Could result in a sea change in how to secure computations
New research to be presented at the 18th European Symposium on Research in Computer Security (ESORICS 2013) this week could result in a sea change in how to secure computations.
The collaborative work between the University of Bristol and Aarhus University (Denmark) will be presented by Bristol PhD student Peter Scholl from the Department of Computer Science.
The paper, entitled Practical covertly secure MPC for dishonest majority – or: Breaking the SPDZ limits, builds upon earlier joint work between Bristol and Aarhus and fills in the missing pieces of the jigsaw from the groups prior work that was presented at the CRYPTO conference in Santa Barbara last year.
The SPDZ protocol (pronounced “Speedz”) is a co-development between Bristol and Aarhus and provides the fastest protocol known to implement a theoretical idea called “Multi-Party Computation”.
The idea behind Multi-Party Computation is that it should enable two or more people to compute any function of their choosing on their secret inputs, without revealing their inputs to either party. One example is an election, voters want their vote to be counted but they do not want their vote made public.
The protocol developed by the universities turns Multi-Party Computation from a theoretical tool into a practical reality. Using the SPDZ protocol the team can now compute complex functions in a secure manner, enabling possible applications in the finance, drugs and chemical industries where computation often needs to be performed on secret data.
Nigel Smart, Professor of Cryptology in the University of Bristol’s Department of Computer Science and leader on the project, said: “We have demonstrated our protocol to various groups and organisations across the world, and everyone is impressed by how fast we can actually perform secure computations.
The Latest on: Cryptography
- The APS Division of Quantum Informationon December 2, 2019 at 1:10 pm
Specifically, this spans quantum entanglement, quantum communication, quantum cryptography, quantum algorithms and simulations, physical implementation of qubits (the basic unit of quantum information ...
- Impacts of the Blockchain will be Gigantic on the Financial Industry Says Deltec Bank Bahamason November 30, 2019 at 9:45 am
According to Deltec Bank, Bahamas – "Blockchain technology uses distributed databases and cryptography for the purpose of recording transactions. These records are interlinked and part of a ...
- DNA origami cryptography for secure communicationon November 29, 2019 at 2:22 am
Biomolecular cryptography exploiting specific biomolecular interactions for data encryption represents a unique approach for information security. However, constructing protocols based on biomolecular ...
- Cryptocurrency has a volatile and exciting futureon November 26, 2019 at 5:17 pm
A cryptocurrency is a digital or virtual currency that is secured by cryptography, which makes it nearly impossible to counterfeit or double-spend. (Getty Images) Ron Richards got into Bitcoin at the ...
- Biometric authentication from browser now supported by eBay as passwords continue to fail userson November 26, 2019 at 12:41 pm
Passwords and other knowledge-based authentication (KBA) methods continue to lose ground to biometrics and public key cryptography, with a new implementation, a perspective shared by Microsoft, and a ...
- Has the quantum crypto break already happened?on November 26, 2019 at 5:39 am
Ever since Peter Shor released a quantum algorithm in 1994 that proved quantum computers with enough quantum bits (qubits) could easily break most popular public key cryptography (e.g., RSA, ...
- Quantum Cryptography in the US-China Tech Raceon November 25, 2019 at 10:47 am
China’s particular strength is in the area of quantum cryptography. It has a secure network running between Beijing and Shanghai with quantum local area networks around those to cities as well as ...
- NTT offers researchers $1 million salaries in bid to lure top talent in cryptography, quantum computingon November 20, 2019 at 1:46 am
“It wouldn’t be possible several years back.” Tatsuaki Okamoto, director of cryptography & information security for NTT Research, is an example of a star that has helped draw in other top researchers ...
- Global Post-Quantum Cryptography Market and Technology Forecast Report 2019-2029on November 15, 2019 at 2:50 am
DUBLIN, Nov. 15, 2019 /PRNewswire/ -- The "Post-Quantum Cryptography: A Ten-Year Market and Technology Forecast" report has been added to ResearchAndMarkets.com's offering. The market for post-quantum ...
- 'Mario Maker 2' Creators Are Using Cryptography to Make Impossible Levelson November 7, 2019 at 6:03 am
He even drew upon another personal interest, cryptography, in coming up with the level. “The goal of the level is to act as a lock, the same way a physical combination lock does,” ShiroVM explained to ...
via Google News and Bing News