Filters








5,723 Hits in 5.4 sec

Blind Polynomial Evaluation and Data Trading [article]

Yi Liu, Qi Wang, Siu-Ming Yiu
2021 IACR Cryptology ePrint Archive  
We introduce a new cryptographic notion called blind polynomial evaluation and instantiate it with an explicit protocol.  ...  Data trading is an emerging business, in which data sellers provide buyers with, for example, their private datasets and get paid from buyers.  ...  We thank the reviewers for their detailed and helpful comments. Y. Liu and Q.  ... 
dblp:journals/iacr/LiuWY21 fatcat:msgmfyazorfqro4m2xiawme564

Optimal Step-Size Constant Modulus Algorithm

V. Zarzoso, P. Comon
2008 IEEE Transactions on Communications  
Index Terms-Adaption coefficient, blind equalization, CMA, exact line search, SIMO and SISO channels.  ...  The resulting optimal step-size CMA (OS-CMA) is compared with other CM-based iterative techniques in terms of performance-versus-complexity trade-off.  ...  The continuation of this work should also include the incorporation of the optimum stepsize scheme in alternative blind and semi-blind criteria for equalization and beamforming.  ... 
doi:10.1109/tcomm.2008.050484 fatcat:tabe7yknzjd3ri2lycynyco2cy

Blind Faith: Privacy-Preserving Machine Learning using Function Approximation [article]

Tanveer Khan, Alexandros Bakas, Antonis Michalas
2021 arXiv   pre-print
Blind Faith preserves users' privacy since it can perform high accuracy predictions by performing computations directly on encrypted data.  ...  To this end, we propose Blind Faith -- a machine learning model in which the training phase occurs in plaintext data, but the classification of the users' inputs is performed on homomorphically encrypted  ...  With this work we hope to pave the way towards building digitally blind prediction/evaluation systems that will, by design, eliminate several proxies such as geography, gender, race, etc. and eventually  ... 
arXiv:2107.14338v1 fatcat:aceanmkp4vd53egwgr6q34nyqi

Blockchain-based Privacy-preserving Fair Data Trading Protocol [article]

Yao Jiang Galteland, Shuang Wu
2021 IACR Cryptology ePrint Archive  
Fair data trading online is a challenging task when there is mistrust between data providers and data collectors.  ...  We introduce new security notions for privacypreserving blockchain-based fair data trading protocol and prove our protocol is secure under our new notions.  ...  Trading Protocol We construct a concrete instantiation of a fair data trading protocol using a pairing based PRE scheme PRE (see Section 6.1), blind algorithm Blind and re-key verification algorithm RkVerify  ... 
dblp:journals/iacr/GaltelandW21 fatcat:7hoyqomclbgdzeblblqlncxhxa

Drainage Prediction For Dam Using Fuzzy Support Vector Regression

S. Wiriyarattanakun, A. Ruengsiriwatanakun, S. Noimanee
2011 Zenodo  
., for the data set use in this work. We also would like to thank Mr.  ...  /4893 TABLE I DATA I SETUP TO FSVR FOR DRAINAGE ESTIMATING Polynomial regression model on the blind test data set is shownTable 3and figure 3 and 4.  ...  And dataset 2 of Polynomial regression. That is minimum MAE for test to blind test dataset.  ... 
doi:10.5281/zenodo.1060050 fatcat:zimhirik4jdudkfehaabvbrkke

Efficient Cryptographic Primitives for Private Data Mining

Mark Shaneck, Yongdae Kim
2010 2010 43rd Hawaii International Conference on System Sciences  
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g.  ...  To this end, we address the problem of efficiency by investigating trade-offs that can be made in the trust model.  ...  Other dot product protocols have been proposed that make use of random matrices to blind the data [29, 45] .  ... 
doi:10.1109/hicss.2010.172 dblp:conf/hicss/ShaneckK10 fatcat:vej7fm4e5zg5pgk4dq2lulakti

Table of contents

2021 IEEE Journal on Selected Areas in Information Theory  
Wang, and S. A. Jafar 306 Interactive Verifiable Polynomial Evaluation . . . . . . . . . . . . . . . . . S. Sahraei, M. A. Maddah-Ali, and A. S.  ...  Data, S. Diggavi, P. Kairouz, and A. T.  ... 
doi:10.1109/jsait.2021.3053376 fatcat:hpecwnk5zjamfjhqhfz4mptmne

Area-driven partial reconfiguration for SEU mitigation on SRAM-based FPGAs

Michail Vavouras, Christos-Savvas Bouganis
2016 2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig)  
Our solution achieves 22% higher availability on average with 13% less data transfers from a Double Data Rate Type 3 (DDR3) memory when compared with a blind scrubbing approach for a second order polynomial  ...  evaluation function.  ...  The area-driven scrubbing outperforms blind scrubbing on the unavailability vs data transfer from DDR3 trade-off.  ... 
doi:10.1109/reconfig.2016.7857154 dblp:conf/reconfig/VavourasB16 fatcat:qz7chaxodjaxxag4goosntu55a

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee

Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou
2015 2015 IEEE Conference on Computer Communications (INFOCOM)  
With the growing awareness of data privacy, more and more cloud users choose to encrypt their sensitive data before outsourcing them to the cloud.  ...  Search over encrypted data is therefore a critical function facilitating efficient cloud data access given the high data volume that each user has to handle nowadays.  ...  Although 768-bit RSA module has been broken [28] , in our experiments, we report the computation costs for both 512-bit and 1024-bit keys to demonstrate the trade-off between the security and the efficiency  ... 
doi:10.1109/infocom.2015.7218594 dblp:conf/infocom/WangSLH15 fatcat:y4rmdua4jvephlchhdxnydr27e

Storing Shared Data on the Cloud via Security-Mediator

Boyang Wang, Sherman S.M. Chow, Ming Li, Hui Li
2013 2013 IEEE 33rd International Conference on Distributed Computing Systems  
Due to the existence of security concerns in the cloud, both owners and users are suggested to verify the integrity of cloud data with Provable Data Possession (PDP) before further utilization of data.  ...  In this paper, we propose a simple, efficient, and publiclyverifiable approach to ensure cloud data integrity without sacrificing the anonymity of data owners nor requiring significant overhead.  ...  The trade-off involved will be discussed later in Section IV-C. B. Scheme Details Our scheme includes seven algorithms, including Setup, Blind, Sign, Unblind, Challenge, Response, and Verify.  ... 
doi:10.1109/icdcs.2013.60 dblp:conf/icdcs/WangCLL13 fatcat:n2xkhbxlzncgpnqrj2ho3wwhpe

Efficient fine-grained data access control in wireless sensor networks

Qian Wang, Kui Ren, Cong Wang, Wenjing Lou
2009 MILCOM 2009 - 2009 IEEE Military Communications Conference  
To improve the security level, recently, two perturbed polynomial-based schemes are being proposed: blinding polynomial shares using random numbers [13] and blinding polynomial shares using random polynomials  ...  Thus, the computational cost is d polynomial evaluations with polynomial degree of t on both sensor and user side.  ... 
doi:10.1109/milcom.2009.5379991 fatcat:ecdstvtdkbbrzd3sf3rrm4n77a

VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets [chapter]

Aydin Abadi, Sotirios Terzis, Changyu Dong
2017 Lecture Notes in Computer Science  
Our first protocol, O-PSI, satisfies these properties by using additive homomorphic encryption and point-value polynomial representation of a set.  ...  Our second protocol, EO-PSI, is mainly based on a hash table and point-value polynomial representation and it does not require public key encryption; meanwhile, it retains all the desirable properties  ...  This work was partially supported by an EPSRC Doctoral Training Grant studentship and an EPSRC research grant (EP/M013561/2).  ... 
doi:10.1007/978-3-662-54970-4_9 fatcat:tpljxppuh5gsbk5r43dmnnicba

Efficient Delegated Private Set Intersection on Outsourced Private Datasets

Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong
2017 IEEE Transactions on Dependable and Secure Computing  
Our first protocol, O-PSI, satisfies these properties by using additive homomorphic encryption and point-value polynomial representation of a set.  ...  Our second protocol, EO-PSI, is mainly based on a hash table and point-value polynomial representation and it does not require public key encryption; meanwhile, it retains all the desirable properties  ...  This work was partially supported by an EPSRC Doctoral Training Grant studentship and an EPSRC research grant (EP/M013561/2).  ... 
doi:10.1109/tdsc.2017.2708710 fatcat:ydtpezw3r5eu7bc7z427spcou4

Privacy and Integrity Preserving Computations with CRISP [article]

Sylvain Chatel, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Jean-Pierre Hubaux
2021 arXiv   pre-print
In this work, we present a generic solution to the trade-off between privacy, integrity, and utility, by achieving authenticity verification of data that has been encrypted for offloading to service providers  ...  We evaluate our solution on different use cases such as smart-metering, disease susceptibility, and location-based activity tracking, thus showing its versatility.  ...  We are also grateful to Henry Corrigan-Gibbs, Wouter Lueks, and the members of the EPFL Laboratory for Data Security for their helpful comments and suggestions.  ... 
arXiv:2007.04025v4 fatcat:oyies26u2jhxtf4kywovec4ssm

Enhancing energy efficiency in supermarket refrigeration systems through a robust energy performance indicator

Salvador Acha, Yujia Du, Nilay Shah
2016 International journal of refrigeration  
Lastly, other initiatives such as cabinet night blinds and suction pressure optimisation achieved 10% and 7% energy reduction respectively.  ...  Furthermore, energy impact from introducing natural refrigerants is examined using empirical data from an UK supermarket chain.  ...  Polynomial regression was applied between daily cooling degree days (CDD) and daily total refrigeration energy use.  ... 
doi:10.1016/j.ijrefrig.2015.12.003 fatcat:ojrui2p7gbhdxigvibi4ixuddy
« Previous Showing results 1 — 15 out of 5,723 results