log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
Efficient Zero-Knowledge Authenticated Data Structures
Esha Ghosh - Brown University
Thursday, November 5, 2015, 11:30 am-12:30 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

With the advent of cloud storage and computing, adopting cloud services to reduce operational, maintenance and storage costs, is becoming increasingly common --- both for individuals and corporations. However, the fact that the data owner is not in physical possession of the data anymore raises important challenges in terms of integrity of data. Moreover, this is more than just a theoretical risk, since third party service providers are typically allowed to access the remotely stored data. Such risks raise obvious privacy issues. Along with such important security and privacy concerns, efficiency is also a major factor in such settings, as the main motivations for adopting cloud computing—namely scalability and computation offloading—are defeated otherwise. 

 

In this talk I will discuss our work on efficient privacy-preserving protocols addressing the above challenges for a large class of data queries. I will first describe our proposed model and then discuss protocols for set queries, order queries for trees and DAG's and range queries. This talk is based on the following papers:

    1.     E. Ghosh, O. Ohrimenko, and R. Tamassia. Zero-knowledge authenticated order queries and order statistics on a list. In Applied Cryptography and Network Security, 2015. 
    2.     E. Ghosh, M. T. Goodrich, O. Ohrimenko, and R. Tamassia. Fully-dynamic verifiable zero-knowledge order queries for network data. Cryptology ePrint Archive, Report 2015/283, 2015. In submission. 
    3.     E. Ghosh, O. Ohrimenko, D. Papadopoulos, R. Tamassia, and N. Triandopoulos. Zero-knowledge accumulators and set operations. Cryptology ePrint Archive, Report 2015/404, 2015. In submission. 
    4.     E. Ghosh, O. Ohrimenko, and R. Tamassia. Authentiated range & closest point queries in zero-knowledge, 2015. In submission.

Bio

Esha Ghosh is currently a fourth year Ph.D candidate at Brown University working with Professor Roberto Tamassia. Her research interests include security, privacy and applied cryptography. She is currently working on efficiency and privacy enhancements for verifiable computation. Her paper on “Zero-knowledge authenticated order queries and order statistics on a list” received best student paper award at ACNS this year. Esha is the recipient of Coline M. Makepeace Fellowship and Paris C. Kanellakis Fellowship at Brown University. Prior to joining Brown, Esha completed her MS from Indian Institute of Technology, Madras (2011), India where she worked on graph algorithms. She also collaborated with the Fixed Parameter Algorithms group at Institute of Mathematical Sciences (IMSc) in India.

This talk is organized by Jonathan Katz