Slap: simpler, improved private stream aggregation from ring learning with errors

J Takeshita, R Karl, T Gong, T Jung - Journal of Cryptology, 2023 - Springer
Abstract Private Stream Aggregation (PSA) protocols perform secure aggregation of time-
series data without leaking information about users' inputs to the aggregator. Previous work …

TERSE: tiny encryptions and really speedy execution for post-quantum private stream aggregation

J Takeshita, Z Carmichael, R Karl, T Jung - International Conference on …, 2022 - Springer
The massive scale and performance demands of privacy-preserving data aggregation make
integration of security and privacy difficult. Traditional tools in private computing are not well …

[HTML][HTML] HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE

Q Wang, L Zhou, J Bai, YS Koh, S Cui, G Russello - Computers & Security, 2023 - Elsevier
Abstract Outsourcing Machine Learning (ML) tasks to cloud servers is a cost-effective
solution when dealing with distributed data. However, outsourcing these tasks to cloud …

ToNN: An Oblivious Neural Network Prediction Scheme with Semi-honest TEE

W Xu, H Zhu, Y Zheng, F Wang, J Hua… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid advancements in machine learning and the widespread adoption of Model-as-
a-Service (MaaS) platforms, there has been significant attention on convolutional neural …

Prefhe, prefhe-aes and prefhe-sgx: Secure multiparty computation protocols from fully homomorphic encryption and proxy reencryption with aes and intel sgx

C Yakupoglu, K Rohloff - … Conference on Security and Privacy in …, 2022 - Springer
We build our secure multiparty computation (MPC) protocols on top of the fully homomorphic
encryption (FHE) scheme, BFVrns, and augment it with Proxy Re-Encryption (PRE). We offer …

Privacy Preserving Function Evaluation Using Lookup Tables with Word-Wise FHE

R Li, H Yamana - IEICE Transactions on Fundamentals of …, 2024 - search.ieice.org
Homomorphic encryption (HE) is a promising approach for privacy-preserving applications,
enabling a third party to assess functions on encrypted data. However, problems persist in …

[图书][B] Towards Improving and Integrating Homomorphic Cryptography and Trusted Hardware

J Takeshita - 2025 - search.proquest.com
In the modern era of outsourced computing, guaranteeing user data security and privacy on
data in use is important for ensuring user trust and utilization. Both purely cryptographic and …

[PDF][PDF] Practical Privacy-preserving Machine Learning

Q Wang - 2024 - researchspace.auckland.ac.nz
Over the past decade, machine learning (ML) has experienced rapid progress, extending
from traditional image recognition tasks to advanced applications such as healthcare …

Quantitative and Qualitative Investigations into Trusted Execution Environments

R Karl - Security and Privacy in Communication Networks: 17th …, 2021 - Springer
I propose to develop a quantitative and qualitative framework to integrate a Trusted
Execution Environment (TEE) into the pipeline of secure computation by combining it with …