Secure multiparty computation protocols allow multiple distrustful parties to jointly compute a function of their private data while both ensuring correctness of the results and maintaining maximum privacy. Recent progress in concretely efficient implementations has shown that these once theoretical tools are becoming mature enough to secure a variety of applications from cryptocurrencies and auctions to machine learning and medical diagnosis. However, there is still a gap between the requirements of many real world scenarios and the guarantees and performance offered by generic protocols. In this dissertation, I demonstrate how tailoring secure computation protocols to the requirements of specific applications can allow for efficient solu...
The notion of secure computation is central tocryptography. Introduced in the seminal works of Yao [...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
Secure computation involves multiple parties computing a common function while keeping their inputs ...
Data privacy and security are among the grand challenges in the emerging era of massive data and col...
Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in...
Smartphones are rapidly becoming a widespread computation platform, with many users relying on their...
When two or more parties need to compute a common result while safeguarding their sensitive inputs, ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In the past two decades, tremendously successful digital services have been built that collect, proc...
Within the last decade, smartphone applications and online services became universal resources and a...
Within the last decade, smartphone applications and online services became universal resources and a...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
The notion of secure computation is central tocryptography. Introduced in the seminal works of Yao [...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
The notion of secure computation is central tocryptography. Introduced in the seminal works of Yao [...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
Secure computation involves multiple parties computing a common function while keeping their inputs ...
Data privacy and security are among the grand challenges in the emerging era of massive data and col...
Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in...
Smartphones are rapidly becoming a widespread computation platform, with many users relying on their...
When two or more parties need to compute a common result while safeguarding their sensitive inputs, ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In the past two decades, tremendously successful digital services have been built that collect, proc...
Within the last decade, smartphone applications and online services became universal resources and a...
Within the last decade, smartphone applications and online services became universal resources and a...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
The notion of secure computation is central tocryptography. Introduced in the seminal works of Yao [...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
The notion of secure computation is central tocryptography. Introduced in the seminal works of Yao [...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
Secure computation involves multiple parties computing a common function while keeping their inputs ...