Division of Computing and Communication Foundations (CCF)
group_project
Submitted by Karl L on Thu, 12/21/2017 - 12:13pm
For nearly 40 years, the United States has faced a critical problem: increasing demand for energy has outstripped the ability of the systems and markets that supply power. Today, a variety of promising new technologies offer a solution to this problem. Clean, renewable power generation, such as solar and wind are increasingly available. Hybrid and plug-in electric vehicles offer greater energy efficiency in transportation.
group_project
Submitted by George Kesidis on Wed, 12/20/2017 - 6:16pm
For nearly 40 years, the United States has faced a critical problem: increasing demand for energy has outstripped the ability of the systems and markets that supply power. Today, a variety of promising new technologies offer a solution to this problem. Clean, renewable power generation, such as solar and wind are increasingly available. Hybrid and plug-in electric vehicles offer greater energy efficiency in transportation.
group_project
Submitted by Karl L on Wed, 12/20/2017 - 3:48pm
Computer users are increasingly faced with decisions that impact their personal privacy and the security of the systems they manage. The range of users confronting these challenges has broadened from the early days of computing to include everyone from home users to administrators of large enterprise networks. Privacy policies are frequently obscure, and security settings are typically complex. Missing from the options presented to a user is a decision support mechanism that can assist her in making informed choices.
group_project
Submitted by Simon Parsons on Wed, 12/20/2017 - 2:39pm
Computer users are increasingly faced with decisions that impact their personal privacy and the security of the systems they manage. The range of users confronting these challenges has broadened from the early days of computing to include everyone from home users to administrators of large enterprise networks. Privacy policies are frequently obscure, and security settings are typically complex. Missing from the options presented to a user is a decision support mechanism that can assist her in making informed choices.
group_project
Submitted by Abhi Shelat on Wed, 12/20/2017 - 9:43am
Recently, Gentry and others have established the feasibility of constructing fully homomorphic encryption schemes. Briefly, a fully homomorphic encryption (FHE) scheme is one that allows a third-party who has ciphertexts of several messages to construct---without knowing the decryption key---a new ciphertext that corresponds to an arbitrary efficiently computable function applied to the original messages. Fully homomorphic encryption has the potential to allow disparate organizations to compute basic functions on their pooled data-sets without revealing such data to each other.
group_project
Submitted by Tal Rabin on Wed, 12/20/2017 - 9:27am
Is it possible to delegate the processing of your data to a party you do not completely trust? What if you do not want to give full access to your data to such party? Or what if the computation you delegate is so sensitive that you must make sure the result is correct, but must do so using only very limited computational resources (which is the reason you delegated the computation in the first place)? These questions are at the core of the usual tension between convenience and availability on one hand and security and privacy on the other.
group_project
Submitted by Yevgeniy Dodis on Tue, 12/19/2017 - 12:57pm
While the mathematical study of cryptography has yielded a rich theory, and while the use of cryptography has become quite widespread, there is unfortunately still a significant gap between the theory and practice of cryptography. The goal of this project is to bridge this gap. The emphasis will be on the design and analysis of fundamental cryptographic primitives, such as hash functions and block ciphers, as well as other primitives derived from them, that are practical and yet theoretically sound. Indeed, hash functions and block ciphers are used in almost any cryptographic application.
group_project
Submitted by Giuseppe Ateniese on Tue, 12/19/2017 - 12:51pm
In order to enable collaboration between different parties it is necessary that the partners reach an agreement on the policy rules that will govern their interaction. While state-of-the-art mechanisms will allow the parties to reconcile their polices, today's policy reconciliation protocols have two main shortcomings. First, they violate privacy since at least one of the parties is required to discloses all its information during the reconciliation process. Second, they generally lack fairness, i.e., the parties' preferences are not recognized.
group_project
Submitted by Sencun Zhu on Tue, 12/19/2017 - 12:15pm
Software plagiarism is an act of reusing someone else's code, in whole or in part, into one own program in a way violating the terms of original license. Along with the rapid developing software industry and the burst of open source projects, software plagiarism has become a very serious threat to Intellectual Property Protection and the "healthiness" of the open-source-embracing software industry.
group_project
Submitted by Stephen Chong on Tue, 12/19/2017 - 12:12pm
Distributed applications (such as web applications and cloud-based applications, where multiple computers cooperate to run the application) are becoming increasingly common. Given the amount of commercial activity and information handled by these distributed applications, it is important that these applications are correct, reliable, and efficient. However, many traditional tools and techniques for programmers cannot be used for distributed applications, making it difficult for programmers to write and debug distributed applications.