Could result in a sea change in how to secure computations
New research to be presented at the 18th European Symposium on Research in Computer Security (ESORICS 2013) this week could result in a sea change in how to secure computations.
The paper, entitled Practical covertly secure MPC for dishonest majority – or: Breaking the SPDZ limits, builds upon earlier joint work between Bristol and Aarhus and fills in the missing pieces of the jigsaw from the groups prior work that was presented at the CRYPTO conference in Santa Barbara last year.
The SPDZ protocol (pronounced “Speedz”) is a co-development between Bristol and Aarhus and provides the fastest protocol known to implement a theoretical idea called “Multi-Party Computation”.
The idea behind Multi-Party Computation is that it should enable two or more people to compute any function of their choosing on their secret inputs, without revealing their inputs to either party. One example is an election, voters want their vote to be counted but they do not want their vote made public.
The protocol developed by the universities turns Multi-Party Computation from a theoretical tool into a practical reality. Using the SPDZ protocol the team can now compute complex functions in a secure manner, enabling possible applications in the finance, drugs and chemical industries where computation often needs to be performed on secret data.
Nigel Smart, Professor of Cryptology in the University of Bristol’s Department of Computer Science and leader on the project, said: “We have demonstrated our protocol to various groups and organisations across the world, and everyone is impressed by how fast we can actually perform secure computations.
The Latest Bing News on:
- Futurex launches VirtuCrypt financial cloud HSM to support critical payment systems cryptographyon June 28, 2020 at 6:35 pm
Futurex’s VirtuCrypt financial cloud HSM service supports financial services orgs’ critical payment systems cryptography and key management needs.
- Experts Split on Practical Implications of Quantum Cryptographyon June 28, 2020 at 7:08 am
Scientists in China managed to exchange a crypto key at a distance of over 1,000 kilometers, could this lead to hackerproof cryptography?
- 2020 Revenue Assessment for Post-Quantum Cryptography (PQC) - ResearchAndMarkets.comon June 26, 2020 at 6:59 am
This report is a guide to the business opportunities that can be provided by Post-quantum cryptography (PQC) in the coming decade. Last year Google announced its breaking news of achieving quantum ...
- Global Quantum Cryptography Market Industry Size, Analysis Report, Growth and Forecast to 2020-2026on June 26, 2020 at 3:22 am
The global quantum cryptography market is estimated to witness considerable growth during the forecast period A significant focus on next generation cybersecurity solution has witnessed to strengthen ...
- Futurex Announces Next-Generation VirtuCrypt Financial Cloud HSMon June 25, 2020 at 7:21 pm
Futurex, a leading provider of hardened enterprise-class data security solutions, today announced the next generation of its VirtuCrypt financial cloud hardware security module (HSM) service. Futurex' ...
- Inside Quantum’s Post-Quantum Cryptography Report Pegs PQC Market at $9.5 Billion in 2029on June 25, 2020 at 8:19 am
The market for post-quantum cryptography (PQC) software and chips will ramp up to $9.5 billion by 2029 according to a new report from the Inside Quantum Technology ( PQC describes a class of encryptio ...
- Global Quantum Cryptography Market to Record Rise in Incremental Opportunity during the Forecast Period by 2025on June 22, 2020 at 11:26 am
The report offers a detailed analysis of the global Quantum Cryptography market with key players, applications, types, and regions. It focuses on significant market trends, revenue share, market ...
- NTT Research Builds Upon its Micro Technologies and Cryptography Expertise with Distinguished New Hireson June 18, 2020 at 5:58 am
NTT Research deepens expertise in micro technologies and cryptography with three strategic hires - Tetsuhiko Teshima, Vipul Goyal and Justin Holmgren.
- Quantum cryptography keys for secure communication distributed 1,000 kilometers farther than previous attemptson June 16, 2020 at 6:18 am
The exchange of a secret key for encrypting and decrypting messages over a distance of 1,120 kilometers is reported in Nature this week. This achievement is made using entanglement-based quantum key ...
- Singapore researchers tapping quantum cryptography to enhance network encryptionon May 30, 2020 at 3:17 am
A team of engineers and researchers are working to tap quantum cryptography technology to enhance network encryption tools, so these can be ready to mitigate security risks when quantum computing ...
The Latest Google Headlines on:
The Latest Bing News on:
- How Newcomer Anjuna is Closing an Old Data Security Gapon June 29, 2020 at 5:26 pm
Startup Anjuna has developed Enterprise Enclaves, a software security stack inside new CPUs from Intel and AMD, that may become the groundwork for a new age of secure enterprise computing.
- Facebook, IoTeX, R3 Among New Members of Confidential Computing Consortiumon June 29, 2020 at 5:07 pm
The Confidential Computing Consortium aims to create systems that sequester sensitive data so it can't be exploited by nefarious actors.
- Streamlining Embedded-Computing Design with COMson June 29, 2020 at 2:36 pm
Editor Bill Wong talks with Daniel Lang, Toradex CMO, about computer-on-module solutions and how they help simplify the design process.
- Rootless Containers Offer Better Securityon June 29, 2020 at 8:42 am
Containers are a little like virtual machines (VMs), in that they enable you to run programs that are isolated from each other. Unlike VMs, though, they share some of the underlying operating system's ...
- Confidential Computing Membership Grows 60 Percent within Nine Months of Formationon June 29, 2020 at 8:37 am
The Confidential Computing Consortium, a Linux Foundation project and community dedicated to defining and accelerating the adoption of confidential computing, today announced Accenture, AMD, Anjuna, ...
- Sigma Computing Names Orla Clifford Vice President of Operationson June 29, 2020 at 8:32 am
Sigma Computing, an innovator in cloud-native analytics and business intelligence (A&BI), announced today the appointment of operations leader Orl ...
- IT Security Isn't Supposed To Be Easyon June 29, 2020 at 7:49 am
Joey explains why it's worth it to endure a little inconvenience for the long-term benefits of a password manager and multifactor authentication.
- Accenture, AMD, Facebook and Nvidia sign up to advance ‘Confidential Computing’on June 29, 2020 at 6:25 am
The Linux Foundation-backed project said it’s welcoming a raft of big names to its community, including Accenture Plc, Advanced Micro Devices Inc., Facebook Inc. and Nvidia Corp. That’s on top of ...
- Cloud High-Performance Computing Market to value USD 22 Bn by 2023 | Impact of COVID-19 on Cloud High Performance Computing Marketon June 25, 2020 at 3:49 pm
Cloud High Performance Computing Market Research Report- Forecast till 2023 Market Highlights As per the analysis ...
- America must continue to advance high-performance computingon June 25, 2020 at 1:00 pm
Given the economic and national security implications of high-performance computing, falling behind China in this race is not an outcome the United States or the world can afford.