Secure Computation on Mobile Devices
نویسندگان
چکیده
Secure two-party computation has been an interesting theoretical concept for decades, but until recently has been considered too expensive for practical applications. With significant advances in the design and implementation of secure protocols, secure computation is becoming feasible in practice. However, with the notable exceptions of biometric identification and secure auctions, the research community has historically struggled to find realistic and useful applications for secure computation. In this work, we explore new opportunities implementing secure computing applications on rapidly evolving mobile computing platforms. Through a series of Android applications, we demonstrate the feasibility and power of secure computation protocols in this new domain. Keywords-secure computation; mobile devices; Yao’s circuits.
منابع مشابه
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target for deploying secure computation protocols are mobile devices as they contain a lot of sensitive user data. However, their resource restriction makes the deployment of secure computation protocols a...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملSecure communication between lightweight computing devices over the internet
The advent of light, low-power handheld compute devices such as Windows CE, PalmTM and Handspring, is changing the way in which mobile users interact with their home o ce. These devices can be connected to the Internet through both physical and wireless connections, and sensitive data transferred to and from these devices are subject to interception by a third party. Real-time encryption/decryp...
متن کاملSecure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network
The existing secure e-auction schemes are shown to be too costly for users using mobile devices in wireless network as they heavily depend on costly asymmetric cipher. A new secure e-auction efficient enough for devices with low computation capability and limited communication bandwidth is designed in this paper. Most of its operations are symmetric cipher computations and the only asymmetric c...
متن کامل