MPI-INF Logo
Campus Event Calendar

Event Entry

New for: D2, D3

What and Who

Engineering Privacy-Preserving Cryptographic Protocols

Thomas Schneider
TU Darmstadt
Talk
AG 1, AG 3, AG 5, SWS, AG 2, AG 4, RG1, MMCI  
AG Audience
English

Date, Time and Location

Tuesday, 7 June 2011
09:00
45 Minutes
E1 4
019
Saarbrücken

Abstract

As today`s world gets more and more connected, actors with different and potentially conflicting interests want to interact in many application scenarios. Examples are citizens and governments (electronic passport and id), patients and health insurances (electronic health card, e-health services), or companies (cloud computing). In this context, it is of foremost importance that the underlying IT systems and algorithms can fulfill the diverse security and privacy requirements of the involved parties. In particular, if sensitive (e.g., medical) data is processed by not fully trusted service providers (e.g., Òin the cloudÓ), conformity with data privacy protection laws must be guaranteed.


Privacy-preserving cryptographic protocols allow to process such sensitive data in a provably secure way. Until today, the design and implementation of privacy-preserving protocols, efficient enough to be used in practical applications, is a challenging and error-prone task even for experts in the field. To make such protocols widely accessible to non-expert users, tools are needed that automatically generate efficient and secure privacy-preserving cryptographic protocols from high-level specifications.

In this talk we present the approach of engineering efficient privacy-preserving protocols. We summarize today's most efficient techniques for secure two-party computation with their respective advantages and disadvantages. We present a framework to modularly combine these basic primitives into efficient protocols. Our corresponding "Tool for Automating Secure Two-partY computations" (TASTY) allows to generate code from a high-level description of such protocols. This tool can be used to automatically generate efficient protocols for privacy-preserving face recognition and ElectroCardioGram classification. Depending on the deployment scenario, the efficiency of such protocols can be further improved, e.g., using tamper-proof hardware such as smartcards.

Finally, we outline our current and future work in the direction of engineering efficient privacy-preserving protocols. As deployment scenarios we target a wide range from resource-constrained mobile devices to large-scale cloud computing. The ultimate goal is to develop languages that allow to program privacy-preserving applications and are as easy to use as today's standard programming languages. The associated tools should automatically generate efficient privacy-preserving protocols that are optimized according to the constraints of the specific deployment scenario. We expect that such languages and tools will have a substantial impact on how data can be efficiently processed in a privacy-preserving way in conformity with data privacy protection laws.

Contact

gk-sek
--email hidden

Video Broadcast

Yes
Kaiserslautern
passcode not visible
logged in users only

gk-sek, 06/03/2011 11:15 -- Created document.