In (two-party) privacy-preserving-based applications, two users use encrypted inputs to compute a function without giving out plaintext of their input values. Privacy-preserving computing algorithms have to utilize a large amount of computing resources to handle the encryption-decryption operations. In this dissertation, we study optimal utilization of computing resources on the graphic processor unit (GPU) architecture for privacy-preserving protocols based on secure function evaluation (SFE) and the Elliptic Curve Cryptographic (ECC) and related algorithms. A number of privacy-preserving protocols are implemented, including private set intersection (PSI), secret handshaking (SH), secure Edit distance (ED) and Smith-Waterman (SW) problems....
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
A multitude of privacy-enhancing technologies (PETs) has been presented recently to solve the privac...
This paper presents a low-latency algorithm designed for parallel computer architectures to compute ...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
We describe, and implement, a maliciously secure protocol for two-party computation in a parallel co...
As the amount of information exchanged through the network grows, so does the demand for increased s...
Tremendous efforts have been made to improve the efficiency of secure Multi-Party Computation (MPC),...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
Data privacy and security are among the grand challenges in the emerging era of massive data and col...
Privacy and security have rapidly emerged as first order design constraints. Users now demand more p...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multipli...
Secure multi-party computation (MPC) is an essential tool for privacy-preserving machine learning (M...
This paper merges between elliptic curve addition presents a modified processor architecture for Ell...
Protecting users' privacy in digital systems becomes more complex and challenging over time, as the ...
We present a multi-GPU design, implementation and performance evaluation of the Halevi-Polyakov-Shou...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
A multitude of privacy-enhancing technologies (PETs) has been presented recently to solve the privac...
This paper presents a low-latency algorithm designed for parallel computer architectures to compute ...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
We describe, and implement, a maliciously secure protocol for two-party computation in a parallel co...
As the amount of information exchanged through the network grows, so does the demand for increased s...
Tremendous efforts have been made to improve the efficiency of secure Multi-Party Computation (MPC),...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
Data privacy and security are among the grand challenges in the emerging era of massive data and col...
Privacy and security have rapidly emerged as first order design constraints. Users now demand more p...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multipli...
Secure multi-party computation (MPC) is an essential tool for privacy-preserving machine learning (M...
This paper merges between elliptic curve addition presents a modified processor architecture for Ell...
Protecting users' privacy in digital systems becomes more complex and challenging over time, as the ...
We present a multi-GPU design, implementation and performance evaluation of the Halevi-Polyakov-Shou...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
A multitude of privacy-enhancing technologies (PETs) has been presented recently to solve the privac...
This paper presents a low-latency algorithm designed for parallel computer architectures to compute ...