Award Abstract # 1414000
TWC: Frontier: Collaborative: CORE: Center for Encrypted Functionalities

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: THE LELAND STANFORD JUNIOR UNIVERSITY
Initial Amendment Date: July 31, 2014
Latest Amendment Date: July 18, 2018
Award Number: 1414000
Award Instrument: Continuing Grant
Program Manager: Nina Amla
namla@nsf.gov
 (703)292-7991
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: October 1, 2014
End Date: June 30, 2021 (Estimated)
Total Intended Award Amount: $950,000.00
Total Awarded Amount to Date: $999,992.00
Funds Obligated to Date: FY 2014 = $363,840.00
FY 2016 = $239,819.00

FY 2017 = $195,330.00

FY 2018 = $201,003.00
History of Investigator:
  • Dan Boneh (Principal Investigator)
    dabo@cs.stanford.edu
Recipient Sponsored Research Office: Stanford University
450 JANE STANFORD WAY
STANFORD
CA  US  94305-2004
(650)723-2300
Sponsor Congressional District: 16
Primary Place of Performance: Stanford University
Gates
Stanford
CA  US  94305-1024
Primary Place of Performance
Congressional District:
16
Unique Entity Identifier (UEI): HJD6G4D6TJY5
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001415DB NSF RESEARCH & RELATED ACTIVIT
01001617DB NSF RESEARCH & RELATED ACTIVIT

01001718DB NSF RESEARCH & RELATED ACTIVIT

01001819DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7433, 7434, 8087, 8251
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

The Center for Encrypted Functionalities (CORE) tackles the deep and far-reaching problem of general-purpose "program obfuscation," which aims to enhance cybersecurity by making an arbitrary computer program unintelligible while preserving its functionality. This can in turn enable a host of applications, such as hiding from potential adversaries the existence of vulnerabilities that may have been introduced through human error in the design/development process, thereby preventing tampering or deterring reverse engineering, or hiding cryptographic keys within software, thereby strengthening encryption and information transfer.

At the heart of the Center's research activities is the development of new and rigorous mathematical techniques to build faster and more secure general-purpose mechanisms enabling such software. In pursuit of this goal, the CORE team tackles many technical questions: Can secure general-purpose mechanisms avoid the inefficiency overhead that arises from Barrington's Theorem? Can the security of these mechanisms be proven to hold against idealized adversaries, or be based on natural non-interactive hardness assumptions? Can these approaches be securely leveraged to protect data from rogue insiders, who must be able to access some data in the clear? Finally, can these mechanisms be used to reduce the level of interaction required to accomplish secure communication and computation tasks? In addition to its direct research program, the Center organizes retreats and workshops to bring together researchers to carry out the Center's mission. The Center also engages in high-impact outreach efforts, such as the development of free Massive Open Online Courses (MOOCs).

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 13)
Alex Ozdemir, Riad Wahby, Barry Whitehat, Dan Boneh ":Scaling Verifiable Computation Using Efficient Set Accumulators." USENIX Security Symposium , 2020
Dan Boneh and Mark Zhandry "Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation" Algorithmica , v.79 , 2017 , p.1233--128
Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai "Threshold Cryptosystems From Threshold Fully Homomorphic Encryption" Proceedings of Crypto 2018 , 2018
Dan Boneh and Sam Kim and David J. Wu "Constrained Keys for Invertible Pseudorandom Functions" Theory of Cryptography {TCC} 2017 , 2017 , p.237--263
Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu "Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs" Proceedings of Eurocrypto 2018 , 2018 , p.222--255
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai "Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs." CRYPTO 2019 , 2019
Dan Boneh, Sam Kim, Hart William Montgomery "Pivate Puncturable PRFs from Standard Lattice Assumptions." EUROCRYPT 2017 , 2017
Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu "Lattice-Based SNARGs and Their Application to More Efficient Obfuscation." EUROCRYPT 2017 , 2017
Jonathan Love and Dan Boneh. "Supersingular Curves With Small Non-integer Endomorphisms" Proceedings of the XIV algorithmic number theory symposium , 2020
Kevin Lewi and Alex J. Malozemoff and Daniel Apon and Brent Carmer and Adam Foltzer and Daniel Wagner and David W. Archer and Dan Boneh and Jonathan Katz and Mariana Raykova "5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs" ACM CCS 2016 , 2016
Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh "Fidelius: Protecting User Secrets from Compromised Browsers." 2019 IEEE Symposium on Security and Privacy , 2019 978-1-5386-4353-2
(Showing: 1 - 10 of 13)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

 

Intellectual Merit: The Center for Encrypted Functionalities embarked on a multi-year multi-institution inquiry into the mathematical foundations of the problem of “encrypting software” -- that is, compiling software code into a form that hides all implementation-specific details of the software. Such a compiler achieves a technical capability called indistinguishability obfuscation (iO). Over the course of the Frontier Award funding period, our work greatly expanded the far-reaching applications of iO, from enabling secure cloud services to non-interactive group key agreement.  In addition, we devised new mathematical algorithms for attacking several proposed iO schemes, including introducing the concept of Annihilation Attacks, and discovering new connections between the Sum of Squares paradigm and attacks on proposed cryptographic pseudorandom generators. We also proposed several new ways to construct secure iO under different assumptions. Most notably, in 2021, our work put iO on a firm mathematical foundation by showing how to realize iO from well-established complexity-theoretic hardness assumptions.  This work was awarded a Best Paper Award at ACM STOC 2021.

 

Broader Impacts:  The research work of the center resulted in over forty publications at top conferences and journals, including several articles for a general audience.  Our researchers gave invited talks at academic conferences, as well as outreach talks to high school and middle school students in many different forums.  The center organized several workshops on advances in program obfuscation, and forged ties with other communities, most notably with the mathematics community to construct a cryptographic multilinear map.  Graduate students who were trained as part of this effort are now tenure-track professors at U.T. Austin, UIUC, UCSB, IIT Delhi (India), and UNC, and one has recently accepted a tenure track position at CMU. 


 

 


Last Modified: 09/20/2021
Modified by: Dan Boneh

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page