S5 - Privacy-Preserving Computation

S5 – Privacy-Preserving Computation (ended after CROSSING I)

Download

Due to current trends in modern computing paradigms, the amount of sensitive data processed is continuously increasing. In order to protect against large-scale data leaks, this information should be protected in case it is processed on untrusted machines. Recently proposed cryptographic tools like Secure Two-Party Computation (STC) offer a solution: they allow data to be processed while staying encrypted. Project S5 will advance the state of the art of STC in two ways. First, it designs efficient quantum-secure protocols for different application settings; second, it develops efficient SMC solutions in the context of ''Big Data'' applications.

Publications

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[Conference or workshop item] , (2018)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or workshop item] , (2018)

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[Conference or workshop item] , (2018)

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes :
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: The Sixth International Workshop on Security in Cloud Computing (SCC). In: ACM . Songdo, Incheon, Korea
[Conference or workshop item] , (2018)

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni :
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs) S. 159-178.
[Article] , (2018)

Treiber, Amos :
Access Count Leakage in Oblivious RAMs.
TU Darmstadt
[Masterarbeit] , (2018)

Scheidel, Lukas :
Distributed Path ORAM.
TU Darmstadt
[Bachelorarbeit] , (2018)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Conference or workshop item] , (2017)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Using Oblivious RAM in Genomic Studies.
DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops Springer
[Conference or workshop item] , (2017)

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan :
Microblogging in a Privacy-Preserving way.
ARES 2017 - 12th International Conference on Availability, Reliability and Security ACM
[Conference or workshop item] , (2017)

Büscher, Niklas ; Katzenbeisser, Stefan:
Compilation for Secure Multi-party Computation.
[Online-Edition: https://www.springer.com/de/book/9783319675213]
Springer Briefs in Computer Science ISBN 978-3-319-67521-3
[Book] , (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) S. 143-163.
[Article] , (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17) Springer
[Conference or workshop item] , (2017)

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan :
A lightweight protocol for privacy preserving division.
IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference IEEE
[Conference or workshop item] , (2017)

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. :
ORAMs in a Quantum World.
PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography Springer
[Conference or workshop item] , (2017)

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes :
MoPS: A Modular Protection Scheme for Long-Term Storage.
12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17) ACM
[Conference or workshop item] , (2017)

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan :
Scalable Secure Computation from ANSI-C.
WIFS - IEEE International Workshop on Information Forensics and Security IEEE
[Conference or workshop item] , (2016)

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan :
Compiling Low Depth Circuits for Practical Secure Computation.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Conference or workshop item] , (2016)

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian :
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography ACM
[Conference or workshop item] , (2016)

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre :
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16) Springer
[Conference or workshop item] , (2016)

Buescher, Niklas ; Katzenbeisser, Stefan :
Faster Secure Computation through Automatic Parallelization.
24th USENIX Security Symposium (USENIX Security'15) USENIX Association
[Conference or workshop item] , (2015)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015 S. 5-13.
[Article] , (2015)

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan :
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM .
[Conference or workshop item] , (2014)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay :
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM .
[Conference or workshop item] , (2014)

go to TU-biblio search on ULB website