Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection

M Shen, B Ma, L Zhu, R Mijumbi… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Constrained shortest distance (CSD) querying is one of the fundamental graph query
primitives, which finds the shortest distance from an origin to a destination in a graph with a …

[PDF][PDF] Business intelligence improved by data mining algorithms and big data systems: an overview of different tools applied in industrial research

A Massaro, V Vitti, A Galiano, A Morelli - Computer Science and …, 2019 - dyrecta.com
The proposed paper shows different tools adopted in an industry project oriented on
business intelligence (BI) improvement. The research outputs concern mainly data mining …

Grecs: Graph encryption for approximate shortest distance queries

X Meng, S Kamara, K Nissim, G Kollios - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
We propose graph encryption schemes that efficiently support approximate shortest distance
queries on large-scale encrypted graphs. Shortest distance queries are one of the most …

Efficient, oblivious data structures for MPC

M Keller, P Scholl - Advances in Cryptology–ASIACRYPT 2014: 20th …, 2014 - Springer
We present oblivious implementations of several data structures for secure multiparty
computation (MPC) such as arrays, dictionaries, and priority queues. The resulting oblivious …

Secure multiparty PageRank algorithm for collaborative fraud detection

A Sangers, M van Heesch, T Attema, T Veugen… - … Cryptography and Data …, 2019 - Springer
Collaboration between financial institutions helps to improve detection of fraud. However,
exchange of relevant data between these institutions is often not possible due to privacy …

SecGDB: Graph encryption for exact shortest distance queries with efficient updates

Q Wang, K Ren, M Du, Q Li, A Mohaisen - … , FC 2017, Sliema, Malta, April 3 …, 2017 - Springer
In the era of big data, graph databases have become increasingly important for NoSQL
technologies, and many systems can be modeled as graphs for semantic queries …

Rpm: Robust anonymity at scale

D Lu, A Kate - Proceedings on Privacy Enhancing Technologies, 2023 - petsymposium.org
This work presents RPM, a scalable anonymous communication protocol suite using secure
multiparty computation (MPC) with the offline-online model. We generate random, unknown …

A privacy-preserving online ride-hailing system without involving a third trusted server

H **e, Y Guo, X Jia - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
The increasing popularity of Online Ride-hailing (ORH) services has greatly facilitated our
daily travel. It enables a rider to easily request the nearest driver through mobile devices in a …

New protocols for secure equality test and comparison

G Couteau - International Conference on Applied Cryptography and …, 2018 - Springer
Protocols for securely comparing private values are among the most fundamental building
blocks of multiparty computation. introduced by Yao under the name millionaire's problem …