationSecure Two-Party Computation: Generic Approach and Exploiting Specific Properties of Functions Approach
Secure Two-Party Computation: Generic Approach and Exploiting Specific Properties of Functions Approach A. Anasuya Threse Innocent, K. Sangeeta Department of CSE Amrita School of Engineering Amrita Vishwa
More informationExploring the Boundaries of Topology-Hiding Computation
Exploring the Boundaries of Topology-Hiding Computation Marshall Ball 1, Elette Boyle 2, Tal Malkin 3, and Tal Moran 2 1 Columbia University and IDC Herzliya. marshall@cs.columbia.edu 2 IDC Herzliya, Israel.
More informationLow-Leakage Secure Search for Boolean Expressions
Low-Leakage Secure Search for Boolean Expressions Fernando Krell 1, Gabriela Ciocarlie 2, Ashish Gehani 2, and Mariana Raykova 3 1 Dreamlab Technologies fernando.krell@dreamlab.net 2 SRI International
More informationMalicious-Client Security in Blind Seer: A Scalable Private DBMS
2015 IEEE Symposium on Security and Privacy Malicious-Client Security in Blind Seer: A Scalable Private DBMS Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin,
More informationFor your phone only: custom protocols for efficient secure function evaluation on mobile devices
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2014; 7:1165 1176 Published online 23 July 2013 in Wiley Online Library (wileyonlinelibrary.com)..851 RESEARCH ARTICLE For your phone only: custom
More information- Presentation 25 minutes + 5 minutes for questions. - Presentation is on Wednesday, 11:30-12:00 in B05-B06
Information: - Presentation 25 minutes + 5 minutes for questions. - Presentation is on Wednesday, 11:30-12:00 in B05-B06 - Presentation is after: Abhi Shelat (fast two-party secure computation with minimal
More informationSecure Hamming Distance based Biometric Authentication
Secure Hamming Distance based Biometric Authentication ohan Kulkarni Anoop Namboodiri International Institute of Information Technology Hyderabad {rohan.kulkarni@research, anoop@}.iiit.ac.in Abstract Concerns
More informationMichael Zohner (TU Darmstadt)
ABY -A Framework for Efficient Mixed-Protocol Secure Two-Party Computation Michael Zohner (TU Darmstadt) Joint work with Daniel Demmler and Thomas Schneider 19.02.15 ABY: Mixed-Protocol Secure Two-Party
More informationSecuring Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh
Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party
More information1 A Tale of Two Lovers
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Dec. 12, 2006 Lecture Notes 19 (expanded): Secure Two-Party Computation Recommended Reading. Goldreich Volume II 7.2.2, 7.3.2, 7.3.3.
More informationPrivacy Preserving Collaborative Filtering
Privacy Preserving Collaborative Filtering Emily Mu, Christopher Shao, Vivek Miglani May 2017 1 Abstract As machine learning and data mining techniques continue to grow in popularity, it has become ever
More informationOnion ORAM: Constant Bandwidth ORAM Using Additively Homomorphic Encryption Ling Ren
Onion ORAM: Constant Bandwidth ORAM Using Additively Homomorphic Encryption Ling Ren Joint work with: Chris Fletcher, Srini Devadas, Marten van Dijk, Elaine Shi, Daniel Wichs Oblivious RAM (ORAM) Client
More informationarxiv: v1 [cs.cr] 17 Jun 2012
Multiparty Cloud Computation Qingji Zheng 1 and Xinwen Zhang 2 arxiv:1206.3717v1 [cs.cr] 17 Jun 2012 1 University of Texas at San Antonio, TX, USA qzheng@cs.utsa.edu 2 Huawei Research Center, Santa Clara,
More informationNSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015
NSF Transition to Practice Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 Networking and IT Research and Development (NITRD) FY16 Supplement
More informationImplementation Techniques
4 Implementation Techniques Although secure computation protocols (as described in Section 3) were known since the 1980s, the first full implementation of a generic secure computation system was Fairplay
More informationCryptography & Data Privacy Research in the NSRC
Cryptography & Data Privacy Research in the NSRC Adam Smith Assistant Professor Computer Science and Engineering 1 Cryptography & Data Privacy @ CSE NSRC SIIS Algorithms & Complexity Group Cryptography
More informationBillion-Gate Secure Computation with Malicious Adversaries
Billion-Gate Secure Computation with Malicious Adversaries Benjamin Kreuter brk7bx@virginia.edu University of Virginia abhi shelat abhi@virginia.edu University of Virginia Chih-hao Shen cs6zb@virginia.edu
More informationSecure Outsourced Biometric Authentication with Performance Evaluation on Smartphones
Secure Outsourced Biometric Authentication with Performance Evaluation on Smartphones Jaroslav Šeděnka, Sathya Govindarajan, Paolo Gasti, Kiran S. Balagani New York Institute of Technology {jsedenka,sgovin,pgasti,kbalagan}@nyit.edu
More informationGarbledCPU: A MIPS Processor for Secure Computation in Hardware
CPU: A MIPS Processor for Secure Computation in Hardware Ebrahim M. Songhori Rice University Houston, TX, USA ebrahim@rice.edu Thomas Schneider thomas.schneider@crispda.de Shaza Zeitouni shaza.zeitouni@trust.tudarmstadt.de
More informationParallel Coin-Tossing and Constant-Round Secure Two-Party Computation
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Yehuda Lindell Department of Computer Science and Applied Math, Weizmann Institute of Science, Rehovot, Israel. lindell@wisdom.weizmann.ac.il
More informationThe Oblivious Machine
The Oblivious Machine or: How to Put the C into MPC Marcel Keller Department of Computer Science, University of Bristol m.keller@bristol.ac.uk Abstract. We present an oblivious machine, a concrete notion
More informationAn Overview of Secure Multiparty Computation
An Overview of Secure Multiparty Computation T. E. Bjørstad The Selmer Center Department of Informatics University of Bergen Norway Prøveforelesning for PhD-graden 2010-02-11 Outline Background 1 Background
More informationApproximating Private Set Union/Intersection Cardinality with Logarithmic Complexity
Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity Changyu Dong, Grigorios Loukides Abstract The computation of private set union/intersection cardinality (PSU-CA/PSI-CA)
More informationA Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme
A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme Tiina Turban Master in Security and Mobile Computing Submission date: May 2014 Supervisor: Stig Frode Mjølsnes,
More informationCombining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen 1,2 and Sander Siim 1,2 1 Cybernetica AS, Tartu, Estonia 2 University of Tartu, Tartu,
More informationEfficient Oblivious Computation Techniques for Privacy-Preserving Mobile Applications
Efficient Oblivious Computation Techniques for Privacy-Preserving Mobile Applications Henry Carter, Chaitrali Amrutkar, Italo Dacosta, and Patrick Traynor Converging Infrastructure Security (CISEC) Laboratory
More informationUsable PIR. Network Security and Applied. Cryptography Laboratory.
Network Security and Applied Cryptography Laboratory http://crypto.cs.stonybrook.edu Usable PIR NDSS '08, San Diego, CA Peter Williams petertw@cs.stonybrook.edu Radu Sion sion@cs.stonybrook.edu ver. 2.1
More informationSimple and Efficient Two-Server ORAM
Simple and Efficient Two-Server ORAM Xiao Wang Dov Gordon Jonathan Katz Abstract We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the best prior work. Our
More informationKiss, Ágnes; Liu, Jian; Schneider, Thomas ; Asokan, N.; Pinkas, Benny Private Set Intersection for Unequal Set Sizes with Mobile Applications
Powered by TCPDF (www.tcpdf.org) This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Kiss, Ágnes; Liu, Jian; Schneider,
More informationCryptography & Data Privacy Research in the NSRC
Cryptography & Data Privacy Research in the NSRC Adam Smith Assistant Professor Computer Science and Engineering 1 Cryptography & Data Privacy @ CSE NSRC SIIS Algorithms & Complexity Group Cryptography
More informationSystematizing Secure Computation for Research and Decision Support
Systematizing Secure Computation for Research and Decision Support Jason Perry 1, Debayan Gupta 2, Joan Feigenbaum 2 and Rebecca N. Wright 1 1 Rutgers University, NJ, USA. {jason.perry rebecca.wright}@rutgers.edu
More informationStructured Encryption and Controlled Disclosure
Structured Encryption and Controlled Disclosure Melissa Chase Seny Kamara Microsoft Research Cloud Storage Security for Cloud Storage o Main concern: will my data be safe? o it will be encrypted o it will
More informationMichael Zohner (TU Darmstadt)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation Michael Zohner (TU Darmstadt) Joint work with Daniel Demmler and Thomas Schneider 11.02.14 ABY: Mixed-Protocol Secure Two-Party
More informationAscend: Architecture for Secure Computation on Encrypted Data Oblivious RAM (ORAM)
CSE 5095 & ECE 4451 & ECE 5451 Spring 2017 Lecture 7b Ascend: Architecture for Secure Computation on Encrypted Data Oblivious RAM (ORAM) Marten van Dijk Syed Kamran Haider, Chenglu Jin, Phuong Ha Nguyen
More informationSecuring Cloud-assisted Services
Securing Cloud-assisted Services N. Asokan http://asokan.org/asokan/ @nasokan Services are moving to the cloud http://dilbert.com/strip/2012-05-25 2 Services are moving to the cloud Example: cloud-based
More informationFaster Malicious 2-Party Secure Computation with Online/Offline Dual Execution
Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution Peter Rindal and Mike Rosulek, Oregon State University https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/rindal
More informationBig Data - Security and Privacy
Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,
More informationPCF: A Portable Circuit Format for Scalable Two-Party Secure Computation
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation Ben Kreuter, University of Virginia; Benjamin Mood, University of Oregon; abhi shelat, University of Virginia; Kevin Butler, University
More informationMore crypto and security
More crypto and security CSE 199, Projects/Research Individual enrollment Projects / research, individual or small group Implementation or theoretical Weekly one-on-one meetings, no lectures Course grade
More informationEfficient Private Information Retrieval
Efficient Private Information Retrieval K O N S T A N T I N O S F. N I K O L O P O U L O S T H E G R A D U A T E C E N T E R, C I T Y U N I V E R S I T Y O F N E W Y O R K K N I K O L O P O U L O S @ G
More informationCCW Workshop Technical Session on Mobile Cloud Compu<ng
CCW Workshop Technical Session on Mobile Cloud Compu
More informationCombining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen 1,2 and Sander Siim 1,2 1 Cybernetica AS 2 University of Tartu {pille.pullonen, sander.siim}@cyber.ee
More informationSCORAM: Oblivious RAM for Secure Computation
SCORAM: Oblivious RAM for Secure Computation Xiao Shaun Wang University of Maryland wangxiao@cs.umd.edu abhi shelat University of Virginia abhi@virginia.edu Yan Huang Indiana University Bloomington yh33@indiana.edu
More information