Project Areas

S – Solutions

S5 – Privacy-Preserving Computation (ended after CROSSING I)

Due to current trends in modern computing paradigms, the amount of sensitive data processed is continuously increasing. In order to protect against large-scale data leaks, this information should be protected in case it is processed on untrusted machines. Recently proposed cryptographic tools like Secure Two-Party Computation (STC) offer a solution: they allow data to be processed while staying encrypted. Project S5 will advance the state of the art of STC in two ways. First, it designs efficient quantum-secure protocols for different application settings; second, it develops efficient SMC solutions in the context of ''Big Data'' applications.

Plugin required: in order to see this object, your browser has to support files of type text/html. Download

Principal Investigators

  Name Working area(s) Contact
Prof. Stefan Katzenbeisser
Security Engineering
P3, S6, E4
+ 49 851 509-3040
Prof. Thomas Schneider
Cryptography and Privacy Engineering
E4
+49 6151 16-27300
S2|20 208

Publications

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, pp. 66-70, DOI: 10.1145/3267323.3268963,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3267323.3268963],
[Conference or Workshop Item]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference or Workshop Item]

Geihs, Matthias and Karvelas, Nikolaos and Katzenbeisser, Stefan and Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: ACM, In: SCC Workshop @ AsiaCCS 2018, Songdo, Incheon, Korea, In: The Sixth International Workshop on Security in Cloud Computing (SCC), [Conference or Workshop Item]

Demmler, Daniel and Rindal, Peter and Rosulek, Mike and Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 159-178, DOI: 10.1515/popets-2018-0037,
[Article]

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Master Thesis]

Scheidel, Lukas (2018):
Distributed Path ORAM.
TU Darmstadt, [Bachelor Thesis]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), ACM, pp. 120-133, DOI: 10.1145/3143361.3143362,
[Online-Edition: https://encrypto.de/papers/CDCSS17.pdf],
[Conference or Workshop Item]

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, Springer, Oslo, Norway, [Conference or Workshop Item]

Karvelas, Nikolaos and Senftleben, Marius and Katzenbeisser, Stefan (2017):
Microblogging in a Privacy-Preserving way.
In: ARES 2017 - 12th International Conference on Availability, Reliability and Security, ACM, Reggio Calabria, Italy, [Conference or Workshop Item]

Büscher, Niklas and Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Book]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3), De Gruyter Open, pp. 143-163, DOI: 10.1515/popets-2017-0033,
[Online-Edition: https://encrypto.de/papers/ADSSSSZ17.pdf],
[Article]

Demmler, Daniel and Holz, Marco and Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), Springer, pp. 599-619, DOI: 10.1007/978-3-319-61204-1_30,
[Online-Edition: https://encrypto.de/papers/DHS17.pdf],
[Conference or Workshop Item]

Boukoros, Spyros and Karvelas, Nikolaos and Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference, IEEE, Valencia Spain, [Conference or Workshop Item]

Gagliardoni, Tommaso and Karvelas, Nikolaos and Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography, Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Weinert, Christian and Demirel, Denise and Vigil, Martín and Geihs, Matthias and Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), ACM, pp. 436-448, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference or Workshop Item]

Buescher, Niklas and Kretzmer, David and Jindal, Arnav and Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security, IEEE, [Conference or Workshop Item]

Buescher, Niklas and Holzer, Andreas and Weber, Alina and Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Buchmann, Johannes and Büscher, Niklas and Katzenbeisser, Stefan and Krämer, Juliane and Micciancio, Daniele and Siim, Sander and van Vredendaal, Christine and Walter, Michael and Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography, ACM, Xi'an, China, [Conference or Workshop Item]

Rauzy, Pablo and Kiss, Ágnes and Krämer, Juliane and Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), Springer, pp. 111-129, DOI: 10.1007/978-3-319-43283-0_7,
[Conference or Workshop Item]

Buescher, Niklas and Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15), USENIX Association, Washington, D.C., USA, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13, [Article]

Araujo, Frederico and Hamlen, Kevin and Biedermann, Sebastian and Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM, In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, Scottsdale, AZ, USA, pp. 942-953, [Conference or Workshop Item]

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan and Tews, Erik and Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM, In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, Scottsdale, AZ, USA, pp. 25-35, DOI: 10.1145/2665943.2665962,
[Conference or Workshop Item]

CROSSING DFG Logo kurz