Might Be Evil

Secure Computation

We are developing techniques and tools to enable useful computation to be done while preserving data privacy.

Talk slides: PPTX PDF
Download Android Demo
Download Framework


A simple GCC wrapper that makes it easy to embed secure computation protocols inside regular C programs, which exposing enough about the nature of data-oblivious computation to enable efficient protocols.

Fast Secure Computation Using Garbled Circuits
Framework and library for buiding efficient and scalable privacy-preserving applications using garbled circuits. [Download]

NetList: Efficient Circuit Structures
Circuit structures for efficiently implementing data structures in static circuits. [Download]

Garbled Circuits Intermediate Language

Secure Computation on Smartphones
Using our fast garbled circuits framework to enable privacy-preserving applications on Android devices. [Demo]
(Yan Huang, Peter Chapman, David Evans)
Efficient Privacy-Preserving Biometric Identification
Using garbled circuits and homomorphic encryption to perform private biometric identification.
(Yan Huang, Lior Malka, David Evans, Jonathan Katz)
Private Editing in the Cloud
A Firefox extension for using Google Docs without exposing your document's contents.
(Yan Huang, David Evans)


Samee Zahur, Mike Rosulek, and David Evans. Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates. In EuroCrypt 2015. Sofia, Bulgaria. 26-30 April 2015. [PDF, 28 pages] [Code]

Yan Huang, Jonathan Katz, and David Evans. Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose. In 33rd International Cryptology Conference (CRYPTO 2013), Santa Barbara, CA, 18-22 August 2013. [PDF, 16 pages]

Samee Zahur and David Evans. Circuit Structures for Improving Efficiency of Security and Privacy Tools. In 34th IEEE Symposium on Security and Privacy ("Oakland" 2013), San Francisco, CA. May 19-22, 2013. [PDF, 15 pages]

Yan Huang, Jonathan Katz, and David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. In 33rd IEEE Symposium on Security and Privacy ("Oakland" 2012), San Francisco, CA. 20-23 May 2012. [PDF, 13 pages]

Yan Huang, David Evans, and Jonathan Katz. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?. In 19th Network and Distributed Security Symposium (NDSS 2012), San Diego, CA. 5-8 February 2012. [PDF, 15 pages]

Yan Huang, Chih-hao Shen, David Evans, Jonathan Katz, and abhi shelat. Efficient Secure Computation with Garbled Circuits. Invited paper for Seventh International Conference on Information Systems Security (ICISS 2011). 15-19 December 2011, Jadavpur University, Kolkata, India. [PDF, 21 pages]

Yikan Chen and David Evans. Auditing Information Leakage for Distance Metrics. In Third IEEE Conference on Privacy, Security, Risk and Trust, Boston, MA, 9-11 October 2011. [PDF, 10 pages]

Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster Secure Two-Party Computation Using Garbled Circuits, 20th USENIX Security Symposium, San Francisco, CA. 8-12 August 2011. [PDF, 16 pages]

Yan Huang, Peter Chapman, and David Evans. Privacy-Preserving Applications on Smartphones. 6th USENIX Workshop on Hot Topics in Security (HotSec 2011), San Francisco. 9 August 2011. Paper: [PDF, 6 pages]. Talk slides: [PDF] (Peter Chapman).

Yan Huang and David Evans. Private Editing Using Untrusted Cloud Services. Second International Workshop on Security and Privacy in Cloud Computing. Minneapolis, Minnesota. 24 June 2011. [PDF, 10 pages]

Yan Huang, Peter Chapman, and David Evans. Secure Computation on Mobile Devices. Poster at IEEE Symposium on Security and Privacy. Berkeley, CA. 22-25 May 2011. [Proposal: PDF, 2 pages] [Poster: PDF, 2MB]

Yan Huang, Lior Malka, David Evans, and Jonathan Katz. Efficient Privacy-Preserving Biometric Identification, in 18th Network and Distributed System Security Symposium (NDSS 2011). San Diego, CA. 6-9 February 2011. [PDF, 14 pages]


Project Initiator

Yan Huang (now Assistant Professor at Indiana University, completed PhD at University of Virginia in 2012)


Samee Zahur (PhD Student)
Natnatee ("Ko") Dokmai (BACS 2015, starting Indiana University PhD program in Fall 2015)
Samuel Havron (BSCS 2018)


David Evans (University of Virginia)


Peter Chapman (University of Virginia, BACS 2012; CRA Runner-Up; now at CMU)
Jiamin Chen (University of Virginia, BACS 2012)
Yikan Chen (University of Virginia, graduate Student)
Brittany Harris (University of Virginia, BACS 2013)
Sang Koo (University of Virginia, BSCS/BSCpE 2013)
Lior Malka (University of Maryland post-doc, now at Intel)
Guanmei Liang (University of Virginia, BACS Student)
Billy Melicher (University of Virginia, BACS 2013, now at CMU)
Shengxuan (Jerry) Ye (University of Virginia, BSCS 2012; now at CalTech)


This work has been supported by a a MURI award from the Air Force Office of Scientific Research (Defending Against Hostile Operating Systems, FA9550-09-1-0539), a grant from the National Science Foundation (TC: Large: Collaborative Research: Practical Secure Two-Party Computation: Techniques, Tools, and Applications), and a Google Research Award.