33,611 Hits in 5.8 sec

Forecasting Run-Times of Secure Two-Party Computation

Axel Schroepfer, Florian Kerschbaum
2011 2011 Eighth International Conference on Quantitative Evaluation of SysTems  
We contribute a performance model (PM) for forecasting runtimes of secure two-party computations.  ...  Secure computation (SC) are cryptographic protocols that enable multiple parties to perform a joint computation while retaining the privacy of their inputs.  ...  CONCLUSION We introduced a PM for secure two-party computation. We empirically evaluated the accuracy of our PM.  ... 
doi:10.1109/qest.2011.33 dblp:conf/qest/SchropferK11 fatcat:fwfpc765zbgfreq72dgpqrhf74

Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols [article]

Iftach Haitner, Kobbi Nissim, Eran Omri, Ronen Shaltiel, Jad Silbak
2021 arXiv   pre-print
Let π be an efficient two-party protocol that given security parameter κ, both parties output single bits X_κ and Y_κ, respectively.  ...  . ∙ A subsequent work of Haitner et al. uses the above dichotomy to makes progress on a longstanding open question regarding the complexity of fair two-party coin-flipping protocols.  ...  theoretic setup, the honest parties are allowed to see T , and run the forecaster (that runs in polynomial time).  ... 
arXiv:2105.00765v2 fatcat:gbm2mqgpljhtho43y3qwz6kqum

Private collaborative forecasting and benchmarking

Mikhail Atallah, Marina Bykova, Jiangtao Li, Keith Frikken, Mercan Topkara
2004 Proceedings of the 2004 ACM workshop on Privacy in the electronic society - WPES '04  
One of the novel parts of this work, that further distinguishes it from previous work in secure multi-party computation, is that it involves floating point arithmetic, in particular it provides protocols  ...  We consider several forecasting methods, including linear regression and time series techniques such as moving average and exponential smoothing.  ...  The problem of secure forecasting and benchmarking is closely related to secure multi-party computation [23] .  ... 
doi:10.1145/1029179.1029204 dblp:conf/wpes/AtallahBLFT04 fatcat:r3amsekm4ffr7fcfdvdjvay4bq

Automatic Protocol Selection in Secure Two-Party Computations [chapter]

Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
2014 Lecture Notes in Computer Science  
Performance of secure computation is still often an obstacle to its practical adaption. There are different protocols for secure computation that compete for the best performance.  ...  We show that our mixed protocols achieve the best performance on a set of use cases.  ...  Thomas Schneider was supported by the German Federal Ministry of Education and Research (BMBF) within EC SPRIDE and by the Hessian LOEWE excellence initiative within CASED.  ... 
doi:10.1007/978-3-319-07536-5_33 fatcat:4bawobygpjel7dlqprgdx4m554

Simulation of Collision Resistant Secure Sum Protocol [article]

Samiksha Shukla, G. Sadashivappa, Durgesh Kumar Mishra
2014 arXiv   pre-print
secure multi-party computation is widely studied area in computer science. It is touching all most every aspect of human life.  ...  This paper demonstrates theoretical and experimental results of one of the secure multi-party computation protocols proposed by Shukla et al. implemented using visual C++.  ...  In this, if two parties collaborate they can get the data of third party. III.  ... 
arXiv:1411.7756v1 fatcat:w3leoo74dvajfhz6wy3ooplgka

Elastic and Secure Energy Forecasting in Cloud Environments [article]

André Martin, Andrey Britoy, Christof Fetzer
2017 arXiv   pre-print
Although cloud computing offers many advantages with regards to adaption of resources, we witness either a strong resistance or a very slow adoption to those new offerings.  ...  In this white paper, we present our vision and approach for elastic and secure processing of streaming data.  ...  He is also the creator and maintainor of STREAMMINE3G.  ... 
arXiv:1705.06453v1 fatcat:uefe4bz5mferldi53q5wkp4bza

An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds

Yogesh Simmhan, Alok Gautam Kumbhare, Baohua Cao, Viktor Prasanna
2011 2011 IEEE 4th International Conference on Cloud Computing  
Here, we present an analysis of security and privacy issues in a Smart Grids software architecture operating on different Cloud environments, in the form of a taxonomy.  ...  However, the security and privacy concerns inherent in an informationrich Smart Grid environment are further exacerbated by their deployment on Clouds.  ...  The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.  ... 
doi:10.1109/cloud.2011.107 dblp:conf/IEEEcloud/SimmhanKCP11 fatcat:g4nhyvszebcofj5ipddfuu65dy

LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid

Aarti Amod Agarkar, Himanshu Agrawal
2019 Heliyon  
In this paper, we attempt to address the security and privacy issues at the prosumer side of smart grid network. Our work is different from the previous works in two ways.  ...  In recent years, researchers have made tremendous progress to address an important question of how to provide security and privacy in Internet of Things systems.  ...  Security goals Our proposed scheme achieves two major goals: LRSPPP assures security for all parties involved in the communication.  ... 
doi:10.1016/j.heliyon.2019.e01321 pmid:30911691 pmcid:PMC6416661 fatcat:n7g7kavgbbdprikc3j2vm7fr5a

Privacy-Preserving Decision Trees over Vertically Partitioned Data [chapter]

Jaideep Vaidya, Chris Clifton
2005 Lecture Notes in Computer Science  
We introduce a generalized privacy-preserving variant of the ID3 algorithm for vertically partitioned data distributed over two or more parties.  ...  We also provide experimental results, giving a first demonstration of the practical complexity of secure multiparty computation-based data mining.  ...  II Running Time Estimates for Completely Secure Protocol Number of Parties Vector size 2 3 5 100 0.55 0.80 1.30 1000 5.12 7.66 12.72 10000 50.92 76.24 126.87 Number of Parties Dataset  ... 
doi:10.1007/11535706_11 fatcat:ep32t6z3szfkrmp2h4q3ib564e

Privacy-preserving load profile matching for tariff decisions in smart grids

Andreas Unterweger, Fabian Knirsch, Günther Eibl, Dominik Engel
2016 EURASIP Journal on Information Security  
We propose a protocol through which a customer can obtain a better tariff with the help of their smart meter and a third party, based on privacy-preserving load profile matching.  ...  Depending on the practical requirements, two protocol parameters provide a tradeoff between matching accuracy and ciphertext size.  ...  Funding by the Federal State of Salzburg is gratefully acknowledged. The authors would like to thank their partner Salzburg AG for providing real-world load data. 1  ... 
doi:10.1186/s13635-016-0044-1 fatcat:o246ma54tjawpklozfxnse4saa

Privacy-preserving decision trees over vertically partitioned data

Jaideep Vaidya, Chris Clifton, Murat Kantarcioglu, A. Scott Patterson
2008 ACM Transactions on Knowledge Discovery from Data  
We introduce a generalized privacy-preserving variant of the ID3 algorithm for vertically partitioned data distributed over two or more parties.  ...  We also provide experimental results, giving a first demonstration of the practical complexity of secure multiparty computation-based data mining.  ...  II Running Time Estimates for Completely Secure Protocol Number of Parties Vector size 2 3 5 100 0.55 0.80 1.30 1000 5.12 7.66 12.72 10000 50.92 76.24 126.87 Number of Parties Dataset  ... 
doi:10.1145/1409620.1409624 fatcat:rk7e6m3hobfmrd3y7lnzhfenpq

Blockchain Based Smart-Grid Stackelberg Model for Electricity Trading and Price Forecasting Using Reinforcement Learning

Md Mahraj Murshalin Al Moti, Rafsan Shartaj Uddin, Md. Abdul Hai, Tanzim Bin Saleh, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Md. Rafiul Hassan
2022 Applied Sciences  
Thus, the integration of blockchain will not only make the smart grid system more secure, but also price forecasting with reinforcement learning will make it more optimized and scalable.  ...  The use of blockchain will connect the service providers and consumers in a more secure transaction environment.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app12105144 fatcat:5cp3ttfrxzfv3inbbgqihzvzyi

Sustainability of pension schemes

Frédéric Gannon, Florence Legros, Vincent Touzé
2021 Revue de l'OFCE (En ligne)  
These assessments are made under various assumptions about forecast time horizon, social time preference and weighting of social costs associated with increased receipts and/or lower expenditures.  ...  We apply this ABM to the case of the United States Social Security to evaluate the potential adjustments necessary to ensure financial sustainability.  ...  These values are computed with forecast data from the Board of Trustees of the U.S. federal OASDI (2019).  ... 
doi:10.3917/reof.170.0377 fatcat:7ybxtpewp5fzzjyxevnkio3mre

Performance Analysis of Secure and Private Billing Protocols for Smart Metering

2017 Cryptography  
This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware.  ...  Both protocols are designed to operate on top of existing cryptographic secure channel protocols in place on smart meters.  ...  Acknowledgments: The authors would like to thank the School of Electronics and Computer Science for providing a simulating learning environment and required resources to complete this project.  ... 
doi:10.3390/cryptography1030020 fatcat:qv62yygairfcdnljgxpcjvm4jq

Privacy-Preserving Energy-Reading for Smart Meter [chapter]

Gianpiero Costantino, Fabio Martinelli
2015 Lecture Notes in Computer Science  
Two-party Computation, to preserve customers' privacy during energy-readings.  ...  Then, we collected and analysed an energy trace of two months, and we tag customers hourly/daily/monthly habits by observing their consumes.  ...  Work partially supported by project Security Horizon and by the EU project FP7-295354 SESAMO.  ... 
doi:10.1007/978-3-319-19312-0_14 fatcat:2gjqeah2njeg3ockszrjobwl6a
« Previous Showing results 1 — 15 out of 33,611 results