Federated learning in smart cities: Privacy and security survey
Over the last decade, smart cities (SC) have been developed worldwide. Implementing big
data and the internet of things improves the monitoring and integration of different …
data and the internet of things improves the monitoring and integration of different …
Homomorphic encryption for machine learning in medicine and bioinformatics
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
MASCOT: faster malicious arithmetic secure computation with oblivious transfer
We consider the task of secure multi-party computation of arithmetic circuits over a finite
field. Unlike Boolean circuits, arithmetic circuits allow natural computations on integers to be …
field. Unlike Boolean circuits, arithmetic circuits allow natural computations on integers to be …
Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing,
cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA …
cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA …
{ZKBoo}: Faster {Zero-Knowledge} for Boolean Circuits
I Giacomelli, J Madsen, C Orlandi - 25th usenix security symposium …, 2016 - usenix.org
In this paper we describe ZKBoo, a proposal for practically efficient zero-knowledge
arguments especially tailored for Boolean circuits and report on a proof-ofconcept …
arguments especially tailored for Boolean circuits and report on a proof-ofconcept …
Authenticated garbling and efficient maliciously secure two-party computation
We propose a simple and efficient framework for obtaining efficient constant-round protocols
for maliciously secure two-party computation. Our framework uses a function-independent …
for maliciously secure two-party computation. Our framework uses a function-independent …
Threshold ECDSA from ECDSA assumptions: The multiparty case
Cryptocurrency applications have spurred a resurgence of interest in the computation of
ECDSA signatures using threshold protocols---that is, protocols in which the signing key is …
ECDSA signatures using threshold protocols---that is, protocols in which the signing key is …
Secure two-party threshold ECDSA from ECDSA assumptions
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used
schemes in deployed cryptography. Through its applications in code and binary …
schemes in deployed cryptography. Through its applications in code and binary …
Mobile private contact discovery at scale
Mobile messengers like WhatsApp perform contact discovery by uploading the user's entire
address book to the service provider. This allows the service provider to determine which of …
address book to the service provider. This allows the service provider to determine which of …
[HTML][HTML] Private set intersection: A systematic literature review
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …
parties to compute a function on their private inputs, obtaining the output at the end and …