81,045 Hits in 3.7 sec

CryptoNN: Training Neural Networks over Encrypted Data [article]

Runhua Xu, James B.D. Joshi, Chao Li
2019 arXiv   pre-print
We also construct a functional encryption scheme for basic arithmetic computation to support the requirement of the proposed CryptoNN framework.  ...  To tackle the above issue, we propose a CryptoNN framework that supports training a neural network model over encrypted data by using the emerging functional encryption scheme instead of SMC or HE.  ...  We also construct a functional encryption scheme for basic arithmetic computation to support the requirement of the proposed CryptoNN framework.  ... 
arXiv:1904.07303v2 fatcat:4istxfizvbelbhkuhjkpbevuaa

Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions

Ananth Raghunathan, Gil Segev, Salil Vadhan
2018 Journal of Cryptology  
Nevertheless, we show that some of the ideas underlying their approach can still be utilized to construct a scheme that is secure according to our notion of security.  ...  In this paper we use such hash functions in a somewhat similar way as part of our construction of a CCA-secure deterministic public-key encryption scheme.  ...  deterministic public-key encryption scheme can be proven secure for all (T, k)sources using a black-box reduction to a "falsifiable" hardness assumption.  ... 
doi:10.1007/s00145-018-9287-y fatcat:4cdxjk5j25gc7nozby55mjyc54

Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud

Miguel Morales-Sandoval, Melissa Hinojosa Cabello, Heidy Marisol Marin-Castro, Jose Luis Gonzalez Compean
2020 IEEE Access  
As main distinctive, we propose a security approach for storage, sharing and retrieval of encrypted data in the cloud fully constructed on the basis of attribute-based encryption (ABE) thus enabling access  ...  Compared to related works, our approach considers efficient encryption at three different levels: ) bulk encryption of data outsourced to the cloud, ) keys management for access control over encrypted  ...  ENC refers to the time needed to encrypt a single keyword when the function CP-ABSE.encInd(PK, , A ) is invoked. The word can be any single or compound word in a data set .  ... 
doi:10.1109/access.2020.3023893 fatcat:h4smmh2iqja4veulqai6ujwzhq

Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions [chapter]

Ananth Raghunathan, Gil Segev, Salil Vadhan
2013 Lecture Notes in Computer Science  
Within our framework we present both constructions in the randomoracle model based on any public-key encryption scheme, and constructions in the standard model based on lossy trapdoor functions (thus,  ...  Previously known constructions heavily relied on the independence between the plaintext Due to space limitations the reader is referred to the full version [19] . A. Raghunathan, G. Segev, and S.  ...  Nevertheless, we show that some of the ideas underlying their approach can still be utilized to construct a scheme that is secure according to our notion of security.  ... 
doi:10.1007/978-3-642-38348-9_6 fatcat:66aq2aslozfcnd55dqwoqvo77q

Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions [article]

Runhua Xu, James Joshi
2020 arXiv   pre-print
This paper revisits the secure computation problem using emerging and promising functional encryption techniques and presents a comprehensive study.  ...  Then, we elaborate on the unique characteristics and challenges of emerging functional encryption based secure computation approaches and outline several research directions.  ...  Acknowledgment This work was performed while James Joshi was serving as a Program Director at NSF; and the work represents the authors' views and not that of NSF's.  ... 
arXiv:2011.06191v2 fatcat:t4iamavzovcrzblxtbkqedk4yi

Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data

M. Chuah, W. Hu
2011 2011 31st International Conference on Distributed Computing Systems Workshops  
Such sensitive data needs to be encrypted before it is outsourced to the cloud. Typically, the cloud servers also need to support a keyword search feature for these encrypted files.  ...  Thus, fuzzy keyword search is a useful feature to have. Recently, some researchers propose using wildcard based approach to provide fuzzy keyword search.  ...  ACKNOWLEDGMENT We would like to thank Cong Wang for sharing his code for the fuzzy keyword search and Z. Zhang [12] for sharing his bed-tree code. We also wish to thank K.  ... 
doi:10.1109/icdcsw.2011.11 dblp:conf/icdcsw/ChuahH11 fatcat:ho35f2qz7bccnhye6xejsao6si

Methodology for designing cryptographic systems with advanced functionality based on a modular approach

Goichiro HANAOKA, Satsuya OHATA, Takahiro MATSUDA, Koji NUIDA, Nuttapong ATTRAPADUNG
2014 Synthesiology English edition  
We propose a new methodology for overcoming this barrier. We take proxy re-encryption as an example, and discuss how the barrier to user understanding is reduced by our proposed methodology.  ...  In this article, we point out that in general, newly-designed highly functional cryptographic schemes have significantly complicated structures that hinder user understanding.  ...  contrasting approach to this problem.  ... 
doi:10.5571/syntheng.7.92 fatcat:4shho5nyy5g3fidnjdt5hopxxq

Secure Obfuscation for Encrypted Signatures [chapter]

Satoshi Hada
2010 Lecture Notes in Computer Science  
We propose a special ES functionality, which is the sequential composition of Waters's signature scheme [33] and the linear encryption scheme proposed by Boneh, Boyen, and Shacham [5], and construct a  ...  In TCC'07, Hohenberger et al. proposed an obfuscator for a re-encryption functionality, which takes a ciphertext for a message encrypted under Alice's public key and transforms it into a ciphertext for  ...  In particular, I would like to thank an Eurocrypt reviewer for suggesting the use of the Paillier encryption scheme as mentioned in Section 1.1, another Eurocrypt reviewer for suggesting the ES functionality  ... 
doi:10.1007/978-3-642-13190-5_5 fatcat:f3eekwswszes3dwrki3y53nowy

Secure Retrieval of Sub-Trees over Encrypted Data Stored in Cloud Storage for Prediction

P. Shanthi, A. Umamakeswari
2016 Indian Journal of Science and Technology  
In our approach the dataset is partitioned based on classification and encrypted before uploading to cloud. Retrieval query returns a subtree from the partitions only when the secret key is matched.  ...  Application/Improvements: This approach can be applied to classify patient electronic health records in cloud storage and query the encrypted data in order to make decisions.  ...  A new public key encryption system presented in realized to be suitable for cloud storage is Functional encryption. Identity based encryption uses public key and the message as input for encryption.  ... 
doi:10.17485/ijst/2016/v9i48/108028 fatcat:gf32u6mcgjdebnr46ic44tdneq

Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption [chapter]

Dan Boneh, Ananth Raghunathan, Gil Segev
2013 Lecture Notes in Computer Science  
Within our framework we develop an approach for designing functionprivate identity-based encryption schemes, leading to constructions that are based on standard assumptions in bilinear groups (DBDH, DLIN  ...  We put forward a new notion, function privacy, in identitybased encryption and, more generally, in functional encryption.  ...  Nevertheless, our notion is inspired by that of [8] , and we refer the reader to Section 2 for an elaborate discussion (in particular, we discuss a somewhat natural DPKE-based approach for designing function-private  ... 
doi:10.1007/978-3-642-40084-1_26 fatcat:rcr2f6ra4jh5nppzxvvco3sgme

Chosen-Ciphertext Security via Correlated Products [chapter]

Alon Rosen, Gil Segev
2009 Lecture Notes in Computer Science  
We show that any collection of injective trapdoor functions that is secure under a very natural correlated product can be used to construct a CCA-secure encryption scheme.  ...  The construction is simple, black-box, and admits a direct proof of security.  ...  In particular, we thank Oded for suggesting the relaxation that led to the more generalized scheme.  ... 
doi:10.1007/978-3-642-00457-5_25 fatcat:fxrw6r7yx5ewhkjelqupfnjt6q

On the Correctness of an Approach against Side-Channel Attacks [chapter]

Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
2009 Lecture Notes in Computer Science  
Li and Gu [ProvSec'07] proposed an approach against side-channel attacks, which states that a symmetric encryption scheme is IND-secure in side-channel model, if it is IND-secure in black-box model and  ...  We analyze notions of security against key recovery attacks and security against distinguishing attacks, and then construct a scheme which is WKR-SCA-secure and IND-secure, but not IND-SCA-secure in the  ...  Then we construct a concrete scheme to show that the approach against side-channel attacks proposed in [9] is flawed.  ... 
doi:10.1007/978-3-642-00843-6_29 fatcat:c73okektfzbztik3gz4f23twzm

Evaluating encrypted Boolean functions on encrypted bits: secure decision-making on the black side

Rajesh Krishnan, Ravi Sundaram, Raja Suresh
2013 Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013  
We present a novel approach for secure evaluation of encrypted Boolean functions on encrypted bits.  ...  the need for an expensive Universal Circuit to hide the function.  ...  We have developed a novel algorithm for securely evaluating an encrypted Boolean function on encrypted bits.  ... 
doi:10.1117/12.2018574 fatcat:d67jee24wjbc7olj2p3rfro6pm

Enhanced Chosen-Ciphertext Security and Applications [chapter]

Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill
2014 Lecture Notes in Computer Science  
We provide constructions of ECCA-secure encryption from adaptive trapdoor functions as defined by Kiltz et al.  ...  open question of Kiltz et al. (2) We show that ECCA-secure encryption can be used to securely realize an approach to public-key encryption with non-interactive opening (PKENO) originally suggested by  ...  Resurrecting a Simple Approach. We show that ECCA-secure encryption can be used to securely realize (for the first time) a simple approach to PKENO originally suggested by [16] .  ... 
doi:10.1007/978-3-642-54631-0_19 fatcat:rn24bxdhjvfibjmb54btwnpk4u

On Black-Box Reductions between Predicate Encryption Schemes [chapter]

Vipul Goyal, Virendra Kumar, Satya Lokam, Mohammad Mahmoody
2012 Lecture Notes in Computer Science  
We prove that there is no black-box construction of a threshold predicate encryption system from identity-based encryption.  ...  Our result signifies nontrivial progress in a line of research suggested by Boneh, Sahai and Waters (TCC '11), where they proposed a study of the relative power of predicate encryption for different functionalities  ...  We thank Brent Waters for suggesting to us the problem of separating predicate encryption from IBE and for useful collaborations in  ... 
doi:10.1007/978-3-642-28914-9_25 fatcat:dssbcbxuyvhe3pvytw677q3r5u
« Previous Showing results 1 — 15 out of 81,045 results