6 research outputs found
TASTY: Tool for Automating Secure Two-partY computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the outcome. Existing cryptographic compilers can automatically generate secure computation protocols from high-level specifications, but are often limited in their use and efficiency of generated protocols as they are based on either garbled circuits or (additively) homomorphic encryption only.
In this paper we present TASTY, a novel tool for automating, i.e., describing, generating, executing, benchmarking, and comparing, efficient secure two-party computation protocols. TASTY is a new compiler that can generate protocols based on homomorphic encryption and efficient garbled circuits as well as combinations of both, which often yields the most efficient protocols available today. The user provides a high-level description of the computations to be performed on encrypted data in a domain-specific language. This is automatically transformed into a protocol.
TASTY provides most recent techniques and optimizations for practical secure two-party computation with low online latency. Moreover, it allows to efficiently evaluate circuits generated by the well-known Fairplay compiler.
We use TASTY to compare protocols for secure multiplication based on homomorphic encryption with those based on garbled circuits and highly efficient Karatsuba multiplication.
Further, we show how TASTY improves the online latency for securely evaluating the AES functionality by an order of magnitude compared to previous software implementations. TASTY allows to automatically generate efficient secure protocols for many privacy-preserving applications where we consider the use cases for private set intersection and face recognition protocols
Mobility in a Globalised World 2012
The term mobility has different meanings in the following science disciplines. In economics,
mobility is the ability of an individual or a group to improve their economic status in relation
to income and wealth within their lifetime or between generations. In information systems and
computer science, mobility is used for the concept of mobile computing, in which a computer
is transported by a person during normal use. By designing logistics networks, logistics creates
the infrastructure for the mobility of people and goods. Electric mobility is one of today’s
solutions from an engineering perspective to the problem of reducing the need for energy resources
and environmental impact. Finally, for urban planning, mobility is the crunch question
as to how to optimise the different needs for mobility and how to link different transportation
systems. In this publication we have collected the ideas of practitioners, researchers, and government officials about the different modes of mobility in a globalised world, focusing on both domestic and international issues
Efficient privacy-preserving face recognition
Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, the rapid improvement and widespread deployment of this technology raises strong concerns regarding the violation of individuals ’ privacy. A typical application scenario for privacy-preserving face recognition concerns a client who privately searches for a specific face image in the face image database of a server. In this paper we present a privacy-preserving face recognition scheme that substantially improves over previous work in terms of communicationand computation efficiency: the most recent proposal of Erkin et al. (PETS’09) requires O(log M) rounds and computationally expensive operations on homomorphically encrypted data to recognize a face in a database of M faces. Our improved scheme requires only O(1) rounds and has a substantially smaller online communication complexity (by a factor of 15 for each database entry) and less computation complexity. Our solution is based on known cryptographic building blocks combining homomorphic encryption with garbled circuits. Our implementation results show the practicality of our scheme also for large databases (e.g., for M = 1000 we need less than 13 seconds and less than 4 MByte online communication on two 2.4GHz PCs connected via Gigabit Ethernet)
Efficient Privacy-Preserving Face Recognition
Automatic recognition of human faces is becoming increasingly popular
in civilian and law enforcement applications that require reliable
recognition of humans.
However, the rapid improvement and widespread deployment of this
technology raises strong concerns regarding the violation
of individuals\u27 privacy.
A typical application scenario for privacy-preserving face recognition concerns
a client who privately searches for a specific face image
in the face image database of a server.
In this paper we present a privacy-preserving face recognition scheme
that substantially improves over previous work in terms of
communication- and computation efficiency: the most recent
proposal of Erkin et al. (PETS\u2709) requires rounds and computationally
expensive operations on homomorphically encrypted data to recognize a
face in a database of faces. Our improved scheme requires only
rounds and has a substantially smaller online communication complexity (by a factor of for each database entry) and less computation complexity.
Our solution is based on known cryptographic
building blocks combining homomorphic encryption with garbled
circuits. Our implementation results show the practicality of our
scheme also for large databases (e.g., for we need less than
seconds and less than MByte online communication on two 2.4GHz PCs connected via Gigabit Ethernet)
ENX ID - an architecture for practical and secure cross company authentication
This paper introduces a development approach and a novel architecture for cross company identity management and authentication. It aims to design an architecture, which is practically implementable in the highly collaborative environment that exists in the automotive industry. The paper sketches the conducted marked research to obtain such a model and presents an architecture design based on a trusted intermediary
Agnew answers questions on revenue sharing, Tallahassee, Florida, May 12, 1971
This is a recording of Vice President Spiro T. Agnew answering questions in Tallahassee, Florida. During the time, Vice President Agnew answers questions on revenue sharing, changing the voting age to 18, the anti-war demonstration in Washington, D. C., and the space program