Cryptography and Privacy Engineering Group (ENCRYPTO)
As today's world gets more and more connected, actors with different and potentially conflicting interests want to interact in many application scenarios. Examples are citizens and governments (electronic passport and id), patients and health insurances (electronic health card, e-health services), or companies (cloud computing). In this context, it is of foremost importance that the underlying IT systems and algorithms can fulfill the diverse security and privacy requirements of the involved parties. In particular, if sensitive (e.g., medical) data is processed by not fully trusted service providers (e.g., “in the cloud”), conformity with data privacy protection laws must be guaranteed.
Privacy-preserving cryptographic protocols allow to process such sensitive data in a provably secure way. Until today, the design and implementation of privacy-preserving protocols, efficient enough to be used in practical applications, is a challenging and error-prone task even for experts in the field. To make such protocols widely accessible to non-expert users, tools are needed that automatically generate efficient and secure privacy-preserving cryptographic protocols from high-level specifications.
The Cryptography and Privacy Engineering Group (ENCRYPTO) investigates models, languages, and tools for security and privacy by design during the entire lifecycle of privacy-preserving protocols in various application scenarios.
Techniques for Protecting Privacy in Applications
The Cryptography and Privacy Engineering Group (ENCRYPTO) at the Department of Computer Science of the Technische Universität Darmstadt is offering position for a
Research Assistant (Doctoral Researcher/PhD Student) in “Techniques for Protecting Privacy in Applications”
with the goal to further develop our expertise in the area of engineering cryptographic protocols that are scalable to real-world problem sizes. go
Implementing Efficient Secure Computation
We are offering a Hiwi position. The number of working hours is flexible and can be up to 82 hours per month starting as soon as possible. go
Daniel Günther with his work on “Valiant’s Universal Circuit – Towards a Modular Construction and Implementation” won the first prize among three finalists in the category “Best Bachelor Thesis” at the CAST IT Security Award 2018. go
After exactly seven years of success under the name “Engineering Cryptographic Protocols (ENCRYPTO)”, we are happy that our group is now officially called “Cryptography and Privacy Engineering (ENCRYPTO)”. go
Paper accepted for PoPETs 2019(2)
The paper “SoK: Modular and efficient private decision tree evaluation” by Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, and Thomas Schneider was accepted for the Proceedings on Privacy Enhancing Technologies (PoPETs) 2019(2).