Federated learning in smart cities: Privacy and security survey

R Al-Huthaifi, T Li, W Huang, J Gu, C Li - Information Sciences, 2023 - Elsevier
Over the last decade, smart cities (SC) have been developed worldwide. Implementing big
data and the internet of things improves the monitoring and integration of different …

Homomorphic encryption for machine learning in medicine and bioinformatics

A Wood, K Najarian, D Kahrobaei - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …

MASCOT: faster malicious arithmetic secure computation with oblivious transfer

M Keller, E Orsini, P Scholl - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
We consider the task of secure multi-party computation of arithmetic circuits over a finite
field. Unlike Boolean circuits, arithmetic circuits allow natural computations on integers to be …

Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody

Y Lindell, A Nof - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing,
cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA …

{ZKBoo}: Faster {Zero-Knowledge} for Boolean Circuits

I Giacomelli, J Madsen, C Orlandi - 25th usenix security symposium …, 2016 - usenix.org
In this paper we describe ZKBoo, a proposal for practically efficient zero-knowledge
arguments especially tailored for Boolean circuits and report on a proof-ofconcept …

Authenticated garbling and efficient maliciously secure two-party computation

X Wang, S Ranellucci, J Katz - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We propose a simple and efficient framework for obtaining efficient constant-round protocols
for maliciously secure two-party computation. Our framework uses a function-independent …

Threshold ECDSA from ECDSA assumptions: The multiparty case

J Doerner, Y Kondi, E Lee… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Cryptocurrency applications have spurred a resurgence of interest in the computation of
ECDSA signatures using threshold protocols---that is, protocols in which the signing key is …

Secure two-party threshold ECDSA from ECDSA assumptions

J Doerner, Y Kondi, E Lee… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used
schemes in deployed cryptography. Through its applications in code and binary …

Mobile private contact discovery at scale

D Kales, C Rechberger, T Schneider… - 28th USENIX Security …, 2019 - usenix.org
Mobile messengers like WhatsApp perform contact discovery by uploading the user's entire
address book to the service provider. This allows the service provider to determine which of …

[HTML][HTML] Private set intersection: A systematic literature review

D Morales, I Agudo, J Lopez - Computer Science Review, 2023 - Elsevier
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …