Filters








15,377 Hits in 3.0 sec

Order-Revealing Encryption and the Hardness of Private Learning [article]

Mark Bun, Mark Zhandry
2015 arXiv   pre-print
We show how to use order-revealing encryption to separate computationally efficient PAC learning from efficient (ϵ, δ)-differentially private PAC learning.  ...  An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts.  ...  We now give the proof of Theorem 5. 4. Proof. We construct an example reidentification scheme for ValidSig as follows.  ... 
arXiv:1505.00388v1 fatcat:vkmd2aw43vhpxd7yccqgtnsqui

Order-Revealing Encryption and the Hardness of Private Learning [chapter]

Mark Bun, Mark Zhandry
2015 Lecture Notes in Computer Science  
We show how to use order-revealing encryption to separate computationally efficient PAC learning from efficient (ε, δ)-differentially private PAC learning.  ...  An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts.  ...  We now give the proof of Theorem 5. 4. Proof. We construct an example reidentification scheme for ValidSig as follows.  ... 
doi:10.1007/978-3-662-49096-9_8 fatcat:k7szmsnrjjduzdleo5ljo6abrq

Towards Secure and Practical Location Privacy through Private Equality Testing [chapter]

Emmanouil Magkos, Panayiotis Kotzanikolaou, Marios Magioladitis, Spyros Sioutas, Vassilios S. Verykios
2014 Lecture Notes in Computer Science  
Discrete Logarithm Problem (DLP) is hard in the finite cyclic group generated by a user's private input; in addition, if the two inputs are not equal, neither party will learn anything more than this  ...  On the other hand, if Alice and Bob are not in proximity, none of them will learn anything else other than this fact.  ...  The authors would like to thank Constantinos Patsakis for indicating an attack in an early version of the PET protocol.  ... 
doi:10.1007/978-3-319-11257-2_24 fatcat:eyifeqlxjfchpp23pibe346jvq

A SAT-based Public Key Cryptography Scheme [article]

Sebastian E. Schmittner
2015 arXiv   pre-print
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT formula satisfied by the private key.  ...  Probabilistic encryption generates functions implied to be false by the public key XOR the message bits. A zero-knowledge proof is used to provide signatures.  ...  She rejects any faulty message, regardless of the private key, hence not revealing any information. ALGORITHMS G ENERATION of key pairs and the encryption algorithm are discussed in this section.  ... 
arXiv:1507.08094v3 fatcat:q2tzqxsv3rfwjeliwgpe5lxqo4

Honest-Verifier Private Disjointness Testing Without Random Oracles [chapter]

Susan Hohenberger, Stephen A. Weis
2006 Lecture Notes in Computer Science  
THE FNP PROTOCOL: If any αi = 0, restart the protocol. 4. V encrypts the coefficients of f (x) with a homomorphic encryption scheme and sends the encryptions ci = E(αi) to P. 5.  ...  An overview of the Freedman, Nissim, and Pinkas (FNP) protocol Naor and Pinkas [17] , may also be applied to private set operations.  ...  The necessary complexity-theoretic assumptions are that it is hard to for a prover to decide whether group elements belong to a particular subgroup of unknown order, and that it is hard to compute elements  ... 
doi:10.1007/11957454_16 fatcat:hooc2qnkpzduxh3hzjtqfxg7fu

Collusion-resistant outsourcing of private set intersection

Florian Kerschbaum
2012 Proceedings of the 27th Annual ACM Symposium on Applied Computing - SAC '12  
Private set intersection enables to compute the set intersection without revealing the non-matching items.  ...  The service provider either learns the intersection or remains completely obvious to both input and output -including the intersection's size.  ...  The DHS has an interest in not revealing the members of this list and for privacy reasons it would be beneficial to not reveal passengers not contained in the list.  ... 
doi:10.1145/2245276.2232008 dblp:conf/sac/Kerschbaum12 fatcat:u2ioyd4darbxjbc7ywbydbhsva

Conditional Privacy Using Re-encryption

Suriadi Suriadi, Ernest Foo, Jason Smith
2008 2008 IFIP International Conference on Network and Parallel Computing  
This paper proposes, for the first time, the use of re-encryption scheme to improve users privacy in a privacy-enhancing system.  ...  Next, this re-encryption key distribution protocol is combined with an existing private credential system to provide a protocol for conditional revocation of private information.  ...  Finally, the private key secrecy property states that the value of a 1 is never revealed.  ... 
doi:10.1109/npc.2008.37 dblp:conf/npc/SuriadiFS08 fatcat:wpjqpipzorhfxnxdwoon226gai

Fast Computation on Encrypted Polynomials and Applications [chapter]

Payman Mohassel
2011 Lecture Notes in Computer Science  
We show that some modifications to the key generation setups and working with variants of the original hardness assumptions one can adapt the existing homomorphic encryption schemes to work in our algorithms  ...  The above set of algorithms on encrypted polynomials are useful building blocks for the design of secure computation protocols.  ...  A receiver holding an input u ∈ R wants to learn f (u) without learning anything else about the polynomial f and without revealing to the sender any information about u.  ... 
doi:10.1007/978-3-642-25513-7_17 fatcat:oucrlkclurhmpccntaktlikc6q

Logistic Regression on Homomorphic Encrypted Data at Scale

Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park
2019 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Machine learning on (homomorphic) encrypted data is a cryptographic method for analyzing private and/or sensitive data while keeping privacy.  ...  Considering the inefficiency of homomorphic encryption, our result is encouraging and demonstrates the practical feasibility of the logistic regression training on large encrypted data, for the first time  ...  Related Work There have been several studies on performing a machine learning without revealing private information.  ... 
doi:10.1609/aaai.v33i01.33019466 fatcat:lodh5a3h2nh4pd4ejaavx3a54u

Towards Industrial Private AI: A two-tier framework for data and model security [article]

Sunder Ali Khowaja, Kapal Dev, Nawab Muhammad Faseeh Qureshi, Parus Khuwaja, Luca Foschini
2021 arXiv   pre-print
In this regard, we propose a federated learning and encryption-based private (FLEP) AI framework that provides two-tier security for data and model parameters in an IIoT environment.  ...  Experimental results show that the proposed method achieves better encryption quality at the expense of slightly increased execution time.  ...  ACKNOWLEDGMENT The authors would like to thank all the contributors who shared data with us for this analysis.  ... 
arXiv:2107.12806v1 fatcat:5q7eqctm7jd5tk3ouhkka4yvqm

Differentially Private Secure Multi-Party Computation for Federated Learning in Financial Applications [article]

David Byrd, Antigoni Polychroniadou
2020 arXiv   pre-print
This adds uncertainty to any attempt to reveal private client data, but also reduces the accuracy of the shared model, limiting the useful scale of privacy-preserving noise.  ...  data set, and evaluate it using an open-source simulation platform which we have adapted for the development of federated learning systems.  ...  Morgan"), and is not a product of the Research Department of J.P. Morgan. J.P.  ... 
arXiv:2010.05867v1 fatcat:gtrmrbyeqbcltmcq2viruifezy

Secure anonymous database search

Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin
2009 Proceedings of the 2009 ACM workshop on Cloud computing security - CCSW '09  
In order to achieve this in an efficient manner, we make use of Bloom filters [5], definitions of security for deterministic encryption [22] that we adapt and instantiate in the private key setting and  ...  There exist many large collections of private data that must be protected on behalf of the entities that hold them or the clients they serve.  ...  controlled data sharing without learning any private information of the participants.  ... 
doi:10.1145/1655008.1655025 dblp:conf/ccs/RaykovaVBM09 fatcat:zzmm3beyybdhda2y56lezvwaly

Federated Learning without Revealing the Decision Boundaries [article]

Roozbeh Yousefzadeh
2021 arXiv   pre-print
As a remedy, we propose a method to encrypt the images, and have a decryption module hidden inside the model.  ...  The entity in charge of federated learning will only have access to a set of complex-valued coefficients, but the model will first decrypt the images and then put them through the convolutional layers.  ...  The views expressed in this manuscript are those of the author and do not necessarily reflect the position or policy of the Department of Veterans Affairs or the United States government.  ... 
arXiv:2103.00695v1 fatcat:queaicaagncupmvgfhule3b4mm

A survey on functional encryption

Carla Mascia, Massimiliano Sala, Irene Villa
2021 Advances in Mathematics of Communications  
<p style='text-indent:20px;'>Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and allows learning a function of the encrypted  ...  To our knowledge, this is the first survey that encompasses the entire FE family.</p>  ...  We would like to thank Andrea Gelpi, Marco Pedicini, and Michela Iezzi for their interest and valuable discussion on the subject. We also thank the anonymous referee for the helpful comments.  ... 
doi:10.3934/amc.2021049 fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4

Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving

Lei Xu, Chungen Xu, Zhongyi Liu, Yunling Wang, Jianfeng Wang
2019 Computers Materials & Continua  
To ensure the confidentiality and utilization of these data, industries and companies users encrypt their data and store them in an outsourced party.  ...  However, simple adoption of encryption scheme makes the original lose its flexibility and utilization. To address these problems, the searchable encryption scheme is proposed.  ...  The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.  ... 
doi:10.32604/cmc.2019.05276 fatcat:5poyqk5j4zeefhjzaepqhgmqci
« Previous Showing results 1 — 15 out of 15,377 results