Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection
Constrained shortest distance (CSD) querying is one of the fundamental graph query
primitives, which finds the shortest distance from an origin to a destination in a graph with a …
primitives, which finds the shortest distance from an origin to a destination in a graph with a …
PassBio: Privacy-preserving user-centric biometric authentication
The proliferation of online biometric authentication has necessitated security requirements of
biometric templates. The existing secure biometric authentication schemes feature a server …
biometric templates. The existing secure biometric authentication schemes feature a server …
Benchmarking privacy preserving scientific operations
In this work, we examine the efficiency of protocols for secure evaluation of basic
mathematical functions (sqrt, sin, arcsin, amongst others), essential to various application …
mathematical functions (sqrt, sin, arcsin, amongst others), essential to various application …
Private sampling with identifiable cheaters
In this paper we study verifiable sampling from probability distributions in the context of multi-
party computation. This has various applications in randomized algorithms performed …
party computation. This has various applications in randomized algorithms performed …
Secure shortest distance queries over encrypted graph in cloud computing
J Guo, J Sun - Wireless Networks, 2024 - Springer
Graph databases have received increased interests as many applications are handled as
graph problems. Shortest distance queries are one of the fundamental operations and have …
graph problems. Shortest distance queries are one of the fundamental operations and have …
New approach for sine and cosine in secure fixed-point arithmetic
S Korzilius, B Schoenmakers - International Symposium on Cyber Security …, 2023 - Springer
In this paper we present a new class of protocols for the secure computation of the sine and
cosine functions. The precision for the underlying secure fixed-point arithmetic is …
cosine functions. The precision for the underlying secure fixed-point arithmetic is …
[PDF][PDF] Achieving differential privacy in secure multiparty computation
KKK Thissen, IL Schoenmakers, IR Koster… - 2019 - pure.tue.nl
Collecting data about people's health contributes to useful medical research, adapting
health care programs or improving overall knowledge about us, human beings. Data is …
health care programs or improving overall knowledge about us, human beings. Data is …
Check for updates A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
J Breier¹, D Jap, X Hou¹, S Bhasin - … , Be'er Sheva, Israel, June 29 …, 2023 - books.google.com
Model extraction attacks have been widely applied, which can normally be used to recover
confidential parameters of neural networks for multiple layers. Recently, side-channel …
confidential parameters of neural networks for multiple layers. Recently, side-channel …
Efficient and robust protocols for privacy-preserving semi-decentralized machine learning
C Sabater - 2022 - theses.hal.science
In recent years, the concern for privacy has significantly grown. This is a consequence of the
regular use of data-intensive services that require the massive outsourcing and processing …
regular use of data-intensive services that require the massive outsourcing and processing …
Zero Knowledge Arguments for Verifiable Sampling
In privacy-preserving machine learning, it is less obvious to verify correct behavior of
participants because they are not supposed to reveal their inputs in cleartext to other …
participants because they are not supposed to reveal their inputs in cleartext to other …