David Evans, UVA Department of Computer Science
Talk at University of Richmond, 30 January 2012
Two-party secure computation allows two parties to compute a function that depends on inputs from both parties, but reveals nothing except the output of the function. A general solution to this problem have been known since Andrew Yao's pioneering work on garbled circuits in the 1980s, but only recently has it become conceivable to use this approach in real systems. This talk will provide an introduction to secure computation, and describe the work we are doing at UVa to make secure computation efficient and scalable enough to build real applications. The talk assumes no prior background in cryptography, and should be understandable all computing students.
Tom Bowden
HealthLink
(Friday, 10.30, General 2)
See video at http://www.slideshare.net/secret/7EmESReifPHGa8
Provision of immediate access to accurate, pertinent, satisfactorily comprehensive clinical information in a dependable and cost-effective manner has long been an elusive goal. Attempts to implement shared record systems (both summary record systems and comprehensive record systems) have proved extraordinarily challenging. However, the Virtual Health Record (VHR) is an entirely new approach to patient information sharing. It is based upon linked regional implementations of a new technology. The methodology commences with a consensus building process amongst providers to determine what information is shared and how it is to be shared? VHR lends itself to an incremental approach to implementation.
Now being implemented in its second and third regions, the Virtual Health Record system is gradually being expanded as the technology and support systems are bedded in and the clinicians across each region learn to trust one another and work closely together to deliver a highly functional and reliable method of communication.
The Virtual Health Record is proving to be a viable method for sharing information across the healthcare ecosystem.
MOOCs, KOOCS, and SMOOCHs (or, Reports of the Death of Traditional Higher Edu...David Evans
Tech-Connect Brown Bag Talk, Harrison-Small Auditorium, University of Virginia, 1 May 2013
This talk is about my experiences developing open courses with Udacity, and makes the case that scale enables new and exciting opportunities in education because of the economics of amortizing development cost over a large number of students, but more importantly because of the possibility for scale to produce effective learning communities and inspire amazing contributions. The last part of the talk is about what the University of Virginia should do as a leading public institution.
UVa Today article:
http://news.virginia.edu/content/evans-uva-should-be-global-leader-moocs-online-learning
Evans: U.Va. Should Be a Global Leader in MOOCS, Online Learning
Multi-Party Computation in 2029: Boom, Bust, or Bonanza?David Evans
Applied Multi-Party Computation
Microsoft Research, Redmond
21 February 2014
Multi-Party Computation in 2014, 1999, 1984, and 1969
Where should secure computation be in 2029?
Decreasing costs of secure computation
Making Predictions
"Sending Faxes on the Beach" vs. "Making the WoldWideWeb"
Introducing "Dori-Mic and the Universal Machine!"
Oregon Security Day, 5 April 2013
Two-party secure computation offers the potential for two participants to securely compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any third party. For example, it could enable two people who meet at a conference to learn what contacts they have in common without revealing any of their other contacts or allow a pharmaceutical company to determine if a patient's genome shares common markers with successful participants in a study group, without revealing the genomes of the patient or study members. A general solution to this problem have been known since Andrew Yao's pioneering work on garbled circuits in the 1980s, but only recently has it become conceivable to use this approach in real systems. Our group has developed a framework for building efficient and scalable secure computations that achieves orders of magnitude performance improvements over the best previous systems. In this talk, I'll describe the techniques we use to design scalable and efficient secure computation protocols and share some recent results on improving the security and performance of secure computing applications.
Tom Bowden
HealthLink
(Friday, 10.30, General 2)
See video at http://www.slideshare.net/secret/7EmESReifPHGa8
Provision of immediate access to accurate, pertinent, satisfactorily comprehensive clinical information in a dependable and cost-effective manner has long been an elusive goal. Attempts to implement shared record systems (both summary record systems and comprehensive record systems) have proved extraordinarily challenging. However, the Virtual Health Record (VHR) is an entirely new approach to patient information sharing. It is based upon linked regional implementations of a new technology. The methodology commences with a consensus building process amongst providers to determine what information is shared and how it is to be shared? VHR lends itself to an incremental approach to implementation.
Now being implemented in its second and third regions, the Virtual Health Record system is gradually being expanded as the technology and support systems are bedded in and the clinicians across each region learn to trust one another and work closely together to deliver a highly functional and reliable method of communication.
The Virtual Health Record is proving to be a viable method for sharing information across the healthcare ecosystem.
MOOCs, KOOCS, and SMOOCHs (or, Reports of the Death of Traditional Higher Edu...David Evans
Tech-Connect Brown Bag Talk, Harrison-Small Auditorium, University of Virginia, 1 May 2013
This talk is about my experiences developing open courses with Udacity, and makes the case that scale enables new and exciting opportunities in education because of the economics of amortizing development cost over a large number of students, but more importantly because of the possibility for scale to produce effective learning communities and inspire amazing contributions. The last part of the talk is about what the University of Virginia should do as a leading public institution.
UVa Today article:
http://news.virginia.edu/content/evans-uva-should-be-global-leader-moocs-online-learning
Evans: U.Va. Should Be a Global Leader in MOOCS, Online Learning
Multi-Party Computation in 2029: Boom, Bust, or Bonanza?David Evans
Applied Multi-Party Computation
Microsoft Research, Redmond
21 February 2014
Multi-Party Computation in 2014, 1999, 1984, and 1969
Where should secure computation be in 2029?
Decreasing costs of secure computation
Making Predictions
"Sending Faxes on the Beach" vs. "Making the WoldWideWeb"
Introducing "Dori-Mic and the Universal Machine!"
Oregon Security Day, 5 April 2013
Two-party secure computation offers the potential for two participants to securely compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any third party. For example, it could enable two people who meet at a conference to learn what contacts they have in common without revealing any of their other contacts or allow a pharmaceutical company to determine if a patient's genome shares common markers with successful participants in a study group, without revealing the genomes of the patient or study members. A general solution to this problem have been known since Andrew Yao's pioneering work on garbled circuits in the 1980s, but only recently has it become conceivable to use this approach in real systems. Our group has developed a framework for building efficient and scalable secure computations that achieves orders of magnitude performance improvements over the best previous systems. In this talk, I'll describe the techniques we use to design scalable and efficient secure computation protocols and share some recent results on improving the security and performance of secure computing applications.
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksDavid Evans
David Evans
DC Area Crypto Day
Johns Hopkins University
30 October 2015
This (non-research) talk will start with a tutorial introduction to cryptocurrencies and how bitcoin works (and doesn’t work) today. We’ll touch on some of the legal, policy, and business aspects of bitcoin and discuss some potential research opportunities in cryptocurrencies.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Trick or Treat?: Bitcoin for Non-Believers, Cryptocurrencies for CypherpunksDavid Evans
David Evans
DC Area Crypto Day
Johns Hopkins University
30 October 2015
This (non-research) talk will start with a tutorial introduction to cryptocurrencies and how bitcoin works (and doesn’t work) today. We’ll touch on some of the legal, policy, and business aspects of bitcoin and discuss some potential research opportunities in cryptocurrencies.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
"Protectable subject matters, Protection in biotechnology, Protection of othe...
Computing Cooperatively with People You Don't Trust
1. Computing
Cooperatively
with People
You Don't Trust
University of Richmond
30 January 2012 David Evans
University of Virginia
http://www.cs.virginia.edu/evans
http://MightBeEvil.com
2. “Genetic Dating”
Bob Alice
Genome Compatibility
Protocol
Your offspring will have
WARNING! Your offspring will have
WARNING!
good immune systems!
Don’t Reproduce good immune systems!
Don’t Reproduce
2
4. Genome Sequencing
1990: Human Genome Project starts, estimate
$3B to sequence one genome ($0.50/base)
2000: Human
Genome Project
declared
complete, cost
~$300M
Whitehead Institute, MIT 4
5. $100,000,000
Cost to sequence human genome
Moore’s Law prediction
(halve every 18 months)
$10,000,000
$1,000,000
$100,000
$10,000
Jun 2010
Jun 2005
Sep 2001
Feb 2002
Sep 2006
Feb 2007
May 2003
Aug 2004
Apr 2006
May 2008
Aug 2009
Mar 2004
Jan 2005
Nov 2005
Mar 2009
Jan 2010
Dec 2002
Dec 2007
Jul 2002
Oct 2003
Jul 2007
Oct 2008
Data from National Human Genome Research Institute: http://www.genome.gov/sequencingcosts5
6. $100,000,000
Cost to sequence human genome
Moore’s Law prediction
(halve every 18 months)
$10,000,000
$1,000,000
$100,000
$10,000 Ion torrent Personal Genome Machine
Sep 2001
Feb 2002
Sep 2006
Feb 2007
May 2003
Aug 2004
Nov 2005
Apr 2006
May 2008
Aug 2009
Mar 2004
Jan 2005
Dec 2002
Jun 2005
Mar 2009
Jan 2010
Dec 2007
Jun 2010
Jul 2002
Oct 2003
Jul 2007
Oct 2008
Data from National Human Genome Research Institute: http://www.genome.gov/sequencingcosts6
7. Human Genome Sequencing Using Unchained Base Reads on Self-Assembling DNA Nanoarrays. Radoje
Drmanac, Andrew B. Sparks, Matthew J. Callow, Aaron L. Halpern, Norman L. Burns, Bahram G. Kermani, Paolo
Carnevali, Igor Nazarenko, Geoffrey B. Nilsen, George Yeung, Fredrik Dahl, Andres Fernandez, Bryan Staker,
Krishna P. Pant, Jonathan Baccash, Adam P. Borcherding, Anushka Brownley, Ryan Cedeno, Linsu Chen, Dan
Chernikoff, Alex Cheung, Razvan Chirita, Benjamin Curson, Jessica C. Ebert, Coleen R. Hacker, Robert Hartlage,
Brian Hauser, Steve Huang, Yuan Jiang, Vitali Karpinchyk, Mark Koenig, Calvin Kong, Tom Landers, Catherine Le,
Jia Liu, Celeste E. McBride, Matt Morenzoni, Robert E. Morey, Karl Mutch, Helena Perazich, Kimberly Perry, Brock
A. Peters, Joe Peterson, Charit L. Pethiyagoda, Kaliprasad Pothuraju, Claudia Richter, Abraham M. Rosenbaum,
Shaunak Roy, Jay Shafto, Uladzislau Sharanhovich, Karen W. Shannon, Conrad G. Sheppy, Michel Sun, Joseph V.
Thakuria, Anne Tran, Dylan Vu, Alexander Wait Zaranek, Xiaodi Wu, Snezana Drmanac, Arnold R. Oliphant,
William C. Banyai, Bruce Martin, Dennis G. Ballinger, George M. Church, Clifford A. Reid. Science, January 2010.
9. Secure Two-Party Computation
Bob’s Genome: ACTG… Alice’s Genome: ACTG…
Markers (~1000): *0,1, …, 0+ Markers (~1000): *0, 0, …, 1+
Bob Alice
Can Alice and Bob compute a function of their private
data, without exposing anything about their data besides the
result? 9
11. Regular Logic
Inputs Output
a b x
0 0 0
0 1 0
1 0 0
1 1 1
a b
AND
x
12. Computing with Meaningless Values?
Inputs Output
a b x
a0 b0 x0
a0 b1 x0
a1 b0 x0
a1 b1 x1
a0 or a1 b0 or b1
ai, bi, xi are random
values, chosen by the
circuit generator but
meaningless to the AND
circuit evaluator.
x0 or x1
15. Computing with Garbled Tables
Inputs Output
a b x
Bob can only decrypt
a0 b0 Enca0,b0(x0)
one of these!
a0 b1 Enca0,b1(x0)
a1 b0 Enca1,b0(x0)
a1 b1 Enca1,b1(x1)
a0 or a1 b0 or b1 Garbled And Gate
Random
Enca0, b1(x0) Permutation
AND Enca1,b1(x1)
Enca1,b0(x0)
x0 or x1 Enca0,b0(x0)
16. Garbled Circuit Protocol
Alice (circuit generator) Bob (circuit evaluator)
Garbled Gate
Enca0, b1(x0)
Enca1,b1(x1)
Enca1,b0(x0)
Enca0,b0(x0)
Sends ai to Bob
based on her input
value
How does the Bob learn his own input wires?
17. Primitive: Oblivious Transfer
Alice Bob
Oblivious Transfer
Protocol
Oblivious: Alice doesn’t learn which secret Bob obtains
Transfer: Bob learns one of Alice’s secrets
Rabin, 1981; Even, Goldreich, and Lempel, 1985; many subsequent papers
18. Chaining Garbled Circuits
And Gate 1
a0 b0 a1 b1 Enca10, b11(x10)
Enca11,b11(x11)
AND AND Enca11,b10(x10)
x1 Enca10,b10(x10)
x0
Or Gate 2
Encx00, x11(x21)
Encx01,x11(x21) OR
Encx01,x10(x21)
x2
Encx00,x10(x20)
…
We can do any computation privately this way!
18
19. Building Computing Systems
Encx00, x11(x21)
Encx01,x11(x21)
Encx01,x10(x21)
Encx00,x10(x20)
Digital Electronic Circuits Garbled Circuits
Operate on known data Operate on encrypted wire labels
One-bit logical operation requires One-bit logical operation requires
moving a few electrons a few performing (up to) 4 encryption
nanometers operations: very slow execution
(hundreds of Billions per second)
Reuse is great! Reuse is not allowed for privacy:
huge circuits needed
19
20. Fairplay
Alice Bob
SFDL SFDL
Compiler Compiler
Circuit
(SHDL)
SFDL Program
Garbled Tables
Generator
Dahlia Malkhi, Noam Nisan,
Benny Pinkas and Yaron Sella Garbled Tables
[USENIX Sec 2004] Evaluator
20
21. Faster Garbled Circuits
Circuit-Level
Application
Circuit Structure Circuit Structure
GC Framework GC Framework
(Generator) (Evaluator)
Encx00, x11(x21)
Encx20, x21(x30) x21
Encx20,(x2(x41)
Encx01,x1x4x3x3 )(x51) x31
Enc 1 0,(x3
1
Encx21,x2x4 ,1x5 )(x61)
Enc 1 0 1 01
Encx21(x2(x46 )(x71) x41
Enc
Encx01,x1x4 ,x310) x 11 0)
Enc0 ,x31 )
Encx21,x2x4x31,(x5 0)
Enc0(x311(x6
1 x51
Encx21,x3x3 ,x60) 0)
Enc0(x4 1 )
1,x5
Encx41,x30(x5(x7
1 0
x60
Encx41,x50(x60) x71
Encx31,x60(x71)
Gates can be evaluated as they are generated: pipelining
Gates can be evaluated in any topological sort order: parallelizing
Garbled evaluation can be combined with normal execution
21
22. Results: Performance
Fairplay
Binary gates per
[PSSW09]
millisecond
TASTY
Our Results 100,000 gates per second
0 10 20 30 40 50 60 70 80 90 100
22
24. Private
Personal
Genomics
Applications
Privacy-Preserving
Biometric Matching
Private AES
Encryption
Private Set Intersection
24
25. Heterozygous Recessive Risk
Alice
A a
carrier
A AA Aa
Bob
a aA aa
cystic fibrosis
Alice’s Heterozygous Recessive genes: , 5283423, 1425236, 839523, … -
Bob’s Heterozygous Recessive genes: , 5823527, 839523, 169325, … -
Goal: find the intersection of A and B
25
33. Peter Chapman Yan Huang
(UVa BACS 2012) (UVa Computer Science
PhD Student)
Funding: Jonathan Katz
NSF, MURI (AFOSR), Google (University of Maryland)
33