Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review

GM Garrido, J Sedlmeir, Ö Uludağ, IS Alaoui… - Journal of Network and …, 2022 - Elsevier
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …

Oblivious neural network predictions via minionn transformations

J Liu, M Juuti, Y Lu, N Asokan - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Machine learning models hosted in a cloud service are increasingly popular but risk privacy:
clients sending prediction requests to the service need to disclose potentially sensitive …

GMW vs. Yao? Efficient secure two-party computation with low depth circuits

T Schneider, M Zohner - Financial Cryptography and Data Security: 17th …, 2013 - Springer
Secure two-party computation is a rapidly emerging field of research and enables a large
variety of privacy-preserving applications such as mobile social networks or biometric …

Armadillo: a compilation chain for privacy preserving applications

S Carpov, P Dubrulle, R Sirdey - … of the 3rd International Workshop on …, 2015 - dl.acm.org
In this work we present Armadillo a compilation chain used for compiling applications written
in a high-level language (C++) to work on encrypted data. The back-end of the compilation …

Secure query processing with data interoperability in a cloud database environment

WK Wong, B Kao, DWL Cheung, R Li… - Proceedings of the 2014 …, 2014 - dl.acm.org
We address security issues in a cloud database system which employs the DBaaS model. In
such a model, a data owner (DO) exports its data to a cloud database service provider (SP) …

[PDF][PDF] SoK: Modular and efficient private decision tree evaluation

Á Kiss, M Naderpour, J Liu… - Proceedings on …, 2019 - researchportal.helsinki.fi
Decision trees and random forests are widely used classifiers in machine learning. Service
providers often host classification models in a cloud service and provide an interface for …

Rmind: a tool for cryptographically secure statistical analysis

D Bogdanov, L Kamm, S Laur… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Secure multi-party computation is a practical cryptographic method for processing
confidential data. Research progress has led to its use in privacy-preserving statistical …

Fuse–flexible file format and intermediate representation for secure multi-party computation

L Braun, M Huppert, N Khayata, T Schneider… - Proceedings of the …, 2023 - dl.acm.org
Secure Multi-Party Computation (MPC) is continuously becoming more and more practical.
Many optimizations have been introduced, making MPC protocols more suitable for solving …

Large-scale privacy-preserving statistical computations for distributed genome-wide association studies

O Tkachenko, C Weinert, T Schneider… - Proceedings of the 2018 …, 2018 - dl.acm.org
We present privacy-preserving solutions for Genome-Wide Association Studies (GWAS)
based on Secure Multi-Party Computation (SMPC). Using SMPC, we protect the privacy of …

Securing SQL based databases with cryptographic protocols

Y Lindell, G Pe'er, M Kraitsberg, V Osheter… - US Patent …, 2020 - Google Patents
The subject matter discloses a method operated on a com puterizing system comprising
generating two secret shares of at least some of the data fields in a database, loading data …