[crypto] [secdm at tue.nl: Lecture on "Secure Computation on Encrypted Data" by Marten van Dijk (Univ. of Connecticut), Oct.30, 14-15]

R. Hirschfeld ray at unipay.nl
Mon Oct 7 09:56:20 CEST 2013


------- Start of forwarded message -------
From: Secretariaat DM <secdm at tue.nl>
Subject: Lecture on "Secure Computation on Encrypted Data"  by Marten van
 Dijk (Univ. of Connecticut),  Oct.30, 14-15
Date: Mon, 7 Oct 2013 07:30:36 +0000

Dear all,

On Wednesday, October 30, Marten van Dijk (Univ of Connecticut) will give a presentation
on "Secure Computation on Encrypted Data".

Location  Auditorium  High Tech Campus 34, Eindhoven
Time     14-15

Please be advised that you can go to the auditorium directly, WITHOUT reporting yourself at the reception desk.


Title+Abstract: Secure Computation on Encrypted Data

One of the key issues in cloud computing is how to keep private data private. From financial information to medical records, sensitive data is stored and computed upon in the cloud. Computation requires the data to be exposed to the cloud servers, which may be attacked by malicious applications, hypervisors, operating systems, or by insiders. Encrypted computation has the potential to solve this data privacy problem: e.g., Fully Homomorphic Encryption (FHE) has been coined the Holy Grail of cryptography since it allows an untrusted server to perform computation directly on an encrypted ciphertext without having access to the decryption key. As opposed to current secure hardware solutions (e.g., Intel+TXT, XOM or Aegis), FHE does not require the user to trust any component on the server side -- even the application program can be untrusted.

Motivated by large FHE overheads and FHE's limitations, we solve the problem of placing trust in programs by designing a tamper-resistant single-chip processor called Ascend (Architecture for Secure Computation on ENcrypted Data) that can run untrusted batch programs without leaking information about private input data over its external input/output pins.  Ascend uses Path ORAM, an extremely simple, efficient and novel Oblivious RAM protocol for obfuscating memory access patterns. Surprisingly, Ascend incurs only about 5x performance overhead relative to insecure computation, which is orders of magnitude better than what FHE can achieve.

If time permits, we will discuss further ongoing research, in particular, explain how Ascend can be extended to support applications that fit into a streaming model. Simulation results show that with smart scheduling algorithms, the performance overhead of Stream-Ascend relative to an insecure and idealized baseline processor is only 24.5%, 0.7%, and 3.9% for a set of streaming benchmarks in a large dataset processing application.

Based on joint work with S. Devadas, C.W. Fletcher, O. Khan, L. Ren, E. Shi, E. Stefanov, X. Yu.



Dr.ir. L.M.G.M. Tolhuizen
Senior Scientist

Philips Group Innovation, Research
High Tech Campus 34, Rm 1.067,  5656 AE Eindhoven
The Netherlands
Phone +31 40 27 49760, email: ludo.tolhuizen at philips.com<mailto:ludo.tolhuizen at philips.com>
Fax + 31 40 27 46276
www.research.philips.com<http://www.research.philips.com>


________________________________
The information contained in this message may be confidential and legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this message is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original message.
------- End of forwarded message -------


More information about the crypto mailing list