Unobservable communication over untrusted infrastructure
dc.contributor.advisor | Witchel, Emmett | |
dc.contributor.committeeMember | Peter, Simon | |
dc.contributor.committeeMember | Walfish, Michael | |
dc.contributor.committeeMember | Waters, Brent | |
dc.contributor.committeeMember | Zeldovich, Nickolai | |
dc.creator | Angel, Sebastian Gomez | |
dc.creator.orcid | 0000-0002-3798-5590 | |
dc.date.accessioned | 2018-10-11T16:52:41Z | |
dc.date.available | 2018-10-11T16:52:41Z | |
dc.date.created | 2018-08 | |
dc.date.issued | 2018-10-11 | |
dc.date.submitted | August 2018 | |
dc.date.updated | 2018-10-11T16:52:41Z | |
dc.description.abstract | In the past decade there has been a significant increase in the collection of personal information and communication metadata (with whom users communicate, when, how often) by governments, Internet providers, companies, and universities. While there are many ongoing efforts to secure users’ communications, namely end-to-end encryption messaging apps and email services, safeguarding metadata remains elusive. This dissertation discusses the design, implementation, and evaluation of a system called Pung that makes progress on this front. Pung lets users exchange messages over the Internet without revealing any information in the process. Perhaps surprisingly, Pung achieves this strong privacy property even when all providers (ISPs, companies, servers, etc.) are arbitrarily malicious. As part of realizing Pung, this dissertation introduces two orthogonal but complementary techniques: SealPIR and probabilistic batch codes (PBCs). SealPIR is a new private information retrieval (PIR) library that reduces the communication costs of the most computationally efficient PIR protocol by over two orders of magnitude. SealPIR can also be used in other contexts to instantiate private services (for example, private variants of media streaming services). PBCs are a new data encoding that amortizes the computational costs associated with PIR, and are significantly more network-efficient than prior encodings. Thanks to these two techniques, our small deployment of Pung can scale out to support hundreds of thousands of users. | |
dc.description.department | Computer Science | |
dc.format.mimetype | application/pdf | |
dc.identifier | doi:10.15781/T20R9MP4D | |
dc.identifier.uri | http://hdl.handle.net/2152/68824 | |
dc.language.iso | en | |
dc.subject | Metadata-private communication | |
dc.subject | Private information retrieval | |
dc.subject | Anonymity | |
dc.subject | Privacy | |
dc.title | Unobservable communication over untrusted infrastructure | |
dc.type | Thesis | |
dc.type.material | text | |
thesis.degree.department | Computer Sciences | |
thesis.degree.discipline | Computer Science | |
thesis.degree.grantor | The University of Texas at Austin | |
thesis.degree.level | Doctoral | |
thesis.degree.name | Doctor of Philosophy |
Access full-text files
Original bundle
1 - 1 of 1
Loading...
- Name:
- ANGEL-DISSERTATION-2018.pdf
- Size:
- 1.22 MB
- Format:
- Adobe Portable Document Format