ALADDIN
CENTER Carnegie Mellon UniversityCarnegie Mellon Computer Science DepartmentSchool of Computer Science
REU

Covert Multi-Party Computation

Aladdin
About
Calendar
People
PROBEs
Workshops
Papers
Education
Related Activities
Corporate
Contact
 
Captcha
Outreach Roadshow

REU
Student

Graduate
Mentor

Faculty
Advisor

 

Covert two-party computation is a stronger notion of security than standard secure two-party computation. Like standard secure two-party computation, covert two-party computation allows Alice and Bob, with secret inputs x_A and x_B respectively, to compute a function f(x_A,x_B) without leaking any additional information about their inputs. In addition, covert two-party computation guarantees that even the existence of a computation is hidden from all protocol participants unless the value of the function mandates otherwise. This allows the construction of protocols that return f(x_A,x_B) only when it equals a certain value of interest (such as "Yes, we are romantically interested in each other") but for which neither party can determine whether the other even ran the protocol whenever f(x_A,x_B) is not a value of interest.

This project will explore extending covert two-party computation to more than two-parties. The REU student will investigate covert two-party computation and learn the necessary cryptographic tools to get up to speed. As a prerequisite, the undergraduate must have knowledge of computer science theory, especially complexity theory or cryptography.


TBA

Luis
von Ahn

CS grad
student

Manuel
Blum

CS
faculty

 

This material is based upon work supported by National Science Foundation under Grant No. 0122581.
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the
National Science Foundation