ARM2GC: Succinct garbled processor for secure computation

EM Songhori, MS Riazi, SU Hussain… - Proceedings of the 56th …, 2019 - dl.acm.org
We present ARM2GC, a novel secure computation framework based on Yao's Garbled
Circuit (GC) protocol and the ARM processor. It allows users to develop privacy-preserving …

MPCircuits: Optimized circuit generation for secure multi-party computation

MS Riazi, M Javaheripi, SU Hussain… - … Oriented Security and …, 2019 - ieeexplore.ieee.org
Secure Multi-party Computation (MPC) is one of the most influential achievements of
modern cryptography: it allows evaluation of an arbitrary function on private inputs from …

Camsure: Secure content-addressable memory for approximate search

MS Riazi, M Samragh, F Koushanfar - ACM Transactions on Embedded …, 2017 - dl.acm.org
We introduce CAMsure, the first realization of secure Content Addressable Memory (CAM) in
the context of approximate search using near-neighbor algorithms. CAMsure provides a …

PriSearch: Efficient search on private data

MS Riazi, EM Songhori, F Koushanfar - Proceedings of the 54th Annual …, 2017 - dl.acm.org
We propose PriSearch, a provably secure methodology for two-party string search. The
scenario involves two parties, Alice (holding a query string) and Bob (holding a text), who …

Shaip: Secure hamming distance for authentication of intrinsic PUFs

SU Hussain, MS Riazi, F Koushanfar - ACM Transactions on Design …, 2018 - dl.acm.org
In this article, we present SHAIP, a secure Hamming distance–based mutual authentication
protocol. It allows an unlimited number of authentications by employing an intrinsic Physical …

[BUCH][B] Towards a private new world: Algorithm, protocol, and hardware co-design for large-scale secure computation

MS Riazi - 2020 - search.proquest.com
Data privacy and security are among the grand challenges in the emerging era of massive
data and collective intelligence. On the one hand, the rapid advances of several …

[BUCH][B] Practical, Scalable, and Efficient Privacy-Preserving Computation

SU Hussain - 2021 - search.proquest.com
In today's data-driven world, we are conflicted with two opposing phenomena. On the one
hand, collection and analysis of an enormous amount of data have resulted in rapid …

Design of searchable algorithm for biological databased on homomorphic encryption

M Yang, Y Man, N Liu, Y Zhang, X **ng - … 2019, Čačak, Serbia, August 5–7 …, 2019 - Springer
With the rapid development of biotechnology, researchers are able to obtain large number of
genome data sets. However, biological data often involves high privacy and data security …

[PDF][PDF] Preserving consumer DNA privacy for finding relatives in a malicious two party computation

SZ Ahmed - 2020 - unbscholar.lib.unb.ca
The evolution of consumer DNA analysis and testing has led consumers to face data privacy
risks, as their data are often uploaded into the cloud and made publicly available. By various …

基于后缀树的基因数据可搜索加密方法

秦诗悦, 周福才, 柳璐 - 东北大学学报 (自然科学版), 2019 - xuebao.neu.edu.cn
为保障用户免遭侵犯隐私的风险, 提出了一种特别支持基因数据的可搜索加密方法.
针对目前密文搜索方案大多数仅支持通过关键字进行搜索, 而无法用于不含关键字的基因数据的 …