Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection

M Shen, B Ma, L Zhu, R Mijumbi… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Constrained shortest distance (CSD) querying is one of the fundamental graph query
primitives, which finds the shortest distance from an origin to a destination in a graph with a …

PassBio: Privacy-preserving user-centric biometric authentication

K Zhou, J Ren - IEEE Transactions on Information Forensics …, 2018 - ieeexplore.ieee.org
The proliferation of online biometric authentication has necessitated security requirements of
biometric templates. The existing secure biometric authentication schemes feature a server …

Benchmarking privacy preserving scientific operations

A Aly, NP Smart - International Conference on Applied Cryptography and …, 2019 - Springer
In this work, we examine the efficiency of protocols for secure evaluation of basic
mathematical functions (sqrt, sin, arcsin, amongst others), essential to various application …

Private sampling with identifiable cheaters

C Sabater, F Hahn, A Peter, J Ramon - Proceedings on Privacy …, 2023 - inria.hal.science
In this paper we study verifiable sampling from probability distributions in the context of multi-
party computation. This has various applications in randomized algorithms performed …

Secure shortest distance queries over encrypted graph in cloud computing

J Guo, J Sun - Wireless Networks, 2024 - Springer
Graph databases have received increased interests as many applications are handled as
graph problems. Shortest distance queries are one of the fundamental operations and have …

New approach for sine and cosine in secure fixed-point arithmetic

S Korzilius, B Schoenmakers - International Symposium on Cyber Security …, 2023 - Springer
In this paper we present a new class of protocols for the secure computation of the sine and
cosine functions. The precision for the underlying secure fixed-point arithmetic is …

[PDF][PDF] Achieving differential privacy in secure multiparty computation

KKK Thissen, IL Schoenmakers, IR Koster… - 2019 - pure.tue.nl
Collecting data about people's health contributes to useful medical research, adapting
health care programs or improving overall knowledge about us, human beings. Data is …

Check for updates A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks

J Breier¹, D Jap, X Hou¹, S Bhasin - … , Be'er Sheva, Israel, June 29 …, 2023 - books.google.com
Model extraction attacks have been widely applied, which can normally be used to recover
confidential parameters of neural networks for multiple layers. Recently, side-channel …

Efficient and robust protocols for privacy-preserving semi-decentralized machine learning

C Sabater - 2022 - theses.hal.science
In recent years, the concern for privacy has significantly grown. This is a consequence of the
regular use of data-intensive services that require the massive outsourcing and processing …

Zero Knowledge Arguments for Verifiable Sampling

C Sabater, J Ramon - NeurIPS 2021 Workshop Privacy in Machine …, 2021 - inria.hal.science
In privacy-preserving machine learning, it is less obvious to verify correct behavior of
participants because they are not supposed to reveal their inputs in cleartext to other …