Efficient Secure Computation for Real-world Settings and Security Models

dc.contributor.advisorKatz, Jonathanen_US
dc.contributor.authorMalozemoff, Alexen_US
dc.contributor.departmentComputer Scienceen_US
dc.contributor.publisherDigital Repository at the University of Marylanden_US
dc.contributor.publisherUniversity of Maryland (College Park, Md.)en_US
dc.date.accessioned2016-09-03T05:41:40Z
dc.date.available2016-09-03T05:41:40Z
dc.date.issued2016en_US
dc.description.abstractSecure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its potential for maintaining privacy guarantees in real-world applications. However, current secure computation protocols are not yet efficient enough to be used in practice. We argue that this is due to much of the research effort being focused on generality rather than specificity. Namely, current research tends to focus on constructing and improving protocols for the strongest notions of security or for an arbitrary number of parties. However, in real-world deployments, these security notions are often too strong, or the number of parties running a protocol would be smaller. In this thesis we make several steps towards bridging the efficiency gap of secure computation by focusing on constructing efficient protocols for specific real-world settings and security models. In particular, we make the following four contributions: - We show an efficient (when amortized over multiple runs) maliciously secure two-party secure computation (2PC) protocol in the multiple-execution setting, where the same function is computed multiple times by the same pair of parties. - We improve the efficiency of 2PC protocols in the publicly verifiable covert security model, where a party can cheat with some probability but if it gets caught then the honest party obtains a certificate proving that the given party cheated. - We show how to optimize existing 2PC protocols when the function to be computed includes predicate checks on its inputs. - We demonstrate an efficient maliciously secure protocol in the three-party setting.en_US
dc.identifierhttps://doi.org/10.13016/M2GJ5D
dc.identifier.urihttp://hdl.handle.net/1903/18594
dc.language.isoenen_US
dc.subject.pqcontrolledComputer scienceen_US
dc.titleEfficient Secure Computation for Real-world Settings and Security Modelsen_US
dc.typeDissertationen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Malozemoff_umd_0117E_17446.pdf
Size:
1.11 MB
Format:
Adobe Portable Document Format