Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target for deploying secure computation protocols are mobile devices as they contain a lot of sensitive user data. However, their resource restriction makes the deployment of secure computation protocols a challenging task.
The goal of this thesis is to optimize and implement the secure computation protocol by Goldreich-MicaliWigderson (GMW) on mobile phones. To increase performance, a protocol extension using a trusted hardware token (e.g., a smartcard) should be explored. The trusted hardware token is supposed to pre-compute most of the workload in an initialization phase, which is executed locally on one device and can be pre-computed independently of the later communication partner.
A prototype implementation of private set intersection for finding shared contacts and private scheduling of a meeting with location preferences should be developed to demonstrate the improvement over previous generic secure two-party computation protocols on mobile phones.
- Dr.-Ing. Michael Zohner (email@example.com)
- Prof. Dr.-Ing. Thomas Schneider (firstname.lastname@example.org-…)
- Daniel Demmler, Thomas Schneider, and Michael Zohner: Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens. In USENIX Security. USENIX, 2014.
- Daniel Demmler: Hardware-Assisted Two-Party Secure Computation on Mobile Devices. Master Thesis, 2013.