Secure two-party computation has been an interesting theoretical concept for decades, but until recently has been considered too expensive for practical applications. With significant advances in the design and implementation of secure protocols, secure computation is becoming feasible in practice. However, with the notable exceptions of biometric identification and secure auctions, the research community has historically struggled to find realistic and useful applications for secure computation. In this work, we explore new opportunities implementing secure computing applications on rapidly evolving mobile computing platforms. Through a series of Android applications, we demonstrate the feasibility and power of secure computation protocols in this new domain.
To install visit our Android Market page. Or, install from our site (your device must be set up to allow applications from unknown sources) by downloading CommonContacts.apk or scanning this barcode:
To install, download FavoritePapers.apk or scan this barcode:
Yan Huang, Peter Chapman, and David Evans. Privacy-Preserving Applications on Smartphones. 6th USENIX Workshop on Hot Topics in Security (HotSec 2011), San Francisco. 9 August 2011. [PDF, 6 pages]
Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster Secure Two-Party Computation Using Garbled Circuits, 20th USENIX Security Symposium, San Francisco, CA. 8-12 August 2011. [PDF, 16 pages]
Oakland 2011 Poster Proposal: [PDF] Oakland 2011 Poster: [PDF, 3MB]
Funding. This work was supported in part by grants from the Air Force Office of Scientific Research (MURI), National Science Foundation, and DARPA. We thank Google for providing Nexus One phones.