A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy-Preserving Data Mining
[chapter]
2009
Encyclopedia of Database Systems
With the rapid growth of the Internet, there is much need to cooperate mining data on the joint databases of multi-participants. ...
MULTI PARTY PRIVACY PRESERVING DECISION TREE FOR HORIZONTALLY PARTITIONED DATA Partitioning in general, results in smaller, manageable data sizes, so indexes are built faster, queries run faster, more ...
Set, and do step 4; 4) If Constraint Set is full, sends token=0 to the target party; otherwise sends token=1. ...
doi:10.1007/978-0-387-39940-9_270
fatcat:5hy4gwnwgbhmpjclwjcb3ptwhy
Epione: Lightweight Contact Tracing with Strong Privacy
[article]
2020
arXiv
pre-print
As a key building block, we present a new cryptographic tool for secure two-party private set intersection cardinality (PSI-CA), which allows two parties, each holding a set of items, to learn the intersection ...
size of two private sets without revealing intersection items. ...
Secure Computation and Private Set Intersection Private set intersection (PSI) refers to a cryptographic protocol that allows two parties holding private datasets to compute the intersection of these sets ...
arXiv:2004.13293v3
fatcat:4tz7reqglrhcfmrgefljqcbqk4
Privacy-Preserving Set Operations in the Presence of Rational Parties
2012
2012 26th International Conference on Advanced Information Networking and Applications Workshops
However, efficient computation of such set operations are desirable for practical implementations. ...
In this paper, we build efficient and private set operations avoiding the use of expensive tools like homomorphic encryption, zero-knowledge proof, and oblivious transfer. ...
Recently, [13] proposed set-intersection protocol that allows the parties to use harware tokens. ...
doi:10.1109/waina.2012.17
dblp:conf/aina/MiyajiR12
fatcat:yzhskmswzbdcri5hdx2gyoli7a
DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists
[article]
2020
arXiv
pre-print
DatashareNetwork combines well-known anonymous authentication mechanisms and anonymous communication primitives, a novel asynchronous messaging system, and a novel multi-set private set intersection protocol ...
(MS-PSI) into a *decentralized peer-to-peer private document search engine*. ...
In this section, we introduce a multi-set private set intersection (MS-PSI) protocol that simultaneously computes intersections of set X with N sets {Y 1 , . . . ,Y N } at the server. ...
arXiv:2005.14645v2
fatcat:e7b3tar4vfheldug6ykbeuyjfa
Developing High Performance Secure Multi-Party Computation Protocols in Healthcare: A Case Study of Patient Risk Stratification
2021
AMIA Annual Symposium Proceedings
Cuckoo hashing enables our protocols to achieve extremely fast run times, with answers to clinically meaningful questions produced in minutes instead of hours. ...
Linking records using private set intersection (PSI), we compute two metrics often used in patient risk stratification: high utilizer identification (PSI-HU) and comorbidity index calculation (PSI-CI). ...
Private set intersection (PSI) is an important application of secure multi-party computation. ...
pmid:34457134
pmcid:PMC8378657
fatcat:5u72peu6nneadktlnfvxoj6j6y
Scaling Private Set Intersection to Billion-Element Sets
[chapter]
2014
Lecture Notes in Computer Science
We examine the feasibility of private set intersection (PSI) over massive datasets. ...
Our protocols also yield efficient server-aided private equalitytesting (PET) with stronger security guarantees than prior work. ...
of our protocols with state-of-the-art two-party PSI protocols as well as with non-private solutions. ...
doi:10.1007/978-3-662-45472-5_13
fatcat:agyoneak6vexlmio7ee6z65ut4
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
[chapter]
2011
Lecture Notes in Computer Science
This poses two challenges: (1) how to enable this type of sharing such that parties learn no information beyond what they are entitled to, and (2) how to do so efficiently, in real-world practical terms ...
A typical setting involves two parties: one seeks information from the other without revealing the interest while the latter is either willing, or compelled, to share only the requested information. ...
Private Set Intersection (PSI) Private Set Intersection (PSI) [26] constitutes our main building block. ...
doi:10.1007/978-3-642-21599-5_18
fatcat:txwzp4t66nflxjxnyb2qrcuefy
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
2019
Security and Communication Networks
This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC. ...
Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable. ...
Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work. ...
doi:10.1155/2019/1368905
fatcat:izynm6msrvehfa3ghkw7tykk34
Untangling Blockchain: A Data Processing View of Blockchain Systems
[article]
2017
arXiv
pre-print
Blockchains are distributed ledgers that enable parties who do not fully trust each other to maintain a set of global states. The parties agree on the existence, values and histories of the states. ...
In this paper, we first survey the state of the art, focusing on private blockchains (in which parties are authenticated). ...
Corda's consensus protocol is executed by a set of trusted parties called notaries which check if a given transaction has been executed before. ...
arXiv:1708.05665v1
fatcat:tf3fuh2fxnbdjaxywuhc3qz6ra
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology
[chapter]
2009
Lecture Notes in Computer Science
image of a random value along with an encrypted version that is signed by the hardware to indicate that these values are properly produced. ...
In this paper, we examine one such protocol and explore the consequences of replacing the statistical trust gained from cut-and-choose with a level of trust that depends on the use of secure, trusted hardware ...
We believe that this is indeed possible, and could provide results quite similar to Katz's results but using our standard hardware components rather than custom-designed hardware tokens. ...
doi:10.1007/978-3-642-03007-9_17
fatcat:vmjrdwkm7rezrkijibs53th6xq
On Concurrently Secure Computation in the Multiple Ideal Query Model
[chapter]
2013
Lecture Notes in Computer Science
There exists a two-party functionality that cannot be securely realized in the MIQ model by any constant round protocol, with any polynomial number of ideal queries per session. ...
Interestingly, our compiler uses ideas from the work on obfuscation using tamper-proof hardware, even though our setting does not involve any hardware. ...
Introduced in the seminal works of [43, 18] , secure multi-party computation allows a group of (mutually) distrustful parties P 1 , . . . , P n , with private inputs x 1 , . . . , x n , to jointly compute ...
doi:10.1007/978-3-642-38348-9_40
fatcat:jpws2xlss5euhao7vceplqqs6y
Function Secret Sharing for PSI-CA:With Applications to Private Contact Tracing
[article]
2020
arXiv
pre-print
The key idea behind the solution is that FSS natively supports secure keyword search on raw sets of keywords without a need for processing the keyword sets via a data structure for set membership. ...
These features make FSS an attractive tool for lightweight privacy-preserving searching on a database of tokens belonging to infected individuals. ...
Background
Related Works on Contact Tracing We provide a list of related works in alphabetical order
Private Set Intersection A Private Set Intersection (PSI) protocol [FNP04] enables two parties ...
arXiv:2012.13053v1
fatcat:hpbjkqfbevbmbejut65zqzj2y4
Web services security evaluation considerations
2009
International Journal of Electronic Security and Digital Forensics
Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. ...
Web services development is a key theme in utilisation of the commercial exploitation of the semantic web. ...
Multi-party and/or multi-hop web service interactions cannot be secure without web service security-oriented specifications. ...
doi:10.1504/ijesdf.2009.027520
fatcat:fxcxxkiaofeprh6a3e772ytfji
Self-certified Sybil-free pseudonyms
2008
Proceedings of the first ACM conference on Wireless network security - WiSec '08
In this paper, we introduce self-certified Sybil-free pseudonyms as a means to provide privacy-friendly Sybil-freeness without requiring continuous online availability of a trusted third party. ...
Acknowledgements Parts of this work have been funded by the EU FP6 project PRIME and the IST FIDIS (Future of Identity in the Information Society) Network of Excellence project.
ADDITIONAL AUTHORS ...
In such a protocol the domain controller (or other online parties) could contribute randomness to the generation of the public / private key or the pseudonym certificate. ...
doi:10.1145/1352533.1352558
dblp:conf/wisec/MartucciKAP08
fatcat:6r2ysj7levhedi2p6vwskuqsgq
Untangling Blockchain: A Data Processing View of Blockchain Systems
2018
IEEE Transactions on Knowledge and Data Engineering
Blockchains are distributed ledgers that enable parties who do not fully trust each other to maintain a set of global states. The parties agree on the existence, values and histories of the states. ...
In this paper, we first survey the state of the art, focusing on private blockchains (in which parties are authenticated). ...
Non-Byzantine The systems described so far in this section tolerate Byzantine failures, rendering them attractive for public settings and for private settings where the cost of engaging trusted parties ...
doi:10.1109/tkde.2017.2781227
fatcat:7fedxsxy2jda7gz352iw2cyfzy
« Previous
Showing results 1 — 15 out of 1,208 results