- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Complexity and Algorithms in Graphs
- Adversarial Robustness in Machine Learning
- Advanced Data Storage Technologies
- Parallel Computing and Optimization Techniques
- Cryptographic Implementations and Security
- Blockchain Technology Applications and Security
- Security and Verification in Computing
- Embedded Systems Design Techniques
- Quantum Computing Algorithms and Architecture
- Access Control and Trust
- Chaos-based Image/Signal Encryption
- Quantum Information and Cryptography
- User Authentication and Security Systems
- graph theory and CDMA systems
- Geometric and Algebraic Topology
- Ethics and Social Impacts of AI
- Advanced Data Processing Techniques
- Advanced Authentication Protocols Security
- Explainable Artificial Intelligence (XAI)
- Spam and Phishing Detection
- Privacy, Security, and Data Protection
- Coding theory and cryptography
Zone Atelier Moselle
2023-2024
Universität Hamburg
2020-2023
Technical University of Darmstadt
2014-2018
University of California, Berkeley
2017
Jerusalem University College
2017
Cornell University
2017
Secure computation enables mutually distrusting parties to jointly evaluate a function on their private inputs without revealing anything but the function's output.Generic secure protocols in semi-honest model have been studied extensively and several best practices evolved.In this work, we design implement mixed-protocol framework, called ABY, that efficiently combines schemes based Arithmetic sharing, Boolean Yao's garbled circuits makes available practice solutions two-party...
Previous research suggests that developers often struggle using low-level cryptographic APIs and, as a result, produce insecure code. When asked, desire, among other things, more tool support to help them use such APIs. In this paper, we present CogniCrypt, supports with the of CogniCrypt assists developer in two ways. First, for number common tasks, generates code implements respective task secure manner. Currently, tasks data encryption, communication over channels, and long-term...
In the recent years, secure computation has been subject of intensive research, emerging from theory to practice. order make usable by non-experts, Fairplay (USENIX Security 2004) initiated a line research in compilers that allow automatically generate circuits high-level descriptions functionality is be computed securely. Most recently, TinyGarble (IEEE S&P 2015) demonstrated it natural use existing hardware synthesis tools for this task. work, we present how industrial-grade are not only...
We present MOTION, an efficient and generic open-source framework for mixed-protocol secure multi-party computation (MPC) . MOTION is built in a user-friendly, modular, extensible way, intended to be used as tool MPC research increase adoption of protocols practice. Our incorporates several important engineering decisions such full communication serialization, which enables over arbitrary messaging interfaces removes the need owning network sockets. also performance optimizations that...
While secure multi-party computation (MPC) is a vibrant research topic and multitude of practical MPC applications have been presented recently, their development still tedious task that requires expert knowledge. Previous works made first steps in compiling high-level descriptions from various source into protocols, but only looked at limited set protocols. In this work we present HyCC, tool-chain for automated compilation ANSI C programs hybrid protocols efficiently securely combine...
Privacy-preserving machine learning (PPML) has many applications, from medical image classification and anomaly detection to financial analysis. nGraph-HE enables data scientists perform private inference of deep (DL) models trained using popular frameworks such as TensorFlow. computes linear layers the CKKS homomorphic encryption (HE) scheme. The non-polynomial activation functions, MaxPool ReLU, are evaluated in clear by owner who obtains intermediate feature maps. This leaks maps which it...
Private Information Retrieval (PIR) allows to privately request a block of data from database such that no information about the queried is revealed owner. With rapid rise cloud computing, often shared across multiple servers, making multi-server PIR promising privacy-enhancing technology.
Abstract The Border Gateway Protocol (BGP) computes routes between the organizational networks that make up today’s Internet. Unfortunately, BGP suffers from deficiencies, including slow convergence, security problems, a lack of innovation, and leakage sensitive information about domains’ routing preferences. To overcome some these we revisit idea centralizing using secure multi-party computation (MPC) for interdomain which was proposed by Gupta et al. (ACM HotNets’12). We implement two...
Abstract An important initialization step in many social-networking applications is contact discovery, which allows a user of the service to identify its existing social contacts also use service. Naïve approaches discovery reveal user’s entire set social/professional service, presenting significant tension between functionality and privacy. In this work, we present system for private client learns only intersection own list server’s database, server (approximate) size client’s list. The...
We present an extended abstract of MP2ML, a machine learning framework which integrates Intel nGraph-HE, homomorphic encryption (HE) framework, and the secure two-party computation ABY, to enable data scientists perform private inference deep (DL) models trained using popular frameworks such as TensorFlow at push button. benchmark MP2ML on CryptoNets network with ReLU activations, it achieves throughput 33.3 images/s accuracy 98.6%. This matches previous state-of-the-art frameworks.
Internet eXchange Points (IXPs) play an ever-growing role in inter-connection. To facilitate the exchange of routes amongst their members, IXPs provide Route Server (RS) services to dispatch according each member's peering policies. Nowadays, make use RSes, these policies must be disclosed IXP. This poses fundamental questions regarding privacy guarantees route-computation on confidential business information. Indeed, as evidenced by interaction with IXP administrators and a survey network...
We outline a secure and efficient methodology to do threshold distributed decryption for LWE based Fully Homomorphic Encryption schemes. Due the smaller parameters used in some FHE schemes, such as Torus-FHE (TFHE), standard technique of "noise flooding'' seems not apply. show that noise flooding can also be with schemes small parameters, by utilizing switch scheme slightly higher then bootstrapping operations which TFHE offers. Our protocol is proved via simulation argument, making its...
The growing relevance of Internet eXchange Points (IXPs), where an increasing number networks exchange routing information, poses fundamental questions regarding the privacy guarantees confidential business information. To facilitate routes among their members, IXPs provide Route Server (RS) services to dispatch according each member's export policies. Nowadays, make use RSes, these policies must be disclosed IXP. This state affairs raises concerns network administrators and even deters some...
In this work, we provide an industry research view for approaching the design, deployment, and operation of trustworthy Artificial Intelligence (AI) inference systems. Such systems customers with timely, informed, customized inferences to aid their decision, while at same time utilizing appropriate security protection mechanisms AI models. Additionally, such should also use Privacy-Enhancing Technologies (PETs) protect customers' data any time. To approach subject, start by introducing...
Thinking about the protection of biometric data, future attacks using a quantum computer call for adequate resistance verification systems. Such systems are often deployed on long-term basis and deserve strong due to sensitive nature persistence property data they contain. To achieve efficient template protection, we combine post-quantum secure two-party computation with secret sharing apply first practically implemented protocol purpose protection. The proposed system ensures permanent as...
Abstract Protecting users’ privacy in digital systems becomes more complex and challenging over time, as the amount of stored exchanged data grows steadily become increasingly involved connected. Two techniques that try to approach this issue are privacy-preserving protocols secure multi-party computation (MPC) private information retrieval (PIR), which aim enable practical while simultaneously keeping sensitive private. In dissertation [Daniel Demmler. “Towards Practical Privacy-Preserving...