Dr.-Ing. Michael Zohner

I was a Ph.D. student and member of the Engineering Cryptographic Protocols (ENCRYPTO) group at the Center for Research in Security and Privacy (CRISP) between 2012 and 2016. In December 2016, I graduated with distinction on undefinedFaster Oblivious Transfer Extension and its Impact on Secure Computation.

My research focuses on the design and implementation of privacy preserving cryptographic protocols.

Furthermore, my interests include multi-party computation, privacy preserving protocols, side-channel attacks and countermeasures against power analysis attacks, and the SHA-3 competition.

You can find further information on my personal webpage.

Publications

Ad-hoc secure two-party computation on mobile devices using hardware tokens

Author Daniel Demmler, Thomas Schneider, Michael Zohner
Date August 2014
Kind Inproceedings
Book title23rd USENIX Security Symposium (USENIX Security'14)
KeyTUD-CS-2014-0096
Research Areas CASED, Engineering Cryptographic Protocols, Secure Data, Secure Protocols, CYSEC
Abstract Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target for deploying secure computation protocols are mobile devices as they contain a lot of sensitive user data. However, their resource restrictions make this a challenging task. In this work, we optimize and implement the secure computation protocol by Goldreich-Micali-Wigderson (GMW) on mobile phones. To increase performance, we extend the protocol by a trusted hardware token (i.e., a smartcard). The trusted hardware token allows to pre-compute most of the workload in an initialization phase, which is executed locally on one device and can be pre-computed independently of the later communication partner. We develop and analyze a proof-of-concept implementation of generic secure two-party computation on Android smart phones making use of a microSD smartcard. Our use cases include private set intersection for finding shared contacts and private scheduling of a meeting with location preferences. For private set intersection, our token-aided implementation on mobile phones is up to two orders of magnitude faster than previous generic secure two-party computation protocols on mobile phones and even as fast as previous work on desktop computers.
[Export this entry to BibTeX]

Important Copyright Notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang