Our goal is to bridge theory and practice to create infrastructure that allow computation and multi-party computation without compromising privacy.

Can you run a program on an Amazon cloud without telling it the data it should run on?Can you run your private data on someone else's secret algorithm, without telling each other what the data or the algorithm are? Cryptographic schemes that allow secure computation without revealing the data they work on, have been known for decades. However, such schemes are still far from being efficient enough to be practically applied. In our research we develop new tools and infrastructure that push secure computation toward practicality.

Members