I am looking for motivated students to join my group. An ideal candidate should be interested in security, privacy, applied cryptography. No prior experience in cryptography or security is required. Experience in other areas, including theory, math, database, machine learning, bioinformatics is a plus. If you are interested, send your CV, transcripts, and everything that you believe will help your application in PDF format to firstname.lastname@example.org.
- School of Computing, Informatics, and Decision Systems Engineering]
- Biodesign Center for Biocomputing, Security and Society
- Program Description: PhD Computer Science (Cybersecurity)
- Admission Requirements (**GRE is optional**)
About my research: Cryptography is more than just hiding information (i.e., encryption). Using cryptography, it is possible to perform a wide range of computations on secret data that cannot be seen. For example, two hospitals may wish to train various models (e.g. classification) on their joint medical database without revealing any information except the output.
The idea of computing on private data is called secure computation which enables distrustful users to jointly evaluate any function on their private inputs without requiring a trusted third party and without revealing anything except the result itself. I am interested in both theoretical and practical aspects of secure computation techniques. More concretely, my recent research focuses on:
- Private Matching (PM): PM allows several parties to jointly compute certain functions, depending on their private inputs matched in some way. Very recently, PM has been applied to design decentralized contact tracing systems that allow to detect if a person is in the proximity of a COVID19 diagnosed patient, without revealing their location.
- Privacy-Preserving Machine Learning: Many machine learning algorithms require large-scale data. When the data is sensitive and comes from different sources, it is highly desirable to allow different entities to train various models on their joint data while maintaining the privacy of each database.
- Cryptographic Primitives: In addition to concrete optimizations tailored for the real-world and important applications above, I am also interested in making core cryptographic techniques (e.g. Oblivious Transfer) more efficient and quantum-resistant.