Highly Efficient Commodity-based Two-Party Computation for Smartphones

atmire.migration.oldid3229
dc.contributor.advisorMohassel, Payman
dc.contributor.authorOrobets, Ostap
dc.date.accessioned2015-05-06T15:32:36Z
dc.date.available2015-06-22T07:00:50Z
dc.date.issued2015-05-06
dc.date.submitted2015en
dc.description.abstractSecure Two-Party Computation (2PC) enables a set of parties to compute a function of their inputs while keeping these inputs private. While theoretical solutions for solving 2PC problems were known for decades, efficient implementations have been developed only recently. The delay in implementation was caused by a number of factors, including a substantial performance overhead and limitations of the standard implementation techniques. These difficulties are compounded in mobile devices, which have even additional restrictions on memory, computational power, and bandwidth. There exist low-cost general-purpose protocols for semi-honest parties that can be executed efficiently even on smartphones. However, for the malicious case current protocols are much less efficient. This thesis introduces the first protocol for mobile phones that is secure in the presence of malicious players and a semi-honest, non-colluding server. The protocol takes advantage of a commodity-based setting, where one or multiple servers provide participants with computational material that makes 2PC efficient. Our protocol has two phases: In an offline phase - where no party knows which function is to be computed nor who else is participating - each party interacts with the server and downloads a file. Later, in the online phase, when two parties decide to execute a 2PC together, they can use the files they have downloaded earlier to execute the computation at low cost. We implement our protocol on Android smartphones and desktops and experimentally show that our mobile solution is more efficient than most of the semi-honest mobile applications in this field. The online phase for evaluating a single AES circuit requires only 2.5 seconds and can be further reduced to 1.2 seconds (amortized time) with multiple executions.en_US
dc.identifier.citationOrobets, O. (2015). Highly Efficient Commodity-based Two-Party Computation for Smartphones (Master's thesis, University of Calgary, Calgary, Canada). Retrieved from https://prism.ucalgary.ca. doi:10.11575/PRISM/26358en_US
dc.identifier.doihttp://dx.doi.org/10.11575/PRISM/26358
dc.identifier.urihttp://hdl.handle.net/11023/2248
dc.language.isoeng
dc.publisher.facultyGraduate Studies
dc.publisher.institutionUniversity of Calgaryen
dc.publisher.placeCalgaryen
dc.rightsUniversity of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission.
dc.subjectComputer Science
dc.subject.classificationApplied Cryptographyen_US
dc.subject.classificationSecure Computationen_US
dc.titleHighly Efficient Commodity-based Two-Party Computation for Smartphones
dc.typemaster thesis
thesis.degree.disciplineComputer Science
thesis.degree.grantorUniversity of Calgary
thesis.degree.nameMaster of Science (MSc)
ucalgary.item.requestcopytrue
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ucalgary_2015_orobets_ostap.pdf
Size:
899.47 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.65 KB
Format:
Item-specific license agreed upon to submission
Description: