Privacy risk in machine learning: Analyzing the connection to overfitting

S Yeom, I Giacomelli, M Fredrikson… - 2018 IEEE 31st …, 2018 - ieeexplore.ieee.org
Machine learning algorithms, when applied to sensitive data, pose a distinct threat to
privacy. A growing body of prior work demonstrates that models produced by these …

Security of symmetric encryption against mass surveillance

M Bellare, KG Paterson, P Rogaway - … , Santa Barbara, CA, USA, August 17 …, 2014 - Springer
Motivated by revelations concerning population-wide surveillance of encrypted
communications, we formalize and investigate the resistance of symmetric encryption …

Cliptography: Clip** the power of kleptographic attacks

A Russell, Q Tang, M Yung, HS Zhou - … on the Theory and Application of …, 2016 - Springer
Kleptography, introduced 20 years ago by Young and Yung [Crypto'96], considers the (in)
security of malicious implementations (or instantiations) of standard cryptographic primitives …

SR-PEKS: Subversion-resistant public key encryption with keyword search

C Jiang, C Xu, Z Zhang, K Chen - IEEE Transactions on Cloud …, 2023 - ieeexplore.ieee.org
Public key encryption with keyword search (PEKS) provides secure searchable data
encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud …

Subversion-resilient signature schemes

G Ateniese, B Magri, D Venturi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We provide a formal treatment of security of digital signatures against subversion attacks
(SAs). Our model of subversion generalizes previous work in several directions, and is …

Message transmission with reverse firewalls—secure communication on corrupted machines

Y Dodis, I Mironov, N Stephens-Davidowitz - Annual international …, 2016 - Springer
Suppose Alice wishes to send a message to Bob privately over an untrusted channel.
Cryptographers have developed a whole suite of tools to accomplish this task, with a wide …

Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning

S Yeom, I Giacomelli, A Menaged… - Journal of …, 2020 - journals.sagepub.com
Machine learning algorithms, when applied to sensitive data, pose a distinct threat to
privacy. A growing body of prior work demonstrates that models produced by these …

Generic semantic security against a kleptographic adversary

A Russell, Q Tang, M Yung, HS Zhou - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Notable recent security incidents have generated intense interest in adversaries which
attempt to subvert---perhaps covertly---crypto\-graphic algorithms. In this paper we develop …

Sender-anamorphic encryption reformulated: Achieving robust and generic constructions

Y Wang, R Chen, X Huang, M Yung - … on the Theory and Application of …, 2023 - Springer
Motivated by the violation of two fundamental assumptions in secure communication-
receiver-privacy and sender-freedom-by a certain entity referred to as “the dictator” …

Self-guarding cryptographic protocols against algorithm substitution attacks

M Fischlin, S Mazaheri - 2018 IEEE 31st Computer Security …, 2018 - ieeexplore.ieee.org
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to
algorithm substitution attacks. Such self-guarding protocols can prevent undesirable …