22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Towards the end of the project we initiated technology transfer discussions with product<br />

groups within IBM and devoted resources to supporting a successful transition to real-world<br />

products. Completion criteria for all three tasks was planned to be the development of the<br />

required cryptographic systems along with theoretical optimizations and prototype software if<br />

appropriate.<br />

The following is an outline of the planned schedule for the PROCEED AHEAD program.<br />

When the schedule for program work and deliverables was defined, it was assumed that IBM,<br />

Stanford, and USCD would all jointly contribute to program efforts for the duration of the<br />

planned four year program. This final report covers year one and year two contributions by the<br />

AHEAD team. At the close of year two IBM took leave of the program. Stanford and UCSD<br />

have continued their work under a new contract put in place with the Office of Naval Research<br />

and DARPA.<br />

Year 1: Develop initial protocols for pattern matching on encrypted data. Begin investigating<br />

improved 2-party computation techniques of the tasks outlines in the proposal. Experiment with<br />

optimizations to our fully homomorphic encryption implementation.<br />

Year 2: Continue developing our techniques for 2-party computation. Examine multiple<br />

executions of the same protocol in a multiparty setting. Tune protocols for pattern matching to<br />

the specific tasks of network guards and mail filtering on encrypted data. Continue<br />

experimenting with optimizations and modifications to the fully homomorphic system based on<br />

the results for year 1. Begin investigating the problem of delegating computation. Write and<br />

publish technical papers on intermediate results for all three tasks.<br />

After Year 2 the program was cancelled. The Year 3 and 4 planned work is outlined below but<br />

was not completed.<br />

Year 3: Build on our work from year 2 to and begin prototyping an application for our 2-party<br />

protocols, extend the investigation to include loops. Work on additional aspects of computation<br />

delegation. Use our optimized fully homomorphic encryption scheme for real world tasks such as<br />

network guards and other computations on encrypted data such as curve fitting (e.g., leastsquares<br />

fit) on encrypted data. Initiate discussions with products within IBM to promote<br />

technology transfer. Submit additional papers for publication in leading conferences.<br />

Year 4: Tune the research results to address the needs of product groups within IBM and to<br />

support technology transfer. As appropriate, release open source tools to enable other researchers<br />

to build on our work. Continue publishing technical papers on results of our research.<br />

Approved for Public Release; Distribution Unlimited.<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!