Secure ComputationWe are developing techniques and tools to enable useful computation to be done while preserving data privacy. |
Talk slides: PPTX PDF Download Android Demo Download Framework |
Fast Secure Computation Using Garbled
Circuits Framework and library for buiding efficient and scalable privacy-preserving applications using garbled circuits. [Download]
NetList: Efficient Circuit Structures Garbled Circuits Intermediate Language |
|
Secure Computation on Smartphones Using our fast garbled circuits framework to enable privacy-preserving applications on Android devices. [Demo] (Yan Huang, Peter Chapman, David Evans) |
|
Efficient Privacy-Preserving Biometric
Identification Using garbled circuits and homomorphic encryption to perform private biometric identification. (Yan Huang, Lior Malka, David Evans, Jonathan Katz) |
|
Private Editing in the Cloud A Firefox extension for using Google Docs without exposing your document's contents. (Yan Huang, David Evans) |
Yan Huang, Jonathan Katz, and David Evans. Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose. In 33rd International Cryptology Conference (CRYPTO 2013), Santa Barbara, CA, 18-22 August 2013. [PDF, 16 pages]
Samee Zahur and David Evans. Circuit Structures for Improving Efficiency of Security and Privacy Tools. In 34th IEEE Symposium on Security and Privacy ("Oakland" 2013), San Francisco, CA. May 19-22, 2013. [PDF, 15 pages]
Yan Huang, Jonathan Katz, and David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. In 33rd IEEE Symposium on Security and Privacy ("Oakland" 2012), San Francisco, CA. 20-23 May 2012. [PDF, 13 pages]
Yan Huang, David Evans, and Jonathan Katz. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?. In 19th Network and Distributed Security Symposium (NDSS 2012), San Diego, CA. 5-8 February 2012. [PDF, 15 pages]
Yan Huang, Chih-hao Shen, David Evans, Jonathan Katz, and abhi shelat. Efficient Secure Computation with Garbled Circuits. Invited paper for Seventh International Conference on Information Systems Security (ICISS 2011). 15-19 December 2011, Jadavpur University, Kolkata, India. [PDF, 21 pages]
Yikan Chen and David Evans. Auditing Information Leakage for Distance Metrics. In Third IEEE Conference on Privacy, Security, Risk and Trust, Boston, MA, 9-11 October 2011. [PDF, 10 pages]
Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster Secure Two-Party Computation Using Garbled Circuits, 20th USENIX Security Symposium, San Francisco, CA. 8-12 August 2011. [PDF, 16 pages]
Yan Huang, Peter Chapman, and David Evans. Privacy-Preserving Applications on Smartphones. 6th USENIX Workshop on Hot Topics in Security (HotSec 2011), San Francisco. 9 August 2011. Paper: [PDF, 6 pages]. Talk slides: [PDF] (Peter Chapman).
Yan Huang and David Evans. Private Editing Using Untrusted Cloud Services. Second International Workshop on Security and Privacy in Cloud Computing. Minneapolis, Minnesota. 24 June 2011. [PDF, 10 pages]
Yan Huang, Peter Chapman, and David Evans. Secure Computation on Mobile Devices. Poster at IEEE Symposium on Security and Privacy. Berkeley, CA. 22-25 May 2011. [Proposal: PDF, 2 pages] [Poster: PDF, 2MB]
Yan Huang, Lior Malka, David Evans, and Jonathan Katz. Efficient Privacy-Preserving Biometric Identification, in 18th Network and Distributed System Security Symposium (NDSS 2011). San Diego, CA. 6-9 February 2011. [PDF, 14 pages]
This work is supported by a a MURI award from the Air Force Office of Scientific Research (Defending Against Hostile Operating Systems, FA9550-09-1-0539), a grant from the National Science Foundation (TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications), and a Google Research Award.
Might Be Evil: Privacy-Preserving Computing University of Maryland / University of Virginia |
evans@cs.virginia.edu Background image: flickr cc: didbygraham |