Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Special Topics on Privacy and Public Auditability — Event 2

STPPA Event #2:

Structure: Three talks and one panel related to privacy-enhancing cryptography.

Featured topics: private set intersection; secure multi-party computation.

Date and place: Monday, April 19, 2021. Virtual event, via Webex

(This is an adjusted schedule. The original schedule planned an additional talk, on the topic of searchable encryption. The topic will be covered in a subsequent event.)

List of invited speakers: Steve Lu (Stealth Software Technologies, Inc.); Rafail Ostrovsky (UCLA); Mike Rosulek (Oregon State University).

List of bios (provided by the speakers):

Dr. Steve Lu is the CEO of Stealth Software Technologies, Inc.  Dr. Lu has served as the Principal Investigator on several projects involving secure computation and taking theory to practice. He received his PhD in Mathematics from UCLA under Rafail Ostrovsky in 2009. Within Stealth, Dr. Lu continues to lead ongoing research, design, and implementation of cryptographic tools and libraries. His theoretical contributions include foundational work in Garbled RAM and Distributed Oblivious RAM, and has published over a dozen papers in leading crypto and security venues.

Dr. Rafail Ostrovsky is a Distinguished Professor of Computer Science and Distinguished Professor of Mathematics at UCLA; Fellow of IEEE; Fellow of IACR; and a foreign member of Academia Europaea, with over 300 refereed publications and 14 issued USPTO patents. He served as chair of the IEEE Technical Committee on Mathematical Foundations of Computing from 2015 to 2018 and served as a Chair of FOCS 2011 Program Committee (PC). He also served on over 40 other international conference PC's and is currently serving as associate editor of Journal of ACM, Algorithmica Journal, and Journal of Cryptology. He is the recipient of multiple awards and honors including 1993 Henry Taub Prize; the 2017 IEEE Computer Society Technical Achievement Award and the 2018 RSA Excellence in the Field of Mathematics Award.

Mike Rosulek is an associate professor in the School of EECS at Oregon State University. His primary research focus is cryptography, specifically protocols for secure computation.

 About STPPA: In the "Special Topics on Privacy and Public Auditability" series, the NIST privacy-enhancing cryptography (PEC) project hosts talks on various interconnected topics related to privacy and public auditability. The goal is to convey basic technical background, incite curiosity, suggest research questions and discuss applications, with an emphasis on the role of cryptographic tools.

Selected Presentations
April 19, 2021 Type
1:00 PM Brief comments on PEC and STPPA
Luís T. A. N. Brandão - NIST/Strativia

A few slides to introduce the STPPA #2 event. We start by recalling the scope of the Privacy-Enhancing Cryptography (PEC) project, then explain the scope of the "Special Topics on Privacy and Public Auditability" (STPPA) series and present today's expected schedule.

(Note: the first mentioned scheduled talk was postponed to the future event STPPA #3)

1:15 PM A Brief Overview of Private Set Intersection
Mike Rosulek - Oregon State University

Private set intersection (PSI) is a special case of multiparty computation, in which each party has a set of items and the goal is to learn the intersection of those sets while revealing nothing else about those sets. In this talk I will survey and summarize the state of the art for PSI protocol techniques. I will highlight several different categories of PSI techniques, each motivated through different, realistic application scenarios.

1:55 PM Secure Computation on Datasets
Steve Lu - Stealth Software Technologies
Rafail Ostrovsky - UCLA

There are myriad domains where communities could benefit from aggregate statistical analyses that link across databases without requiring data owners to share their underlying data. In many cases, however, an obligation to protect the privacy of the underlying data often prevents organizations from performing (joint) statistical analyses that would benefit the community as a whole. Some common examples include: linking Electronic Medical Records (EMR) for longitudinal studies; student and teacher performance records; monitoring international financial transactions; environmental and hazard records; transportation and automotive studies; studies on logistics for managing vendor and supply chains; personal genetics and ancestry studies; cell phone call and location records; energy efficient HVAC and building management systems; digital statistics and cyber forensics.

In principle, general-purpose secure multiparty computation protocols exist that allow a group of mutually untrusting data owners to compute any function of interest across their joint data. This flexibility of functionality comes at a price, however, and existing MPC compilers target developers with a high-level of cryptographic expertise.  Our work focuses on building a simple, easy-to-deploy interface that allows non-crypto experts to securely compute a limited but optimized set of statistics on jointly held data.

2:10 PM STPPA#2 Panel: PEC for Privacy and Public Auditability
Mike Rosulek - Oregon State University
Steve Lu - Stealth Software Technologies
Rafail Ostrovsky - UCLA
Luís T. A. N. Brandão - NIST/Strativia
René Peralta - NIST
Angela Robinson - NIST

Panel with the STPPA#2 invited speakers, with questions moderated by the NIST-PEC team. An informal conversation that covered the following topics: (00:02:48) stakeholders of crypto developments; (00:15:00) is technical understanding a barrier for adoption; (00:27:04) comment on good/bad use; (00:28:10) how can NIST-PEC help; (00:31:53, from audience) marketing vs. technical claims; (00:39:15, from audience) implementation difficulties/time/laws/areas; (47:20) awareness and value of privacy and verifiable magic; (57:28) final thanks.


Event Details

Starts: April 19, 2021 - 01:00 PM EDT
Ends: April 19, 2021 - 04:00 PM EDT
April 19, 1pm-4pm

Format: Virtual Type: Other


Attendance Type: Open to public
Audience Type: Industry,Government,Academia,Other

Parent Project

See: Privacy-Enhancing Cryptography
Created March 29, 2021, Updated July 28, 2023