Slap: simpler, improved private stream aggregation from ring learning with errors
J Takeshita, R Karl, T Gong, T Jung - Journal of Cryptology, 2023 - Springer
Abstract Private Stream Aggregation (PSA) protocols perform secure aggregation of time-
series data without leaking information about users' inputs to the aggregator. Previous work …
series data without leaking information about users' inputs to the aggregator. Previous work …
TERSE: tiny encryptions and really speedy execution for post-quantum private stream aggregation
The massive scale and performance demands of privacy-preserving data aggregation make
integration of security and privacy difficult. Traditional tools in private computing are not well …
integration of security and privacy difficult. Traditional tools in private computing are not well …
[HTML][HTML] HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE
Abstract Outsourcing Machine Learning (ML) tasks to cloud servers is a cost-effective
solution when dealing with distributed data. However, outsourcing these tasks to cloud …
solution when dealing with distributed data. However, outsourcing these tasks to cloud …
ToNN: An Oblivious Neural Network Prediction Scheme with Semi-honest TEE
With the rapid advancements in machine learning and the widespread adoption of Model-as-
a-Service (MaaS) platforms, there has been significant attention on convolutional neural …
a-Service (MaaS) platforms, there has been significant attention on convolutional neural …
Prefhe, prefhe-aes and prefhe-sgx: Secure multiparty computation protocols from fully homomorphic encryption and proxy reencryption with aes and intel sgx
C Yakupoglu, K Rohloff - … Conference on Security and Privacy in …, 2022 - Springer
We build our secure multiparty computation (MPC) protocols on top of the fully homomorphic
encryption (FHE) scheme, BFVrns, and augment it with Proxy Re-Encryption (PRE). We offer …
encryption (FHE) scheme, BFVrns, and augment it with Proxy Re-Encryption (PRE). We offer …
Privacy Preserving Function Evaluation Using Lookup Tables with Word-Wise FHE
R Li, H Yamana - IEICE Transactions on Fundamentals of …, 2024 - search.ieice.org
Homomorphic encryption (HE) is a promising approach for privacy-preserving applications,
enabling a third party to assess functions on encrypted data. However, problems persist in …
enabling a third party to assess functions on encrypted data. However, problems persist in …
[图书][B] Towards Improving and Integrating Homomorphic Cryptography and Trusted Hardware
J Takeshita - 2025 - search.proquest.com
In the modern era of outsourced computing, guaranteeing user data security and privacy on
data in use is important for ensuring user trust and utilization. Both purely cryptographic and …
data in use is important for ensuring user trust and utilization. Both purely cryptographic and …
[PDF][PDF] Practical Privacy-preserving Machine Learning
Q Wang - 2024 - researchspace.auckland.ac.nz
Over the past decade, machine learning (ML) has experienced rapid progress, extending
from traditional image recognition tasks to advanced applications such as healthcare …
from traditional image recognition tasks to advanced applications such as healthcare …
Quantitative and Qualitative Investigations into Trusted Execution Environments
R Karl - Security and Privacy in Communication Networks: 17th …, 2021 - Springer
I propose to develop a quantitative and qualitative framework to integrate a Trusted
Execution Environment (TEE) into the pipeline of secure computation by combining it with …
Execution Environment (TEE) into the pipeline of secure computation by combining it with …