SFB CROSSING - Our Research on Developing a Compiler for Privacy-Preserving Protocols
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 14 | |
Author | ||
License | CC Attribution 3.0 Germany: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/48691 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
QuantumSoftwareAreaPhysical systemXML
00:11
Information privacyCompilerCommunications protocolConnected spaceCompilerInternetworkingProjective planeNeuroinformatikCommunications protocolComputer animation
00:31
LeakInformation securityInformation privacyInformationTelecommunicationConnected spaceSensitivity analysisNeuroinformatikNumbering schemeProgram flowchart
01:01
Communications protocolInformation securityExpert system
01:04
Communications protocolProcess (computing)CompilerAutomationProjective planeInformation security
01:09
Projective planeSoftware developerInformation securityTransformation (genetics)Communications protocolSoftware frameworkFunctional (mathematics)High-level programming languageBuildingCompilerMetric systemOrder (biology)MultiplicationGroup actionMixed realityRegular graphComputer animation
02:04
CompilerSoftware developerInformation securityCommunications protocolDescriptive statisticsUsabilityComputer animationDiagram
02:14
Information privacyWebsiteCompiler
02:28
JSONXML
Transcript: English(auto-generated)
00:03
Crossing is a joint effort of scientists from quantum physics, cryptography, system security, and software engineering, who collaborate in three interconnected project areas. In Project E4, Crossing is developing a compiler for privacy-preserving protocols.
00:25
We already know how to connect two computers via the internet securely, so that no one can intercept the connection and data is transmitted privately. However, even if the connection cannot be intercepted by an external adversary, attacks are still possible at the communication endpoints.
00:43
Furthermore, insiders are also able to access and leak sensitive information. Secure computation is a possible solution to these problems, since no private data is visible at any time. However, secure computation schemes are difficult to design and implement, and can be error prone.
01:02
Expert knowledge is required for realizing practical and efficient secure computation protocols. That's why we, in the Crossing Project E4, automate this process by providing a compiler for secure computation protocols. In order to do that, we first explore protocols and their implementations.
01:22
Therefore, we develop performance metrics to properly judge the protocol's efficiency. After we identify suitable protocols and performance metrics, we implement them in a modular framework. Additionally, this framework allows us to mix multiple protocols in order to improve performance even more.
01:41
Building upon these foundations, we realize the automatic transition from a high-level language into a secure computation protocol. This automated transformation is provided to the developer by our compiler. We collaborate with other Crossing Projects in order to improve both the functionality and security of our compiler.
02:02
At the end of Crossing Project E4, regular developers are able to use our compiler to create efficient, secure computation protocols from a high-level description. By making development easier, we hope to promote secure computation and make it user-friendly. Today, we envision this technology as reliable and efficient privacy protection for users in a connected world.
02:26
To learn more about developing a compiler for privacy-preserving protocols, please visit our website.