Overcoming Barriers and Efficiency Limitations in Secure Computation
Over the past few decades, our use of networks such as the Internet underwent a complete transformation: the data that we send over the network is now routinely used in computations by third parties. This creates a considerable th...
Over the past few decades, our use of networks such as the Internet underwent a complete transformation: the data that we send over the network is now routinely used in computations by third parties. This creates a considerable threat to our privacy, as we witness countless data breaches and companies selling our private data.
The aim of secure computation is to solve this problem. It studies the design of methods for computing on sensitive data without compromising confidentiality. Secure computation has been firmly established as one of the most promising approaches to reconcile the use of data-driven algorithms with the necessity of protecting our privacy. It has spurred a considerable research effort in the past decade, which has witnessed the emergence of new models, such as the models of secure computation with silent preprocessing (introduced by the PI), and of non-interactive secure computation.
While these silent and non-interactive features are fundamental for the deployment of secure computation over large networks, current protocols suffer from important downsides which make them entirely impractical in real-world scenarios:
- They scale poorly with the number of participants and cannot be used over mid- to large-size networks.
- They either require many rounds of interaction (hence are impractical over high-latency networks) or trade non-interactivity for huge computational costs.
- They induce a large communication overhead compared to executing the computation on the clear data.
- They are often based on exotic cryptographic assumptions, whose security is not yet well-understood.
The aim of the project OBELiSC is to explore the current limits of silent and non-interactive protocols, and to introduce new methods for overcoming the remaining barriers. The long-term vision of the project is to enable the deployment of a large-scale network that further protects our sensitive data whenever it is used in distributed computation.ver más
02-11-2024:
Generación Fotovolt...
Se ha cerrado la línea de ayuda pública: Subvenciones destinadas al fomento de la generación fotovoltaica en espacios antropizados en Canarias, 2024
01-11-2024:
ENESA
En las últimas 48 horas el Organismo ENESA ha otorgado 6 concesiones
01-11-2024:
FEGA
En las últimas 48 horas el Organismo FEGA ha otorgado 1667 concesiones
Seleccionando "Aceptar todas las cookies" acepta el uso de cookies para ayudarnos a brindarle una mejor experiencia de usuario y para analizar el uso del sitio web. Al hacer clic en "Ajustar tus preferencias" puede elegir qué cookies permitir. Solo las cookies esenciales son necesarias para el correcto funcionamiento de nuestro sitio web y no se pueden rechazar.
Cookie settings
Nuestro sitio web almacena cuatro tipos de cookies. En cualquier momento puede elegir qué cookies acepta y cuáles rechaza. Puede obtener más información sobre qué son las cookies y qué tipos de cookies almacenamos en nuestra Política de cookies.
Son necesarias por razones técnicas. Sin ellas, este sitio web podría no funcionar correctamente.
Son necesarias para una funcionalidad específica en el sitio web. Sin ellos, algunas características pueden estar deshabilitadas.
Nos permite analizar el uso del sitio web y mejorar la experiencia del visitante.
Nos permite personalizar su experiencia y enviarle contenido y ofertas relevantes, en este sitio web y en otros sitios web.