E4 - Compiler for Privacy-Preserving Protocols

E4 – Compiler for Privacy-Preserving Protocols

Download

The use of IT applications often requires users to reveal privacy-sensitive data. Privacy-preserving protocols allow overcoming this privacy dilemma. However, the efficient implementation and deployment of privacy preserving protocols, especially on new computing architectures, remains a tedious challenge. The goal of project E4 is to develop a compiler for the automatic generation of optimized privacy-preserving protocols. Thereby, the compiler will enable non-expert developers to efficiently use privacy-preserving protocols that are custom-tailored for their specific deployment scenario.

Researchers

Niklas Büscher
Security Engineering Group

Research Interests:

  • Privacy preserving protocols
  • Secure multi-party computation (TPC / MPC)
  • Compiler for more efficient and practical MPC
  • Multi-/many- core parallelization

Daniel Demmler
Engineering Cryptographic Protocols

Research Interests:

  • Design, implementation and evaluation of secure computation and private information retrieval protocols.
  • Privacy-preserving applications and their practical realization.

Ágnes Kiss
Engineering Cryptographic Protocols

Research Interests:

  • Secure multi-party computation.
  • Graph theory.
  • Countermeasures against fault attacks and side-channel analysis.

Oleksandr Tkachenko
Engineering Cryptographic Protocols

Research Interests:

  • Privacy-preserving protocols.
  • Compilers for secure computation.
  • Secure outsourcing.

Amos Treiber
Engineering Cryptographic Protocols

Research Interests:

  • Privacy mechanisms for applications.
  • Secure outsourced data storage.

Christian Weinert
Engineering Cryptographic Protocols

Research Interests:

  • Design, implementation, and evaluation of privacy-preserving protocols at large scale.
  • Integrity protection for long-term storage.

Publications

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas :
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
[Article] , (2019)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[Conference or workshop item] , (2018)

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18) ACM
[Conference or workshop item] , (2018)

Schneider, Thomas ; Tkachenko, Oleksandr :
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[Conference or workshop item] , (2018)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or workshop item] , (2018)

Günther, Daniel :
Private Function Evaluation with Universal Circuits.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or workshop item] , (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018 International Speech Communication Association (ISCA)
[Conference or workshop item] , (2018)

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng :
Faster Privacy-Preserving Location Proximity Schemes.
17. International Conference on Cryptology And Network Security (CANS'18) Springer
[Conference or workshop item] , (2018)

Tkachenko, Oleksandr :
Privacy-Preserving Genomics on a Large Scale.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or workshop item] , (2018)

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas :
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Anderes] , (2018)

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[Conference or workshop item] , (2018)

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni :
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs) S. 159-178.
[Article] , (2018)

Senker, Matthias :
PSI Meets Signal: Integrating a Malicious-Secure Private Contact Discovery Solution in an Open-Source Instant Messaging Service.
TU Darmstadt
[Masterarbeit] , (2018)

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas :
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18) IEEE
[Conference or workshop item] , (2018)

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[Conference or workshop item] , (2018)

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[Conference or workshop item] , (2018)

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi :
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018 Springer
[Conference or workshop item] , (2018)

Tariq, Taha :
Web application for privacy-preserving assignments.
TU Darmstadt
[Masterarbeit] , (2018)

Alhassan, Masaud Y. :
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt
[Masterarbeit] , (2018)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Article] , (2018)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Conference or workshop item] , (2017)

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017 Springer
[Conference or workshop item] , (2017)

Schick, Oliver :
Web application for privacy-preserving scheduling.
TU Darmstadt
[Bachelorarbeit] , (2017)

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17) Springer
[Conference or workshop item] , (2017)

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681]
Automated Software Engineering (ASE'17) ACM , Piscataway, NJ, USA
[Conference or workshop item] , (2017)

Tkachenko, Oleksandr :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt
[Masterarbeit] , (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) S. 143-163.
[Article] , (2017)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3) S. 805-858.
[Article] , (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) S. 177-197.
[Article] , (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Bachelorarbeit] , (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Conference or workshop item] , (2017)

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto :
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Conference or workshop item] , (2017)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (1) S. 62-78.
[Article] , (2017)

Schroth, Nils :
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt
[Bachelorarbeit] , (2016)

Bieber, Julian :
Generalizing Semi-Private Function Evaluation.
TU Darmstadt
[Bachelorarbeit] , (2016)

Holz, Marco :
Protecting Metadata with PIR and Tor.
TU Darmstadt
[Bachelorarbeit] , (2016)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers.
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16) ACM
[Conference or workshop item] , (2016)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16) ACM
[Conference or workshop item] , (2016)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016 Springer
[Conference or workshop item] , (2016)

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke :
On the Optimality of Differential Fault Analyses on CLEFIA.
6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15) Springer
[Conference or workshop item] , (2015)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15) ACM
[Conference or workshop item] , (2015)

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria :
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15) Springer
[Conference or workshop item] , (2015)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15) USENIX
[Conference or workshop item] , (2015)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15) IEEE
[Conference or workshop item] , (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or workshop item] , (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or workshop item] , (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[Conference or workshop item] , (2015)

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14) ACM
[Conference or workshop item] , (2014)

go to TU-biblio search on ULB website