6 research outputs found

    TASTY: Tool for Automating Secure Two-partY computations

    Get PDF
    Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the outcome. Existing cryptographic compilers can automatically generate secure computation protocols from high-level specifications, but are often limited in their use and efficiency of generated protocols as they are based on either garbled circuits or (additively) homomorphic encryption only. In this paper we present TASTY, a novel tool for automating, i.e., describing, generating, executing, benchmarking, and comparing, efficient secure two-party computation protocols. TASTY is a new compiler that can generate protocols based on homomorphic encryption and efficient garbled circuits as well as combinations of both, which often yields the most efficient protocols available today. The user provides a high-level description of the computations to be performed on encrypted data in a domain-specific language. This is automatically transformed into a protocol. TASTY provides most recent techniques and optimizations for practical secure two-party computation with low online latency. Moreover, it allows to efficiently evaluate circuits generated by the well-known Fairplay compiler. We use TASTY to compare protocols for secure multiplication based on homomorphic encryption with those based on garbled circuits and highly efficient Karatsuba multiplication. Further, we show how TASTY improves the online latency for securely evaluating the AES functionality by an order of magnitude compared to previous software implementations. TASTY allows to automatically generate efficient secure protocols for many privacy-preserving applications where we consider the use cases for private set intersection and face recognition protocols

    Mobility in a Globalised World 2012

    Get PDF
    The term mobility has different meanings in the following science disciplines. In economics, mobility is the ability of an individual or a group to improve their economic status in relation to income and wealth within their lifetime or between generations. In information systems and computer science, mobility is used for the concept of mobile computing, in which a computer is transported by a person during normal use. By designing logistics networks, logistics creates the infrastructure for the mobility of people and goods. Electric mobility is one of today’s solutions from an engineering perspective to the problem of reducing the need for energy resources and environmental impact. Finally, for urban planning, mobility is the crunch question as to how to optimise the different needs for mobility and how to link different transportation systems. In this publication we have collected the ideas of practitioners, researchers, and government officials about the different modes of mobility in a globalised world, focusing on both domestic and international issues

    Efficient privacy-preserving face recognition

    No full text
    Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, the rapid improvement and widespread deployment of this technology raises strong concerns regarding the violation of individuals ’ privacy. A typical application scenario for privacy-preserving face recognition concerns a client who privately searches for a specific face image in the face image database of a server. In this paper we present a privacy-preserving face recognition scheme that substantially improves over previous work in terms of communicationand computation efficiency: the most recent proposal of Erkin et al. (PETS’09) requires O(log M) rounds and computationally expensive operations on homomorphically encrypted data to recognize a face in a database of M faces. Our improved scheme requires only O(1) rounds and has a substantially smaller online communication complexity (by a factor of 15 for each database entry) and less computation complexity. Our solution is based on known cryptographic building blocks combining homomorphic encryption with garbled circuits. Our implementation results show the practicality of our scheme also for large databases (e.g., for M = 1000 we need less than 13 seconds and less than 4 MByte online communication on two 2.4GHz PCs connected via Gigabit Ethernet)

    Efficient Privacy-Preserving Face Recognition

    No full text
    Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, the rapid improvement and widespread deployment of this technology raises strong concerns regarding the violation of individuals\u27 privacy. A typical application scenario for privacy-preserving face recognition concerns a client who privately searches for a specific face image in the face image database of a server. In this paper we present a privacy-preserving face recognition scheme that substantially improves over previous work in terms of communication- and computation efficiency: the most recent proposal of Erkin et al. (PETS\u2709) requires O(logM)\mathcal{O}(\log M) rounds and computationally expensive operations on homomorphically encrypted data to recognize a face in a database of MM faces. Our improved scheme requires only O(1)\mathcal{O}(1) rounds and has a substantially smaller online communication complexity (by a factor of 1515 for each database entry) and less computation complexity. Our solution is based on known cryptographic building blocks combining homomorphic encryption with garbled circuits. Our implementation results show the practicality of our scheme also for large databases (e.g., for M=1000M = 1000 we need less than 1313 seconds and less than 44 MByte online communication on two 2.4GHz PCs connected via Gigabit Ethernet)

    ENX ID - an architecture for practical and secure cross company authentication

    No full text
    This paper introduces a development approach and a novel architecture for cross company identity management and authentication. It aims to design an architecture, which is practically implementable in the highly collaborative environment that exists in the automotive industry. The paper sketches the conducted marked research to obtain such a model and presents an architecture design based on a trusted intermediary

    Agnew answers questions on revenue sharing, Tallahassee, Florida, May 12, 1971

    No full text
    This is a recording of Vice President Spiro T. Agnew answering questions in Tallahassee, Florida. During the time, Vice President Agnew answers questions on revenue sharing, changing the voting age to 18, the anti-war demonstration in Washington, D. C., and the space program
    corecore