<node id="351951">
  <nid>351951</nid>
  <type>event</type>
  <uid>
    <user id="28077"><![CDATA[28077]]></user>
  </uid>
  <created>1417690909</created>
  <changed>1475892639</changed>
  <title><![CDATA[PhD Proposal by Henry Carter]]></title>
  <body><![CDATA[<p>Ph.D. THESIS PROPOSAL<br /><br /><strong>TITLE: Secure Multiparty Computation Outsourcing Techniques for the Mobile Platform</strong><br /><br /><strong>Henry Carter</strong><br />School of Computer Science<br />College of Computing<br />Georgia Institute of Technology<br /><br />Date: Monday,&nbsp;December 8, 2014<br />Time: 10:00 AM – 11:30 AM EST<br />Location: KACB 3100<br /><br /><br />Committee:<br /><br />Dr. Patrick Traynor, Advisor<br />School of Computer and Information Science and Engineering, University of Florida<br />Dr. Mustaque Ahamad<br />School of Computer Science, Georgia Institute of Technology<br />Dr. Sasha Boldyreva<br />School of Computer Science, Georgia Institute of Technology<br />Dr. Chris Peikert<br />School of Computer Science, Georgia Institute of Technology<br />Dr. Kevin Butler<br />School of Computer and Information Science and Engineering, University of Florida<br /><br /><br />Abstract:<br /><br />Mobile phones are becoming a primary computing platform for millions of users worldwide. &nbsp;Many mobile applications<br />provide convenient services requiring users to input GPS location, social networking data, or other potentially private&nbsp;<br />information. &nbsp;However, these applications cannot always be trusted to maintain the privacy of that user data. &nbsp;To solve<br />this problem, Secure Multiparty Computation (SMC) provides a cryptographically secure means for evaluating a<br />function over encrypted inputs. &nbsp;However, these constructions typically use expensive underlying operations, and<br />require computation and communication resources that are not available on a mobile device.<br /><br />In this proposal, we present a set of novel techniques for securely outsourcing the most costly operations in an SMC<br />protocol to a Cloud provider. &nbsp;Rather than naively trusting the Cloud to perform the secure computation in place<br />of the mobile device, we show that it is possible to add input and output verification to the computation to prevent<br />a malicious Cloud from tampering with the computation. &nbsp;We demonstrate the feasibility of our protocols<br />through benchmark testing, and present a variety of example applications that solve practical privacy problems<br />on mobile devices. &nbsp;Ultimately, we plan to demonstrate how these techniques can be modified and streamlined to<br />satisfy a range of potential real-world threat models.</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[TITLE: Secure Multiparty Computation Outsourcing Techniques for the Mobile Platform]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2014-12-08T09:00:00-05:00]]></value>
      <value2><![CDATA[2014-12-08T10:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>1808</tid>
        <value><![CDATA[graduate students]]></value>
      </item>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
