Dipsauce: efficient private stream aggregation without trusted parties

J Brorsson, M Gunnarsson - Nordic Conference on Secure IT Systems, 2023 - Springer
Abstract Private Stream Aggregation (PSA) schemes are efficient protocols for distributed
data analytics. In a PSA scheme, a set of data producers can encrypt data for a central party …

: One-shot Private Aggregation with Single Client Interaction and its Applications to Federated Learning

H Karthikeyan, A Polychroniadou - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Our work aims to minimize interaction in secure computation due to the high cost and
challenges associated with communication rounds, particularly in scenarios with many …

PPSA: Polynomial Private Stream Aggregation for Time-Series Data Analysis

A Januszewicz, DM Gutierrez, N Koirala… - Cryptology ePrint …, 2024 - eprint.iacr.org
Modern data analytics requires computing functions on streams of data points from many
users that are challenging to calculate, due to both the high scale and nontrivial nature of the …

LaPSuS—A Lattice-Based Private Stream Aggregation Scheme Under Scrutiny

J Ottenhues, A Koch - … Conference on Security and Cryptography for …, 2024 - Springer
Abstract Private Stream Aggregation (PSA) allows clients to send encryptions of their private
values to an aggregator that is then able to learn the sum of these values but nothing else. It …

Decentralized Private Stream Aggregation from Lattices

U Dowerah, A Mitrokotsa - … on Applied Cryptography and Network Security, 2024 - Springer
As various industries and government agencies increasingly seek to build quantum
computers, the development of post-quantum constructions for different primitives becomes …

[PDF][PDF] Explainable AI for High-stakes Decision-making

Z Carmichael - 2024 - curate.nd.edu
As a result of the many recent advancements in artificial intelligence (AI), a significant
interest in the technology has developed from high-stakes decision-makers in industries …

[图书][B] Towards Improving and Integrating Homomorphic Cryptography and Trusted Hardware

J Takeshita - 2025 - search.proquest.com
In the modern era of outsourced computing, guaranteeing user data security and privacy on
data in use is important for ensuring user trust and utilization. Both purely cryptographic and …

[PDF][PDF] Efficient Security Protocols for Constrained Devices

M Gunnarsson - 2023 - portal.research.lu.se
During the last decades, more and more devices have been connected to the Internet.
Today, there are more devices connected to the Internet than humans. An increasingly more …