본문

서브메뉴

Co-Designing Cryptographic Systems With Resource-Constrained Hardware.
コンテンツ情報
Co-Designing Cryptographic Systems With Resource-Constrained Hardware.
자료유형  
 학위논문
Control Number  
0017163805
International Standard Book Number  
9798384448877
Dewey Decimal Classification Number  
004
Main Entry-Personal Name  
Watson, Jean-Luc.
Publication, Distribution, etc. (Imprint  
[S.l.] : University of California, Berkeley., 2024
Publication, Distribution, etc. (Imprint  
Ann Arbor : ProQuest Dissertations & Theses, 2024
Physical Description  
130 p.
General Note  
Source: Dissertations Abstracts International, Volume: 86-03, Section: B.
General Note  
Advisor: Dutta, Prabal;Popa, Raluca Ada.
Dissertation Note  
Thesis (Ph.D.)--University of California, Berkeley, 2024.
Summary, Etc.  
요약Sensitive private information is increasingly processed on relatively public networks and systems. Location data is constantly gathered from users' mobile phones and correlated with their activity, measuring both who they interact with in the real world, and their online behavior. Analytics workloads operate over the private data associated with millions of customers, which could include Amazon purchase histories, location trace data, or web browsing information derived from third-party cookies. Machine learning workloads are consuming every source of public (and non-public) data available through the Internet, as companies like OpenAI and Google compete to create the best and most accurate large language models. While cryptographic techniques can protect sensitive information, performant deployments are still out of reach because they assume better system capabilities than currently exist. As a result, in many cases where user privacy is at risk, the cost of protecting it directly trades off with commercial viability. For example, consumers likely would not tolerate a mobile app that privately interacted with nearby Internet of Things (IoT) devices but drained their battery, or a private ChatGPT version that required over a minute to respond to every question. As a result, reducing the divide between the theoretical capabilities of advanced cryptographic primitives and what we can hope to reasonably compute in today's cryptographic systems is critical to supporting user data privacy moving forward. Thankfully, not all is lost. A new generation of heterogeneous hardware is becoming commonplace, from millions of embedded sensors and consumer mobile platforms that are more energy-efficient and computationally powerful than ever before, to server-class graphics processing units (GPUs) with hundreds of cores for general-purpose computing. Critically, however, mobile platforms and GPUs exhibit significantly limited energy and memory availability, respectively, so cryptographic systems we develop must take these into consideration to achieve practicality.In this dissertation, I present my work on adapting cryptography for hardware resource constraints in order to achieve both performance and privacy. I will cover several systems we developed: Nebula, a protocol for embedded sensors and mobile phones to retrieve data from anywhere without leaking user participation; Piranha, a platform to accelerate multiparty computation-based ML training to privately incorporate sensitive datasets into a collaboratively-computed model; and finally, a systems approach to increase both the scale and throughput of zero-knowledge proving to improve the performance of private identity systems, blockchains, and verifiable computation. In each of these cases, considering the compute, energy, and memory constraints of specialized hardware allows us to recast expensive cryptographic problems into practically-efficient systems.
Subject Added Entry-Topical Term  
Computer science.
Subject Added Entry-Topical Term  
Engineering.
Subject Added Entry-Topical Term  
Information technology.
Index Term-Uncontrolled  
Private information
Index Term-Uncontrolled  
Cryptographic primitives
Index Term-Uncontrolled  
Mobile platforms
Index Term-Uncontrolled  
Internet of Things
Index Term-Uncontrolled  
Machine learning
Added Entry-Corporate Name  
University of California, Berkeley Computer Science
Host Item Entry  
Dissertations Abstracts International. 86-03B.
Electronic Location and Access  
로그인을 한후 보실 수 있는 자료입니다.
Control Number  
joongbu:658320
New Books MORE
최근 3년간 통계입니다.

詳細情報

  • 予約
  • 캠퍼스간 도서대출
  • 서가에 없는 책 신고
  • 私のフォルダ
資料
登録番号 請求記号 場所 ステータス 情報を貸す
TQ0034642 T   원문자료 열람가능/출력가능 열람가능/출력가능
마이폴더 부재도서신고

*ご予約は、借入帳でご利用いただけます。予約をするには、予約ボタンをクリックしてください

해당 도서를 다른 이용자가 함께 대출한 도서

Related books

Related Popular Books

도서위치