Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation [PDF]
The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raising ...
Barni, M. +2 more
core +1 more source
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications [PDF]
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs.
Koushanfar, Farinaz +5 more
core +2 more sources
Entangled cloud storage (Aspnes et al., ESORICS 2004) enables a set of clients to “entangle” their files into a single clew to be stored by a (potentially malicious) cloud provider.
Ateniese, Giuseppe +3 more
core +1 more source
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model [PDF]
We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitrary (yet bounded) information on the entire state of the signer (sometimes known as fully leakage resilience), including the random ...
Buus Nielsen, Jesper +2 more
core +2 more sources
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension
Background Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research.
Feng Chen +9 more
doaj +1 more source
Oblivious network intrusion detection systems
A main function of network intrusion detection systems (NIDSs) is to monitor network traffic and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but they use encrypted rules and produce encrypted results without being ...
Mahmoud AbdelHafeez Sayed, Mostafa Taha
doaj +1 more source
Cloud-based Quadratic Optimization with Partially Homomorphic Encryption [PDF]
The development of large-scale distributed control systems has led to the outsourcing of costly computations to cloud-computing platforms, as well as to concerns about privacy of the collected sensitive data.
Alexandru, Andreea B. +5 more
core +2 more sources
Lattice-Based proof of a shuffle [PDF]
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes. Shuffles are commonly used to construct mixing networks (mix-nets), a key element to ensure anonymity in many applications such as electronic voting ...
Costa, Nuria +2 more
core +1 more source
Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer [PDF]
open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model.
Asharov +32 more
core +3 more sources

