Title:
Replacing Oblivious Computation with Private Search for Context Sensitive Communications
Replacing Oblivious Computation with Private Search for Context Sensitive Communications
dc.contributor.author | Amrutkar, Chaitrali | |
dc.contributor.author | Naik, Rishikesh | |
dc.contributor.author | Dacosta, Italo | |
dc.contributor.author | Traynor, Patrick | |
dc.contributor.corporatename | Georgia Institute of Technology. College of Computing | |
dc.contributor.corporatename | Georgia Institute of Technology. Converging Infrastructure Security (CISEC) Laboratory | |
dc.contributor.corporatename | Georgia Tech Information Security Center | |
dc.date.accessioned | 2010-10-01T17:32:59Z | |
dc.date.available | 2010-10-01T17:32:59Z | |
dc.date.issued | 2010 | |
dc.description | Research area: Information Security and Cryptography | en_US |
dc.description | Research topic: Applied cryptography, Information security, Protocols, Practice-oriented provable security | |
dc.description.abstract | Context aware applications provide users with an increasingly rich set of services. From services such as interactive maps to restaurant guides and social networking tools, the use of information including location, activity and time can greatly enhance the ways users interact with their surroundings. Unfortunately, the dissemination and use of such information also potentially exposes private information about the user themselves. In this paper, we present Themis, a framework for developing two-party applications capable of making decisions based on context sensitive information without revealing either participants' inputs. Themis uses private stream searching to replace the memory and computationally intensive oblivious computation associated with related techniques. We compare the security guarantees and performance profile of our approach against Fairplay and show not only as much as a 96% improvement in execution time, but also the ability to efficiently run applications with complex inputs on both desktop computers and mobile phones. In so doing, we demonstrate the ability to create efficient context-sensitive applications based on private searching. | en_US |
dc.identifier.uri | http://hdl.handle.net/1853/35007 | |
dc.language.iso | en_US | en_US |
dc.publisher | Georgia Institute of Technology | en_US |
dc.relation.ispartofseries | SCS Technical Report; GT-CS-10-12 | en_US |
dc.subject | Applied cryptography | en_US |
dc.subject | Information security | en_US |
dc.subject | Protocols | en_US |
dc.subject | Practice-oriented provable security | en_US |
dc.title | Replacing Oblivious Computation with Private Search for Context Sensitive Communications | en_US |
dc.type | Text | |
dc.type.genre | Technical Report | |
dspace.entity.type | Publication | |
local.contributor.corporatename | College of Computing | |
local.contributor.corporatename | School of Computer Science | |
local.relation.ispartofseries | College of Computing Technical Report Series | |
local.relation.ispartofseries | School of Computer Science Technical Report Series | |
relation.isOrgUnitOfPublication | c8892b3c-8db6-4b7b-a33a-1b67f7db2021 | |
relation.isOrgUnitOfPublication | 6b42174a-e0e1-40e3-a581-47bed0470a1e | |
relation.isSeriesOfPublication | 35c9e8fc-dd67-4201-b1d5-016381ef65b8 | |
relation.isSeriesOfPublication | 26e8e5bc-dc81-469c-bd15-88e6f98f741d |