Schick, Oliver (2017)
Web application for privacy-preserving scheduling.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Kurzbeschreibung (Abstract)
Arranging a meeting between multiple parties is a highly recurring task, that is becoming more and more time consuming, the more people and organisations get involved. Without any means of automatization, the arranging of a meeting between a larger amount of parties is very difficult to handle and thus, the need for automatic tool support arises. However, using these tools also raises some concerns regarding the privacy of the participants, as private information may be inferred from the availability patterns the participants publish when partaking in the poll. In this work we will introduce a protocol that allows to schedule meetings even between large amounts of participants, without requiring any participant to reveal his or her availability pattern to any other party. The protocol requires an evaluation function to be defined in order to find the scheduled time and allows for a large set of possible evaluation functions to be used, i.e. every function that can be represented by a Boolean circuit can be used as evaluation function in our protocol. Our protocol needs two servers to compute the evaluation function using a secure two-party computation protocol in order to keep the availability patterns of the participants secret. Therefore, we have to assume that the servers do not collude in order to gain knowledge about the inputs of the participants. Furthermore, if the secure two-party computation protocol used when implementing our protocol does not provide security in the presence of malicious adversaries, we have to assume that the servers are semi-honest.
Typ des Eintrags: | Bachelorarbeit |
---|---|
Erschienen: | 2017 |
Autor(en): | Schick, Oliver |
Art des Eintrags: | Bibliographie |
Titel: | Web application for privacy-preserving scheduling |
Sprache: | Englisch |
Referenten: | Schneider, Dr. Thomas ; Kiss, Agnes |
Berater: | Kiss, Ágnes |
Publikationsjahr: | 12 Dezember 2017 |
Ort: | Darmstadt |
Kollation: | 44 Seiten |
URL / URN: | https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry... |
Kurzbeschreibung (Abstract): | Arranging a meeting between multiple parties is a highly recurring task, that is becoming more and more time consuming, the more people and organisations get involved. Without any means of automatization, the arranging of a meeting between a larger amount of parties is very difficult to handle and thus, the need for automatic tool support arises. However, using these tools also raises some concerns regarding the privacy of the participants, as private information may be inferred from the availability patterns the participants publish when partaking in the poll. In this work we will introduce a protocol that allows to schedule meetings even between large amounts of participants, without requiring any participant to reveal his or her availability pattern to any other party. The protocol requires an evaluation function to be defined in order to find the scheduled time and allows for a large set of possible evaluation functions to be used, i.e. every function that can be represented by a Boolean circuit can be used as evaluation function in our protocol. Our protocol needs two servers to compute the evaluation function using a secure two-party computation protocol in order to keep the availability patterns of the participants secret. Therefore, we have to assume that the servers do not collude in order to gain knowledge about the inputs of the participants. Furthermore, if the secure two-party computation protocol used when implementing our protocol does not provide security in the presence of malicious adversaries, we have to assume that the servers are semi-honest. |
Freie Schlagworte: | Engineering, E4 |
Zusätzliche Informationen: | TUD-CS-2017-0324 |
Fachbereich(e)/-gebiet(e): | DFG-Sonderforschungsbereiche (inkl. Transregio) DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche LOEWE LOEWE > LOEWE-Zentren LOEWE > LOEWE-Zentren > CRISP - Center for Research in Security and Privacy DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen |
Hinterlegungsdatum: | 14 Dez 2017 15:35 |
Letzte Änderung: | 06 Aug 2024 08:38 |
PPN: | |
Referenten: | Schneider, Dr. Thomas ; Kiss, Agnes |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |