1,208 Hits in 7.2 sec

Privacy-Preserving Data Mining [chapter]

Peter M. D. Gray, Todd Eavis, Alfred Inselberg, Patrick Valduriez, Patrick Valduriez, Goetz Graefe, Goetz Graefe, Hans Zeller, Goetz Graefe, Esther Pacitti, Christoph Koch, Rui Zhang (+81 others)
2009 Encyclopedia of Database Systems  
With the rapid growth of the Internet, there is much need to cooperate mining data on the joint databases of multi-participants.  ...  MULTI PARTY PRIVACY PRESERVING DECISION TREE FOR HORIZONTALLY PARTITIONED DATA Partitioning in general, results in smaller, manageable data sizes, so indexes are built faster, queries run faster, more  ...  Set, and do step 4; 4) If Constraint Set is full, sends token=0 to the target party; otherwise sends token=1.  ... 
doi:10.1007/978-0-387-39940-9_270 fatcat:5hy4gwnwgbhmpjclwjcb3ptwhy

Epione: Lightweight Contact Tracing with Strong Privacy [article]

Ni Trieu, Kareem Shehata, Prateek Saxena, Reza Shokri, Dawn Song
2020 arXiv   pre-print
As a key building block, we present a new cryptographic tool for secure two-party private set intersection cardinality (PSI-CA), which allows two parties, each holding a set of items, to learn the intersection  ...  size of two private sets without revealing intersection items.  ...  Secure Computation and Private Set Intersection Private set intersection (PSI) refers to a cryptographic protocol that allows two parties holding private datasets to compute the intersection of these sets  ... 
arXiv:2004.13293v3 fatcat:4tz7reqglrhcfmrgefljqcbqk4

Privacy-Preserving Set Operations in the Presence of Rational Parties

Atsuko Miyaji, Mohammad Shahriar Rahman
2012 2012 26th International Conference on Advanced Information Networking and Applications Workshops  
However, efficient computation of such set operations are desirable for practical implementations.  ...  In this paper, we build efficient and private set operations avoiding the use of expensive tools like homomorphic encryption, zero-knowledge proof, and oblivious transfer.  ...  Recently, [13] proposed set-intersection protocol that allows the parties to use harware tokens.  ... 
doi:10.1109/waina.2012.17 dblp:conf/aina/MiyajiR12 fatcat:yzhskmswzbdcri5hdx2gyoli7a

DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists [article]

Kasra EdalatNejad
2020 arXiv   pre-print
DatashareNetwork combines well-known anonymous authentication mechanisms and anonymous communication primitives, a novel asynchronous messaging system, and a novel multi-set private set intersection protocol  ...  (MS-PSI) into a *decentralized peer-to-peer private document search engine*.  ...  In this section, we introduce a multi-set private set intersection (MS-PSI) protocol that simultaneously computes intersections of set X with N sets {Y 1 , . . . ,Y N } at the server.  ... 
arXiv:2005.14645v2 fatcat:e7b3tar4vfheldug6ykbeuyjfa

Developing High Performance Secure Multi-Party Computation Protocols in Healthcare: A Case Study of Patient Risk Stratification

Xiao Dong, David A Randolph, Chenkai Weng, Abel N Kho, Jennie M Rogers, Xiao Wang
2021 AMIA Annual Symposium Proceedings  
Cuckoo hashing enables our protocols to achieve extremely fast run times, with answers to clinically meaningful questions produced in minutes instead of hours.  ...  Linking records using private set intersection (PSI), we compute two metrics often used in patient risk stratification: high utilizer identification (PSI-HU) and comorbidity index calculation (PSI-CI).  ...  Private set intersection (PSI) is an important application of secure multi-party computation.  ... 
pmid:34457134 pmcid:PMC8378657 fatcat:5u72peu6nneadktlnfvxoj6j6y

Scaling Private Set Intersection to Billion-Element Sets [chapter]

Seny Kamara, Payman Mohassel, Mariana Raykova, Saeed Sadeghian
2014 Lecture Notes in Computer Science  
We examine the feasibility of private set intersection (PSI) over massive datasets.  ...  Our protocols also yield efficient server-aided private equalitytesting (PET) with stronger security guarantees than prior work.  ...  of our protocols with state-of-the-art two-party PSI protocols as well as with non-private solutions.  ... 
doi:10.1007/978-3-662-45472-5_13 fatcat:agyoneak6vexlmio7ee6z65ut4

Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information [chapter]

Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
2011 Lecture Notes in Computer Science  
This poses two challenges: (1) how to enable this type of sharing such that parties learn no information beyond what they are entitled to, and (2) how to do so efficiently, in real-world practical terms  ...  A typical setting involves two parties: one seeks information from the other without revealing the interest while the latter is either willing, or compelled, to share only the requested information.  ...  Private Set Intersection (PSI) Private Set Intersection (PSI) [26] constitutes our main building block.  ... 
doi:10.1007/978-3-642-21599-5_18 fatcat:txwzp4t66nflxjxnyb2qrcuefy

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC.  ...  Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable.  ...  Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

Untangling Blockchain: A Data Processing View of Blockchain Systems [article]

Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, Ji Wang
2017 arXiv   pre-print
Blockchains are distributed ledgers that enable parties who do not fully trust each other to maintain a set of global states. The parties agree on the existence, values and histories of the states.  ...  In this paper, we first survey the state of the art, focusing on private blockchains (in which parties are authenticated).  ...  Corda's consensus protocol is executed by a set of trusted parties called notaries which check if a given transaction has been executed before.  ... 
arXiv:1708.05665v1 fatcat:tf3fuh2fxnbdjaxywuhc3qz6ra

Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology [chapter]

Stephen R. Tate, Roopa Vishwanathan
2009 Lecture Notes in Computer Science  
image of a random value along with an encrypted version that is signed by the hardware to indicate that these values are properly produced.  ...  In this paper, we examine one such protocol and explore the consequences of replacing the statistical trust gained from cut-and-choose with a level of trust that depends on the use of secure, trusted hardware  ...  We believe that this is indeed possible, and could provide results quite similar to Katz's results but using our standard hardware components rather than custom-designed hardware tokens.  ... 
doi:10.1007/978-3-642-03007-9_17 fatcat:vmjrdwkm7rezrkijibs53th6xq

On Concurrently Secure Computation in the Multiple Ideal Query Model [chapter]

Vipul Goyal, Abhishek Jain
2013 Lecture Notes in Computer Science  
There exists a two-party functionality that cannot be securely realized in the MIQ model by any constant round protocol, with any polynomial number of ideal queries per session.  ...  Interestingly, our compiler uses ideas from the work on obfuscation using tamper-proof hardware, even though our setting does not involve any hardware.  ...  Introduced in the seminal works of [43, 18] , secure multi-party computation allows a group of (mutually) distrustful parties P 1 , . . . , P n , with private inputs x 1 , . . . , x n , to jointly compute  ... 
doi:10.1007/978-3-642-38348-9_40 fatcat:jpws2xlss5euhao7vceplqqs6y

Function Secret Sharing for PSI-CA:With Applications to Private Contact Tracing [article]

Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou
2020 arXiv   pre-print
The key idea behind the solution is that FSS natively supports secure keyword search on raw sets of keywords without a need for processing the keyword sets via a data structure for set membership.  ...  These features make FSS an attractive tool for lightweight privacy-preserving searching on a database of tokens belonging to infected individuals.  ...  Background Related Works on Contact Tracing We provide a list of related works in alphabetical order Private Set Intersection A Private Set Intersection (PSI) protocol [FNP04] enables two parties  ... 
arXiv:2012.13053v1 fatcat:hpbjkqfbevbmbejut65zqzj2y4

Web services security evaluation considerations

Elias Pimenidis, Christos K. Georgiadis
2009 International Journal of Electronic Security and Digital Forensics  
Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements.  ...  Web services development is a key theme in utilisation of the commercial exploitation of the semantic web.  ...  Multi-party and/or multi-hop web service interactions cannot be secure without web service security-oriented specifications.  ... 
doi:10.1504/ijesdf.2009.027520 fatcat:fxcxxkiaofeprh6a3e772ytfji

Self-certified Sybil-free pseudonyms

Leonardo A. Martucci, Markulf Kohlweiss, Christer Andersson, Andriy Panchenko
2008 Proceedings of the first ACM conference on Wireless network security - WiSec '08  
In this paper, we introduce self-certified Sybil-free pseudonyms as a means to provide privacy-friendly Sybil-freeness without requiring continuous online availability of a trusted third party.  ...  Acknowledgements Parts of this work have been funded by the EU FP6 project PRIME and the IST FIDIS (Future of Identity in the Information Society) Network of Excellence project. ADDITIONAL AUTHORS  ...  In such a protocol the domain controller (or other online parties) could contribute randomness to the generation of the public / private key or the pseudonym certificate.  ... 
doi:10.1145/1352533.1352558 dblp:conf/wisec/MartucciKAP08 fatcat:6r2ysj7levhedi2p6vwskuqsgq

Untangling Blockchain: A Data Processing View of Blockchain Systems

Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, Ji Wang
2018 IEEE Transactions on Knowledge and Data Engineering  
Blockchains are distributed ledgers that enable parties who do not fully trust each other to maintain a set of global states. The parties agree on the existence, values and histories of the states.  ...  In this paper, we first survey the state of the art, focusing on private blockchains (in which parties are authenticated).  ...  Non-Byzantine The systems described so far in this section tolerate Byzantine failures, rendering them attractive for public settings and for private settings where the cost of engaging trusted parties  ... 
doi:10.1109/tkde.2017.2781227 fatcat:7fedxsxy2jda7gz352iw2cyfzy
« Previous Showing results 1 — 15 out of 1,208 results