Coordinatore | BAR ILAN UNIVERSITY
Spiacenti, non ci sono informazioni su questo coordinatore. Contattare Fabio per maggiori infomrazioni, grazie. |
Nazionalità Coordinatore | Israel [IL] |
Totale costo | 606˙000 € |
EC contributo | 606˙000 € |
Programma | FP7-IDEAS-ERC
Specific programme: "Ideas" implementing the Seventh Framework Programme of the European Community for research, technological development and demonstration activities (2007 to 2013) |
Code Call | ERC-2007-StG |
Funding Scheme | ERC-SG |
Anno di inizio | 2008 |
Periodo (anno-mese-giorno) | 2008-10-01 - 2013-09-30 |
# | ||||
---|---|---|---|---|
1 |
UNIVERSITY OF HAIFA
Organization address
address: "Mount Carmel, Abba Khoushi Blvd." contact info |
IL (HAIFA) | beneficiary | 0.00 |
2 |
BAR ILAN UNIVERSITY
Organization address
address: BAR ILAN UNIVERSITY CAMPUS contact info |
IL (RAMAT GAN) | hostInstitution | 0.00 |
3 |
BAR ILAN UNIVERSITY
Organization address
address: BAR ILAN UNIVERSITY CAMPUS contact info |
IL (RAMAT GAN) | hostInstitution | 0.00 |
Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.
'Modern cryptography is known for the introduction of public key cryptography, which has been widely applied in practice. However, the theory of cryptography provided additional powerful (and less intuitive) tools. One of its most attractive contributions is secure computation, also known as secure function evaluation - SFE, which allows multiple participants to implement a joint computation that, in real life, may only be implemented using a trusted party. The participants, each with its own private input, communicate without the help of any trusted party, and can compute any function without revealing any information about the inputs except for the value of the function. A classic example of such a computation is the “millionaires’ problem”, in which two millionaires want to find out who is richer, without revealing their actual worth. Thus far, secure computation techniques have rarely been applied in practice, and are typically considered to have mostly theoretical significance. In this research proposal we intend to build tools that translate these theoretical results into practical applications. Our goal is that secure computation solutions, which today are usually stated as mathematical theorems, will be available as tools usable by non-experts, similar to state-of-the-art tools for technologies such as public key encryption, linear programming, or data compression. The research will proceed in two directions: First, we will develop generic tools (essentially compilers) which translate functions defined using a high-level language to distributed programs that implement secure evaluation of the defined functions. We also expect that this effort will unearth many questions of theoretical interest, which we will investigate. Our other direction of research is the design of specialized, and highly efficient, solutions to key tasks which have conflicting goals of respecting privacy and enabling legitimate usage of data.'