5,412 Hits in 4.9 sec

Server-aided honest computation for cryptographic applications

S.-M. Yen, C.-S. Laih
1993 Computers and Mathematics with Applications  
A lot of discussions for smart card based identification and digital signature schemes have been considered in the literature.  ...  In this paper, a novel approach is proposed for smart cards to perform signature validation and identification verification efficiently with the help of the powerful signature signer and the identity prover  ...  A computational model called the server-aided secret computation (SASC) has been proposed by Matsumoto et al.  ... 
doi:10.1016/0898-1221(93)90059-5 fatcat:6dfs7zt2sbc7jbogsnq2p6nsze

BSNCare+: A Robust IoT-Oriented Healthcare System with Non-Repudiation Transactions

Kuo-Hui Yeh
2016 Applied Sciences  
body sensors, the mobile gateway and the backend BSN-Care server.  ...  and better efficiency.  ...  Conflicts of Interest: The author declares no conflict of interest.  ... 
doi:10.3390/app6120418 fatcat:ktoyktourrh6zphclymtklxbay

An efficient and secure two-party key agreement protocol based on chaotic maps [article]

Nahid Yahyapoor, Hamed Yaghoobian, Manijeh Keshtgari
2018 arXiv   pre-print
Key agreement protocols are one of the common approaches in which two or more parties can agree upon a key, which precludes undesired third parties from forcing a key choice on them.  ...  Theoretical analysis demonstrates that the proposed protocol is efficient and resists current attacks.  ...  The proposed protocol In this section, we introduce an efficient and secure key agreement protocol based on chaotic maps which protects the users' anonymity.  ... 
arXiv:1801.02789v1 fatcat:zb74mf2nprbzdftlmkohhdawqu

Secure Similar Sequence Query on Outsourced Genomic Data

Ke Cheng, Yantian Hou, Liangmin Wang
2018 Proceedings of the 2018 on Asia Conference on Computer and Communications Security - ASIACCS '18  
To address the challenges of security and efficiency, we propose two protocols in the mixed form, which combine twoparty secure secret sharing, garbled circuit, and partial homomorphic encryptions together  ...  It is of great importance to outsource the genomic-analysis tasks onto clouds to leverage their powerful computational resources over the large-scale genomic sequences.  ...  ACKNOWLEDGMENTS We thank the shepherd and reviewers for the valuable suggestions. This work is funded in part by National Science Foundation of China under number U1736216.  ... 
doi:10.1145/3196494.3196535 dblp:conf/ccs/ChengHW18 fatcat:lqpqosfxdvhzbb7fknmc5gok3u

Private Set Intersection with Delegated Blind Quantum Computing [article]

Michele Amoretti
2022 arXiv   pre-print
In this work, we consider the case of two-party PSI in the honest-but-curious setting. We propose a protocol that solves the server-aided PSI problem using delegated blind quantum computing.  ...  The proposed protocol is correct, secure and blind against a malicious server, and characterized by a quantum communication complexity that is linear in the input size.  ...  Acknowledgements The author would like to thank Anna Pappa for helpful discussions on the MBQC-based multiparty delegated quantum computation protocol.  ... 
arXiv:2201.03496v1 fatcat:2cxkwoxrufau3enzbctpduynz4

MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge [article]

Duong Tung Nguyen, Ni Trieu
2021 IACR Cryptology ePrint Archive  
The technical core of our MPCCache is a new construction that allows multiple parties to compute a specific function on the intersection set of their datasets, without revealing the intersection itself  ...  existing MPC protocols.  ...  One can view our server-aided protocol as a standard two-server-aided setting where the parties (data owners) outsource the entire computation via XOR-sharing to two untrusted but noncolluding servers  ... 
dblp:journals/iacr/NguyenT21 fatcat:tcoywfb3hnavth7chivlr7myha

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks

2013 KSII Transactions on Internet and Information Systems  
The main concern in mobile peer-to-peer (P2P) networks is security because jamming or eavesdropping on a wireless link is much easier than on a wired one and such damage can be incurred without physical  ...  The proposed mechanism improves efficiency by avoiding the use of centralized entities and is designed to be agile in terms of both reliability and low-cost implementation.  ...  The proposed DAMMA protocol is based on the standard ECDH key establishment protocol.  ... 
doi:10.3837/tiis.2013.04.019 fatcat:neyr57tezzem5kxfanudgev3jm

Privacy-Preserving Genome-Wide Association Study is Practical [article]

Charlotte Bonte, Eleftheria Makri, Amin Ardeshirdavani, Jaak Simm, Yves Moreau, Frederik Vercauteren
2017 IACR Cryptology ePrint Archive  
Specifically, our protocols compute the χ 2 statistic, but only return a yes/no answer, indicating significance.  ...  The secure multiparty computation technique completes its execution in approximately 2 ms for data contributed by one million subjects.  ...  Acknowledgements This work was supported by the European Commission under the ICT programme with contract H2020-ICT-2014-1 644209 HEAT.  ... 
dblp:journals/iacr/BonteMASMV17 fatcat:yty7lmzl6rdrfgysyz2hnqtksy

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices

Prosanta Gope, Biplab Sikdar
2018 IEEE Internet of Things Journal  
Moreover, many of the IoT devices have limited storage and computational capabilities. Hence, it is desirable that the security solutions for IoT devices should be computationally efficient.  ...  been considered as one of the authentication factors.  ...  ACKNOWLEDGMENT This research was supported by the Ministry of Education, Singapore under a Tier 1 grant (number R-263-000-C13-112).  ... 
doi:10.1109/jiot.2018.2846299 fatcat:3ydd6zeefrdgjbzgf3jimj4fd4

A Secure IoT and Cloud Computing-Enabled e-Health Management System

Chanapha Butpheng, Kuo-Hui Yeh, Jia-Li Hou, Azees M
2022 Security and Communication Networks  
When the IoT is integrated into e-health system to enable more real-time on-demand services, it brings significant convenience to the physicians and patients.  ...  Therefore, in this research, we establish a secure IoT and cloud computing-enabled e-health management system in which a distinctive authentication scheme is adopted.  ...  Additionally, the Server selects two highly volatile secrets because their volatile characteristics are highly resistant to brute-force attacks.  ... 
doi:10.1155/2022/5300253 fatcat:q3l7blf64je4xn4k25sigyv6fq

Privacy-Preserving Aggregation in Federated Learning: A Survey [article]

Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, Jun Zhao
2022 arXiv   pre-print
The focus is placed on the construction of PPAgg protocols with an extensive analysis of the advantages and disadvantages of these selected PPAgg protocols and solutions.  ...  This survey aims to fill the gap between a large number of studies on PPFL, where PPAgg is adopted to provide a privacy guarantee, and the lack of a comprehensive survey on the PPAgg protocols applied  ...  randomly generate a sequence numbers based on the seed s i,j .  ... 
arXiv:2203.17005v2 fatcat:nlsi6g2fzbgwnhpgj2z5tgmqmq


Emiliano De Cristofaro, Sky Faber, Paolo Gasti, Gene Tsudik
2012 Proceedings of the 2012 ACM workshop on Privacy in the electronic society - WPES '12  
Some recent research explored privacypreserving personal genomic operations by applying (or customizing) cryptographic protocols based on techniques such as: conditional oblivious transfer, garbled circuits  ...  We design a personal genomic toolkit (called GenoDroid), implement it on the Android platform, assess its performance, and conduct a pilot usability study that yields some interesting results.  ...  Over Wi-Fi, we perform both local (broadcast-based) and server-aided discovery. When using the cellular network, we also use server-aided discovery.  ... 
doi:10.1145/2381966.2381980 dblp:conf/wpes/CristofaroFGT12 fatcat:7e2i57eofbcnxkfz423eovx53e

Robust IoT-based nursing-care support system with smart bio-objects

Cheng-Fa Chiang, Fang-Ming Hsu, Kuo-Hui Yeh
2018 BioMedical Engineering OnLine  
Based on the protocol analysis we conducted, the security robustness of the proposed nursing-care support system is guaranteed.  ...  With the advantages of contactlessness data retrieval and efficient data processing of intelligent IoT-based objects, versatile innovative types of on-demand medical relevant services have promptly been  ...  on Biomedical Engineering Innovation (ICBEI) 2016.  ... 
doi:10.1186/s12938-018-0582-5 pmid:30396339 pmcid:PMC6219060 fatcat:2wkqjybg6ffdrolspyjhju75gm

SecureML: A System for Scalable Privacy-Preserving Machine Learning

Payman Mohassel, Yupeng Zhang
2017 2017 IEEE Symposium on Security and Privacy (SP)  
Our protocols fall in the two-server model where data owners distribute their private data among two non-colluding servers who train various models on the joint data using secure two-party computation  ...  In this paper, we present new and efficient protocols for privacy preserving machine learning for linear regression, logistic regression and neural network training using the stochastic gradient descent  ...  Acknowledgements We thank Jing Huang from Visa Research for helpful discussions on machine learning, and Xiao Wang from University of Maryland for his help on the EMP toolkit.  ... 
doi:10.1109/sp.2017.12 dblp:conf/sp/MohasselZ17 fatcat:y6lwerwfwnfghjkia76yqenmiy

Towards practical privacy-preserving genome-wide association study

Charlotte Bonte, Eleftheria Makri, Amin Ardeshirdavani, Jaak Simm, Yves Moreau, Frederik Vercauteren
2018 BMC Bioinformatics  
Specifically, our protocols compute the χ 2 statistic, but only return a yes/no answer, indicating significance.  ...  The secure multiparty computation technique completes its execution in approximately 2 ms for data contributed by one million subjects.  ...  Additionally, Yves Moreau, Jaak Simm, and Amin Ardeshirdavani were funded by Research Council KU Leuven: CoE PFV/10/016 SymBioSys; Flemish Government: IWT: Exaptation, PhD grants FWO 06260 (Iterative and  ... 
doi:10.1186/s12859-018-2541-3 fatcat:jxi5l2xw3vdkplosqdi6rfxr4y
« Previous Showing results 1 — 15 out of 5,412 results