搜索结果: 1-15 共查到“private”相关记录449条 . 查询时间(0.124 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Building private information retrieval schemes over binary fields
二进制字段 私有信息 检索方案
font style='font-size:12px;'>
2023/4/21
Private Set Relations with Bloom Filters for Outsourced SLA Validation
Bloom filters set operations set relations
font style='font-size:12px;'>
2019/9/5
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical level is gaining more and more importance. To support this we introduce privacy preserving set relati...
RRTxFM: Probabilistic Counting for Differentially Private Statistics
Probabilistic Counting Differential Privacy Randomized Response
font style='font-size:12px;'>
2019/7/15
Data minimization has become a paradigm to address privacy concerns when collecting and storing personal data. In this paper we present two new approaches, RSTxFM and RRTxFM, to estimate the cardinali...
Scalable Private Set Union from Symmetric-Key Techniques
Private Set Union Private Membership Test
font style='font-size:12px;'>
2019/7/4
We present a new efficient protocol for computing private set union (PSU). Here two semi-honest parties, each holding a dataset of known size (or of a known upper bound), wish to compute the union of ...
Public-Key Function-Private Hidden Vector Encryption (and More)
function privacy obfuscation conjunctions
font style='font-size:12px;'>
2019/6/26
Conjunctions. If the predicate computes a conjunction, our construction is a public-key function-private hidden vector encryption scheme. This addresses an open problem posed by Boneh, Raghunathan, an...
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications
secure computation private intersection-sum secure aggregate ad conversion
font style='font-size:12px;'>
2019/6/19
In this work, we describe how to deploy a cryptographic secure computation protocol for routine use in industry. Based on our experience, we identify major preliminaries and enabling factors which we ...
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
oblivious transfer differential privacy hardness amplification
font style='font-size:12px;'>
2019/6/4
Consider a PPT two-party protocol Π=(A,B)Π=(A,B) in which the parties get no private inputs and obtain outputs OA,OB∈{0,1}OA,OB∈{0,1}, and let VAVA and VBVB denote the parties' individual views. Proto...
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
private set intersection OT extension
font style='font-size:12px;'>
2019/6/4
We describe a novel approach for two-party private set intersection (PSI) with semi-honest security. Compared to existing PSI protocols, ours has a more favorable balance between communication and com...
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
MPC Decision Trees SVM
font style='font-size:12px;'>
2019/6/3
At CRYPTO 2018 Cramer et al. presented SPDZ2k, a new secret-sharing based protocol for actively secure multi-party computation against a dishonest majority, that works over rings instead of fields. Th...
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Ring Confidential Transactions Log-size Proofs
font style='font-size:12px;'>
2019/5/31
Monero is the largest cryptocurrency with built-in cryptographic privacy features. The transactions are authenticated using spend proofs, which provide a certain level of anonymity by hiding the sourc...
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
message franking designated verifier signatures deniability
font style='font-size:12px;'>
2019/5/28
Content moderation is crucial for stopping abuse and harassment via messaging on online platforms. Existing moderation mechanisms, such as message franking, require platform providers to see user iden...
Mobile Private Contact Discovery at Scale
Private Contact Discovery Private Set Intersection Oblivious Pseudorandom Function
font style='font-size:12px;'>
2019/5/21
Mobile messengers like WhatsApp perform contact discovery by uploading the user's entire address book to the service provider. This allows the service provider to determine which of the user's contact...
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Filter Permutator FLIP Homomorphic Encryption
font style='font-size:12px;'>
2019/5/14
Motivated by the application of delegating computation, we revisit the design of filter permutators as a general approach to build stream ciphers that can be efficiently evaluated in a fully homomorph...
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Dynamic Searchable Symmetric Encryption Backward Privacy Forward Privacy
font style='font-size:12px;'>
2019/5/9
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
private queries encrypted database homomorphic encryption
font style='font-size:12px;'>
2019/4/3
To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, ``x=y,x≠yx=y,x≠y'', have been widely studied with many proposals but ...