Might Be Evil

Secure Computation

We are developing techniques and tools to enable useful computation to be done while preserving data privacy.

Talk slides: PPTX PDF Download Android Demo Download Framework

Projects

spacer Fast Secure Computation Using Garbled Circuits
Framework and library for buiding efficient and scalable privacy-preserving applications using garbled circuits. [Download]

NetList: Efficient Circuit Structures
Circuit structures for efficiently implementing data structures in static circuits. [Download]

Garbled Circuits Intermediate Language

spacer Secure Computation on Smartphones
Using our fast garbled circuits framework to enable privacy-preserving applications on Android devices. [Demo]
(Yan Huang, Peter Chapman, David Evans)
spacer Efficient Privacy-Preserving Biometric Identification
Using garbled circuits and homomorphic encryption to perform private biometric identification.
(Yan Huang, Lior Malka, David Evans, Jonathan Katz)
spacer Private Editing in the Cloud
A Firefox extension for using Google Docs without exposing your document's contents.
(Yan Huang, David Evans)

Publications

Yan Huang, Jonathan Katz, and David Evans. Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose. In 33rd International Cryptology Conference (CRYPTO 2013), Santa Barbara, CA, 18-22 August 2013. [PDF, 16 pages]

Samee Zahur and David Evans. Circuit Structures for Improving Efficiency of Security and Privacy Tools. In 34th IEEE Symposium on Security and Privacy ("Oakland" 2013), San Francisco, CA. May 19-22, 2013. [PDF, 15 pages]

Yan Huang, Jonathan Katz, and David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. In 33rd IEEE Symposium on Security and Privacy ("Oakland" 2012), San Francisco, CA. 20-23 May 2012. [PDF, 13 pages]

Yan Huang, David Evans, and Jonathan Katz. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?. In 19th Network and Distributed Security Symposium (NDSS 2012), San Diego, CA. 5-8 February 2012. [PDF, 15 pages]

Yan Huang, Chih-hao Shen, David Evans, Jonathan Katz, and abhi shelat. Efficient Secure Computation with Garbled Circuits. Invited paper for Seventh International Conference on Information Systems Security (ICISS 2011). 15-19 December 2011, Jadavpur University, Kolkata, India. [PDF, 21 pages]

Yikan Chen and David Evans. Auditing Information Leakage for Distance Metrics. In Third IEEE Conference on Privacy, Security, Risk and Trust, Boston, MA, 9-11 October 2011. [PDF, 10 pages]

Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster Secure Two-Party Computation Using Garbled Circuits, 20th USENIX Security Symposium, San Francisco, CA. 8-12 August 2011. [PDF, 16 pages]

Yan Huang, Peter Chapman, and David Evans. Privacy-Preserving Applications on Smartphones. 6th USENIX Workshop on Hot Topics in Security (HotSec 2011), San Francisco. 9 August 2011. Paper: [PDF, 6 pages]. Talk slides: [PDF] (Peter Chapman).

Yan Huang and David Evans. Private Editing Using Untrusted Cloud Services. Second International Workshop on Security and Privacy in Cloud Computing. Minneapolis, Minnesota. 24 June 2011. [PDF, 10 pages]

Yan Huang, Peter Chapman, and David Evans. Secure Computation on Mobile Devices. Poster at IEEE Symposium on Security and Privacy. Berkeley, CA. 22-25 May 2011. [Proposal: PDF, 2 pages] [Poster: PDF, 2MB]

Yan Huang, Lior Malka, David Evans, and Jonathan Katz. Efficient Privacy-Preserving Biometric Identification, in 18th Network and Distributed System Security Symposium (NDSS 2011). San Diego, CA. 6-9 February 2011. [PDF, 14 pages]

People

Project Initiator

Yan Huang (now at University of Maryland, completed PhD at University of Virginia in 2012)

Faculty

David Evans (University of Virginia)
Jonathan Katz (University of Maryland)

Students

Guanmei Liang (University of Virginia, BACS Student)
Samee Zahur (University of Virginia, PhD Student)

Alumni

Peter Chapman (University of Virginia, BACS 2012; CRA Runner-Up; now at CMU)
Jiamin Chen (University of Virginia, BACS 2012)
Yikan Chen (University of Virginia, graduate Student)
Brittany Harris (University of Virginia, BACS 2013)
Sang Koo (University of Virginia, BSCS/BSCpE 2013)
Lior Malka (University of Maryland post-doc, now at Intel)
Billy Melicher (University of Virginia, BACS 2013, not at CMU)
Shengxuan (Jerry) Ye (University of Virginia, BSCS 2012; now at CalTech)

Funding

This work is supported by a a MURI award from the Air Force Office of Scientific Research (Defending Against Hostile Operating Systems, FA9550-09-1-0539), a grant from the National Science Foundation (TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications), and a Google Research Award.


Might Be Evil: Privacy-Preserving Computing
University of Maryland / University of Virginia
 
evans@cs.virginia.edu
Background image: flickr cc: didbygraham
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.