Could result in a sea change in how to secure computations
New research to be presented at the 18th European Symposium on Research in Computer Security (ESORICS 2013) this week could result in a sea change in how to secure computations.
The paper, entitled Practical covertly secure MPC for dishonest majority – or: Breaking the SPDZ limits, builds upon earlier joint work between Bristol and Aarhus and fills in the missing pieces of the jigsaw from the groups prior work that was presented at the CRYPTO conference in Santa Barbara last year.
The SPDZ protocol (pronounced “Speedz”) is a co-development between Bristol and Aarhus and provides the fastest protocol known to implement a theoretical idea called “Multi-Party Computation”.
The idea behind Multi-Party Computation is that it should enable two or more people to compute any function of their choosing on their secret inputs, without revealing their inputs to either party. One example is an election, voters want their vote to be counted but they do not want their vote made public.
The protocol developed by the universities turns Multi-Party Computation from a theoretical tool into a practical reality. Using the SPDZ protocol the team can now compute complex functions in a secure manner, enabling possible applications in the finance, drugs and chemical industries where computation often needs to be performed on secret data.
Nigel Smart, Professor of Cryptology in the University of Bristol’s Department of Computer Science and leader on the project, said: “We have demonstrated our protocol to various groups and organisations across the world, and everyone is impressed by how fast we can actually perform secure computations.
The Latest Bing News on:
- Crypto Doesn't Have to Be Serious. Just Ask This Comedian Who Organized a Conference About Failure in the Industry.on August 4, 2022 at 7:05 am
The International Crypto Conference 2022 starts August 8. General Chair Allison Bishop talks crypto in 2022, how cryptocurrency is different, and more, here.
- Zero-knowledge proof finds new life in the blockchainon August 4, 2022 at 3:00 am
ZKP has decades of history in computer science and cryptography. Now, it's evolving to support decentralized authentication for blockchains and web3.
- Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Houron August 3, 2022 at 10:01 am
It took researchers about 62 minutes to crack a late-stage Post-Quantum Encryption candidate algorithm using a single-core CPU.
- Post-quantum cryptography candidate cracked in hours using simple CPUon August 3, 2022 at 8:09 am
Researchers claim to have cracked SIKE using a single-core Xeon processor - a far cry from the exotic world of quantum computers ...
- Global Virtual Private Network (VPN) Markets Report 2022 with an Overview of VPNs within the IT Industry - ResearchAndMarkets.comon August 3, 2022 at 5:53 am
The report covers the overview of the global VPN market and analyses the market trends, considering the base year of 2021 and estimates for 2022-2027. VPNs create an encrypted tunnel between the ...
- MUCSE introduces first commercial post-quantum cryptography chip ready for the post-quantum eraon July 30, 2022 at 8:49 am
MUCSE, a pioneer in security and integrated circuit, announced its latest secure chip -- PQC 1.0. The PQC 1.0 is believed to be the first commercial post-quantum security chip supporting the recent ...
- Hack Post-Quantum Cryptography Now So That Bad Actors Don’t Do It Lateron July 28, 2022 at 8:33 am
The U.S. government should consider offering a public cash bounty to anyone who can crack the new forms of encryption that are being rolled out to defend against quantum computers.
- Quantum cryptography: Hacking is futileon July 27, 2022 at 1:00 pm
An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more ...
- Quantum cryptography: Making hacking futileon July 27, 2022 at 8:00 am
The Internet is teeming with highly sensitive information. Sophisticated encryption techniques generally ensure that such content cannot be intercepted and read. But in the future high-performance ...
- Thales recognised for its leadership in post-quantum cryptographyon July 27, 2022 at 6:29 am
The US National Institute of Standards and Technology (NIST) has selected an algorithm developed with input from Thales engineers as a new post-quantum cryptography standard for digital signatures.
The Latest Google Headlines on:
The Latest Bing News on:
- WISeKey Strengthens its Technology Portfolio Across Cybersecurity, IoT,on August 4, 2022 at 12:35 pm
WISeKey International Holding Ltd. (“WISeKey”) (NASDAQ: WKEY; SIX: WIHN), a leading global cybersecurity, IoT, and AI company, today announced its latest Cybersecurity IoT developments reinforcing the ...
- 3 Titans With Robust Cloud Computing Segmentson August 4, 2022 at 11:49 am
For investors seeking exposure to a rapidly expanding industry, Amazon (AMZN), Microsoft (MSFT), and Alphabet (GOOGL) would all be excellent choices.
- NCSU to lead $9M research project to improve software supply chain securityon August 4, 2022 at 9:54 am
NC State University is the lead institution on a $9 million, multi-institution National Science Foundation grant to research technical challenges in software supply chain security and to help build a ...
- Microsoft bolsters threat intelligence security portfolio with two new productson August 4, 2022 at 8:39 am
Drawing from its acquisition of RiskIQ, Microsoft is releasing Defender External Attack Surface Management and Defender External Attack Surface Management.
- Social Security Matterson August 4, 2022 at 6:49 am
For 19 years prior I contributed to the Canada Pension Plan (CPP) which is the equivalent of US Social Security. I am contemplating retirement in the US and have been told that I can draw my old age ...
- CIS Secure Adds IT Services Through Intrepid Acquisitionon August 4, 2022 at 2:54 am
CIS Secure Computing, a portfolio company of private equity firm HKW, has acquired Intrepid Solutions and Services in a move to expand technology products and service offerings for the U.S.
- Cities Strive For More Smarts, Securityon August 4, 2022 at 12:03 am
Smart city security starts with the silicon. As cities around the world move beyond their first completed smart city projects and add more systems, they face hurdles in expanding but have more ...
- The next generation of encryption may not be quite as secure as we'd hopedon August 3, 2022 at 7:15 am
One of the potential encryption algorithms that was a serious candidate to be used in the quantum computing world has been defeated worryingly simply.The algorithm in question is called SIKE ...
- CIS Secure Completes Merger with Intrepid Solutions and Serviceson August 3, 2022 at 5:03 am
Intrepid Solutions provides information technology modernization, data analysis/cybersecurity services, and intelligence training/support, primarily to the defense and intelligence communities. “The ...
- Troy Leach, Data Security and Standards Advocate, Joins Cloud Security Alliance as Chief Strategy Officeron August 2, 2022 at 5:02 am
Troy joined the Cloud Security Alliance in March in an advisory capacity. After spending a few stellar months with us, I am pleased that he has agreed to jump in with both feet and join the CSA team ...