Cryptography, theory

group_project

Visible to the public  TWC: Small: Ascend: Architecture for Secure Computation on Encrypted Data

Outsourcing computation to the cloud has a difficult set of privacy challenges, a primary one being that the client cannot really trust cloud or application software. Encrypted computation achieves privacy by having the user specify encrypted inputs to a program in the cloud and returning encrypted results.

group_project

Visible to the public TWC: Medium: Collaborative: Deconstructing Encryption

Cryptographers have invented many different types of encryption. The PIs' research brings many of these under one umbrella, thereby reconceptualizing the landscape of modern cryptography. In the process, the research puts forward some entirely new kinds of encryption. The work is motivated by the needs of existing security practice. Sample questions include how to save space when storing encrypted copies of the same material in the cloud, and how to encrypt a credit-card number by reimagining the process as the shuffling of a deck of cards.

group_project

Visible to the public TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications

Many compelling applications involve computations that require sensitive data from two or more individuals. For example, as the cost of personal genome sequencing rapidly plummets many genetics applications will soon be within reach of individuals such as comparing one?s genome with the genomes of different groups of participants in a study to determine which treatment is likely to be most effective. Such comparisons could have tremendous value, but are currently infeasible because of the privacy concerns both for the individual and study participants.

group_project

Visible to the public TWC: Large: Collaborative: Verifiable Hardware: Chips that Prove their Own Correctness

This project addresses how semiconductor designers can verify the correctness of ICs that they source from possibly untrusted fabricators. Existing solutions to this problem are either based on legal and contractual obligations, or use post-fabrication IC testing, both of which are unsatisfactory or unsound. As a sound alternative, this project designs and fabricates verifiable hardware: ICs that provide proofs of their correctness for every input-output computation they perform in the field.

group_project

Visible to the public TWC: Small: General and Modular Secure Computation in the Offline-Online Paradigm

Secure multi-party computation (MPC) allows mutually distrusting parties to securely compute over their private data. The goal of this project is to provide novel MPC solutions that are efficient and simultaneously support operations of varying complexity on the input under their respective native representations. Driven by efficiency goals, this project studies the theory of MPC protocol design in the offline-online paradigm.

group_project

Visible to the public TWC: Small: Finding Optimality in Practical Cryptography

This project aims to obtain provably optimal cryptographic constructions, using objectively practical techniques, for a wide range of tasks. To achieve this goal, the project makes progress on three technical fronts. First, a general-purpose framework is developed that encompasses and systematizes known practical cryptographic techniques from many domains. Second, the project develops techniques for proving concrete, fine-grained lower bounds about constructions within this framework. Finally, techniques from program synthesis will be applied to the new framework.

group_project

Visible to the public TWC: Small: Collaborative: An Iterative Approach to Secure Computation

Secure multi-party computation (MPC) allows several mutually untrusting parties to perform joint computations while keeping their inputs private. This project develops new techniques for constructing two-party secure computation protocols with low communication overhead. Building on the Principal Investigator's prior work for constructing special-purpose secure MPC protocols for greedy algorithms, this project develops new techniques that exploit the algorithmic structure of a function in order to develop more efficient secure computation protocols.

group_project

Visible to the public TWC: Small: Coding-based Mechanisms for Building Secure Cloud Storage Systems

A wide range of cloud services and applications operate on sensitive data such as business, personal, and governmental information. This renders security and privacy as the most critical concerns in the cloud era. The objective of this project is to question the separation approach in the design of security and reliability features of storage systems, and to investigate new, coding-based security mechanisms based on a joint-design principle. The proposed program will result in a myriad of outcomes.

group_project

Visible to the public TWC: Small: Coding-based Mechanisms for Building Secure Cloud Storage Systems

A wide range of cloud services and applications operate on sensitive data such as business, personal, and governmental information. This renders security and privacy as the most critical concerns in the cloud era. The objective of this project is to question the separation approach in the design of security and reliability features of storage systems, and to investigate new, coding-based security mechanisms based on a joint-design principle. The proposed program will result in a myriad of outcomes.

group_project

Visible to the public TWC: Medium: Collaborative Research: Computing on Cryptographic Data

This project is developing new techniques for manipulating sensitive data by exploring two related areas, computing on private keys and computing on authenticated data. Currently, a private key is an inert object that gives its holder the ability to perform a cryptographic operation on all messages, as may be the case when generating a signature. The project is exploring a new vision, in which computing on the private key itself creates new restricted private keys that can only perform restricted operations such as, for example, signing only some messages but not others.