Content delivery network security: A survey

M Ghaznavi, E Jalalpour… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
A content delivery network (CDN) is a distributed infrastructure to deliver digital contents to
end users with high performance. CDNs are critical to provide and protect the availability of …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Pad-net: Multi-tasks guided prediction-and-distillation network for simultaneous depth estimation and scene parsing

D Xu, W Ouyang, X Wang… - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
Depth estimation and scene parsing are two particularly important tasks in visual scene
understanding. In this paper we tackle the problem of simultaneous depth estimation and …

Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Succinct {Non-Interactive} zero knowledge for a von neumann architecture

E Ben-Sasson, A Chiesa, E Tromer… - 23rd USENIX Security …, 2014 - usenix.org
We build a system that provides succinct non-interactive zero-knowledge proofs (zk-
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …

SNARKs for C: Verifying program executions succinctly and in zero knowledge

E Ben-Sasson, A Chiesa, D Genkin, E Tromer… - Annual cryptology …, 2013 - Springer
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …

Blindbox: Deep packet inspection over encrypted traffic

J Sherry, C Lan, RA Popa, S Ratnasamy - Proceedings of the 2015 ACM …, 2015 - dl.acm.org
Many network middleboxes perform deep packet inspection (DPI), a set of useful tasks
which examine packet payloads. These tasks include intrusion detection (IDS), exfiltration …

Two halves make a whole: Reducing data transfer in garbled circuits using half gates

S Zahur, M Rosulek, D Evans - … on the Theory and Applications of …, 2015 - Springer
The well-known classical constructions of garbled circuits use four ciphertexts per gate,
although various methods have been proposed to reduce this cost. The best previously …

Function secret sharing

E Boyle, N Gilboa, Y Ishai - Annual international conference on the theory …, 2015 - Springer
Motivated by the goal of securely searching and updating distributed data, we introduce and
study the notion of function secret sharing (FSS). This new notion is a natural generalization …