Slap: simpler, improved private stream aggregation from ring learning with errors

J Takeshita, R Karl, T Gong, T Jung - Journal of Cryptology, 2023 - Springer
Abstract Private Stream Aggregation (PSA) protocols perform secure aggregation of time-
series data without leaking information about users' inputs to the aggregator. Previous work …

TERSE: tiny encryptions and really speedy execution for post-quantum private stream aggregation

J Takeshita, Z Carmichael, R Karl, T Jung - International Conference on …, 2022 - Springer
The massive scale and performance demands of privacy-preserving data aggregation make
integration of security and privacy difficult. Traditional tools in private computing are not well …

Gps: Integration of graphene, palisade, and sgx for large-scale aggregations of distributed data

J Takeshita, C McKechney, J Pajak… - Cryptology ePrint …, 2021 - eprint.iacr.org
Secure computing methods such as fully homomorphic encryption and hardware solutions
such as Intel Software Guard Extension (SGX) have been applied to provide security for user …

FedFa: A Fully Asynchronous Training Paradigm for Federated Learning

H Xu, Z Zhang, S Di, B Liu, KA Alharthi… - arXiv preprint arXiv …, 2024 - arxiv.org
Federated learning has been identified as an efficient decentralized training paradigm for
scaling the machine learning model training on a large number of devices while …

SLAP: simple lattice-based private stream aggregation protocol

J Takeshita, R Karl, T Gong, T Jung - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Abstract Private Stream Aggregation (PSA) protocols allow for the secure aggregation of
time-series data, affording security and privacy to users' private data, with significantly better …

Cryptonomial: a framework for private time-series polynomial calculations

R Karl, J Takeshita, A Mohammed, A Striegel… - Security and Privacy in …, 2021 - Springer
In modern times, data collected from multi-user distributed applications must be analyzed on
a massive scale to support critical business objectives. While analytics often requires the …

[图书][B] Towards Improving and Integrating Homomorphic Cryptography and Trusted Hardware

J Takeshita - 2025 - search.proquest.com
In the modern era of outsourced computing, guaranteeing user data security and privacy on
data in use is important for ensuring user trust and utilization. Both purely cryptographic and …