Daniel Demmler

ORCID: 0000-0001-6334-6277
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Complexity and Algorithms in Graphs
  • Adversarial Robustness in Machine Learning
  • Advanced Data Storage Technologies
  • Parallel Computing and Optimization Techniques
  • Cryptographic Implementations and Security
  • Blockchain Technology Applications and Security
  • Security and Verification in Computing
  • Embedded Systems Design Techniques
  • Quantum Computing Algorithms and Architecture
  • Access Control and Trust
  • Chaos-based Image/Signal Encryption
  • Quantum Information and Cryptography
  • User Authentication and Security Systems
  • graph theory and CDMA systems
  • Geometric and Algebraic Topology
  • Ethics and Social Impacts of AI
  • Advanced Data Processing Techniques
  • Advanced Authentication Protocols Security
  • Explainable Artificial Intelligence (XAI)
  • Spam and Phishing Detection
  • Privacy, Security, and Data Protection
  • Coding theory and cryptography

Zone Atelier Moselle
2023-2024

Universität Hamburg
2020-2023

Technical University of Darmstadt
2014-2018

University of California, Berkeley
2017

Jerusalem University College
2017

Cornell University
2017

Secure computation enables mutually distrusting parties to jointly evaluate a function on their private inputs without revealing anything but the function's output.Generic secure protocols in semi-honest model have been studied extensively and several best practices evolved.In this work, we design implement mixed-protocol framework, called ABY, that efficiently combines schemes based Arithmetic sharing, Boolean Yao's garbled circuits makes available practice solutions two-party...

10.14722/ndss.2015.23113 article EN 2015-01-01

Previous research suggests that developers often struggle using low-level cryptographic APIs and, as a result, produce insecure code. When asked, desire, among other things, more tool support to help them use such APIs. In this paper, we present CogniCrypt, supports with the of CogniCrypt assists developer in two ways. First, for number common tasks, generates code implements respective task secure manner. Currently, tasks data encryption, communication over channels, and long-term...

10.1109/ase.2017.8115707 article EN 2017-10-01

In the recent years, secure computation has been subject of intensive research, emerging from theory to practice. order make usable by non-experts, Fairplay (USENIX Security 2004) initiated a line research in compilers that allow automatically generate circuits high-level descriptions functionality is be computed securely. Most recently, TinyGarble (IEEE S&P 2015) demonstrated it natural use existing hardware synthesis tools for this task. work, we present how industrial-grade are not only...

10.1145/2810103.2813678 article EN 2015-10-06

We present MOTION, an efficient and generic open-source framework for mixed-protocol secure multi-party computation (MPC) . MOTION is built in a user-friendly, modular, extensible way, intended to be used as tool MPC research increase adoption of protocols practice. Our incorporates several important engineering decisions such full communication serialization, which enables over arbitrary messaging interfaces removes the need owning network sockets. also performance optimizations that...

10.1145/3490390 article EN ACM Transactions on Privacy and Security 2022-03-04

While secure multi-party computation (MPC) is a vibrant research topic and multitude of practical MPC applications have been presented recently, their development still tedious task that requires expert knowledge. Previous works made first steps in compiling high-level descriptions from various source into protocols, but only looked at limited set protocols. In this work we present HyCC, tool-chain for automated compilation ANSI C programs hybrid protocols efficiently securely combine...

10.1145/3243734.3243786 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

Privacy-preserving machine learning (PPML) has many applications, from medical image classification and anomaly detection to financial analysis. nGraph-HE enables data scientists perform private inference of deep (DL) models trained using popular frameworks such as TensorFlow. computes linear layers the CKKS homomorphic encryption (HE) scheme. The non-polynomial activation functions, MaxPool ReLU, are evaluated in clear by owner who obtains intermediate feature maps. This leaks maps which it...

10.1145/3407023.3407045 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2020-08-25

Private Information Retrieval (PIR) allows to privately request a block of data from database such that no information about the queried is revealed owner. With rapid rise cloud computing, often shared across multiple servers, making multi-server PIR promising privacy-enhancing technology.

10.1145/2664168.2664181 article EN 2014-11-07

Abstract The Border Gateway Protocol (BGP) computes routes between the organizational networks that make up today’s Internet. Unfortunately, BGP suffers from deficiencies, including slow convergence, security problems, a lack of innovation, and leakage sensitive information about domains’ routing preferences. To overcome some these we revisit idea centralizing using secure multi-party computation (MPC) for interdomain which was proposed by Gupta et al. (ACM HotNets’12). We implement two...

10.1515/popets-2017-0033 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2017-07-01

Abstract An important initialization step in many social-networking applications is contact discovery, which allows a user of the service to identify its existing social contacts also use service. Naïve approaches discovery reveal user’s entire set social/professional service, presenting significant tension between functionality and privacy. In this work, we present system for private client learns only intersection own list server’s database, server (approximate) size client’s list. The...

10.1515/popets-2018-0037 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2018-08-29

We present an extended abstract of MP2ML, a machine learning framework which integrates Intel nGraph-HE, homomorphic encryption (HE) framework, and the secure two-party computation ABY, to enable data scientists perform private inference deep (DL) models trained using popular frameworks such as TensorFlow at push button. benchmark MP2ML on CryptoNets network with ReLU activations, it achieves throughput 33.3 images/s accuracy 98.6%. This matches previous state-of-the-art frameworks.

10.1145/3411501.3419425 article EN 2020-11-04

Internet eXchange Points (IXPs) play an ever-growing role in inter-connection. To facilitate the exchange of routes amongst their members, IXPs provide Route Server (RS) services to dispatch according each member's peering policies. Nowadays, make use RSes, these policies must be disclosed IXP. This poses fundamental questions regarding privacy guarantees route-computation on confidential business information. Indeed, as evidenced by interaction with IXP administrators and a survey network...

10.1145/3143361.3143362 article EN 2017-11-22

We outline a secure and efficient methodology to do threshold distributed decryption for LWE based Fully Homomorphic Encryption schemes. Due the smaller parameters used in some FHE schemes, such as Torus-FHE (TFHE), standard technique of "noise flooding'' seems not apply. show that noise flooding can also be with schemes small parameters, by utilizing switch scheme slightly higher then bootstrapping operations which TFHE offers. Our protocol is proved via simulation argument, making its...

10.1145/3605759.3625259 article EN cc-by 2023-11-23

The growing relevance of Internet eXchange Points (IXPs), where an increasing number networks exchange routing information, poses fundamental questions regarding the privacy guarantees confidential business information. To facilitate routes among their members, IXPs provide Route Server (RS) services to dispatch according each member's export policies. Nowadays, make use RSes, these policies must be disclosed IXP. This state affairs raises concerns network administrators and even deters some...

10.1145/2959424.2959427 article EN 2016-07-12

In this work, we provide an industry research view for approaching the design, deployment, and operation of trustworthy Artificial Intelligence (AI) inference systems. Such systems customers with timely, informed, customized inferences to aid their decision, while at same time utilizing appropriate security protection mechanisms AI models. Additionally, such should also use Privacy-Enhancing Technologies (PETs) protect customers' data any time. To approach subject, start by introducing...

10.48550/arxiv.2008.04449 preprint EN other-oa arXiv (Cornell University) 2020-01-01

10.1145/3664476.3670873 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2024-07-25

Thinking about the protection of biometric data, future attacks using a quantum computer call for adequate resistance verification systems. Such systems are often deployed on long-term basis and deserve strong due to sensitive nature persistence property data they contain. To achieve efficient template protection, we combine post-quantum secure two-party computation with secret sharing apply first practically implemented protocol purpose protection. The proposed system ensures permanent as...

10.1109/wifs49906.2020.9360881 article EN 2020-12-06

Abstract Protecting users’ privacy in digital systems becomes more complex and challenging over time, as the amount of stored exchanged data grows steadily become increasingly involved connected. Two techniques that try to approach this issue are privacy-preserving protocols secure multi-party computation (MPC) private information retrieval (PIR), which aim enable practical while simultaneously keeping sensitive private. In dissertation [Daniel Demmler. “Towards Practical Privacy-Preserving...

10.1515/itit-2022-0005 article EN it - Information Technology 2022-04-01
Coming Soon ...