Abstract
Protecting users’ privacy in digital systems becomes more complex and challenging over time, as the amount of stored and exchanged data grows steadily and systems become increasingly involved and connected. Two techniques that try to approach this issue are the privacy-preserving protocols secure multi-party computation (MPC) and private information retrieval (PIR), which aim to enable practical computation while simultaneously keeping sensitive data private. In the dissertation [Daniel Demmler. “Towards Practical Privacy-Preserving Protocols”. Diss. Darmstadt: Technische Universität, 2018. url: http://tuprints.ulb.tu-darmstadt.de/8605/], summarized in this article, we present results showing how real-world applications can be executed in a privacy-preserving way. This is not only desired by users of such applications, but since 2018 also based on a strong legal foundation with the GDPR in the European Union, that enforces privacy protection of user data by design.
About the author

Dr.-Ing. Daniel Demmler studied Information Systems Engineering (B. Sc./M. Sc.) at TU Darmstadt, where he received his Ph. D. in Computer Science (summa cum laude) in 2018 under the supervision of Prof. Dr. Thomas Schneider. For his dissertation he was awarded an award for outstandic scientific achievements by ‘Freunde der TU Darmstadt’ and the CAST/GI Doctoral Dissertation Award in IT Security 2021. In 2019, he started working as a postdoctoral researcher in the Security and Privacy group lead by Prof. Dr. Hannes Federrath at University of Hamburg.
References
1. Gilad Asharov et al. “Privacy-Preserving Interdomain Routing at Internet Scale”. In: Proceedings on Privacy Enhancing Technologies (PoPETs) 2017.3 (2017), pp. 143–163.10.1515/popets-2017-0033Search in Google Scholar
2. Fabian Boemer et al. “MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference”. In: 15. International Conference on Availability, Reliability and Security (ARES’20). Virtual Event: ACM, 2020, 14:1–14:10.Search in Google Scholar
3. Lennart Braun et al. “MOTION – A Framework for Mixed-Protocol Multi-Party Computation”. In: ACM Transactions on Privacy and Security (TOPS) (2021).10.1145/3490390Search in Google Scholar
4. Niklas Büscher et al. “HyCC: Compilation of Hybrid Protocols for Practical Secure Computation”. In: 25. ACM Conference on Computer and Communications Security (CCS’18). ACM, 2018, pp. 847–861.Search in Google Scholar
5. Marco Chiesa et al. “SIXPACK: Securing Internet eXchange Points Against Curious onlooKers”. In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT’17). ACM, 2017, pp. 120–133.10.1145/3143361.3143362Search in Google Scholar
6. Benny Chor et al. “Private Information Retrieval”. In: Foundations of Computer Science (FOCS’95). IEEE, 1995, pp. 41–50.Search in Google Scholar
7. Daniel Demmler. “Towards Practical Privacy-Preserving Protocols”. Diss. Darmstadt: Technische Universität, 2018. url: http://tuprints.ulb.tu-darmstadt.de/8605/.Search in Google Scholar
8. Daniel Demmler, Amir Herzberg and Thomas Schneider. “RAID-PIR: Practical Multi-Server PIR”. In: 6. ACM Cloud Computing Security Workshop (CCSW’14). ACM, 2014, pp. 45–56.Search in Google Scholar
9. Daniel Demmler, Marco Holz and Thomas Schneider. “OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks”. In: 15. International Conference on Applied Cryptography and Network Security (ACNS’17). Bd. 10355. LNCS. Springer, 2017, pp. 599–619.10.1007/978-3-319-61204-1_30Search in Google Scholar
10. Daniel Demmler, Thomas Schneider and Michael Zohner. “ABY – A Framework for Efficient Mixed-Protocol Secure Two-Party Computation”. In: 22. Annual Network and Distributed System Security Symposium (NDSS’15). Internet Society, 2015.10.14722/ndss.2015.23113Search in Google Scholar
11. Daniel Demmler et al. “Automated Synthesis of Optimized Circuits for Secure Computation”. In: 22. ACM Conference on Computer and Communications Security (CCS’15). ACM, 2015, pp. 1504–1517.10.1145/2810103.2813678Search in Google Scholar
12. Daniel Demmler et al. “PIR-PSI: Scaling Private Contact Discovery”. In: Proceedings on Privacy Enhancing Technologies (PoPETs) 2018.4 (2018).10.1515/popets-2018-0037Search in Google Scholar
13. Daniel Demmler et al. “Privacy-Preserving Whole-Genome Variant Queries”. In: 16. International Conference on Cryptology And Network Security (CANS’17). Bd. 11261. LNCS. Springer, 2017, pp. 71–92.10.1007/978-3-030-02641-7_4Search in Google Scholar
14. Oded Goldreich, Silvio Micali and Avi Wigderson. “How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority”. In: STOC’87. ACM, 1987, pp. 218–229.10.1145/28395.28420Search in Google Scholar
15. Andrew Chi-Chih Yao. “How to Generate and Exchange Secrets”. In: FOCS’86. IEEE, 1986, pp. 162–167.Search in Google Scholar
© 2022 Walter de Gruyter GmbH, Berlin/Boston