Privacy-preserving solutions for blockchain: Review and challenges

JB Bernabe, JL Canovas, JL Hernandez-Ramos… - Ieee …, 2019 - ieeexplore.ieee.org
Blockchains offer a decentralized, immutable and verifiable ledger that can record
transactions of digital assets, provoking a radical change in several innovative scenarios …

Sok: General purpose compilers for secure multi-party computation

M Hastings, B Hemenway, D Noble… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …

A method for crack detection on a concrete structure

Y Fujita, Y Mitani, Y Hamamoto - 18th International Conference …, 2006 - ieeexplore.ieee.org
Recently, interest in automatic crack detection on concrete structure images for non-
destructive inspection has been increasing. In general, there are various noises such as …

Strain: A secure auction for blockchains

EO Blass, F Kerschbaum - … Symposium on Research in Computer Security, 2018 - Springer
We present Strain, a new auction protocol running on top of blockchains and guaranteeing
bid confidentiality against fully-malicious parties. As our goal is efficiency and low …

Raziel: Private and verifiable smart contracts on blockchains

DC Sánchez - arXiv preprint arXiv:1807.09484, 2018 - arxiv.org
Raziel combines secure multi-party computation and proof-carrying code to provide privacy,
correctness and verifiability guarantees for smart contracts on blockchains. Effectively …

High-precision secure computation of satellite collision probabilities

B Hemenway, S Lu, R Ostrovsky… - Security and Cryptography …, 2016 - Springer
The costs of designing, building, launching and maintaining satellites make satellite
operators extremely motivated to protect their on-orbit assets. Unfortunately, privacy …

Sok: Privacy on mobile devices–it's complicated

C Spensky, J Stewart, A Yerukhimovich… - Proceedings on …, 2016 - petsymposium.org
Modern mobile devices place a wide variety of sensors and services within the personal
space of their users. As a result, these devices are capable of transparently monitoring many …

Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data

D Bogdanov, L Kamm, S Laur… - IEEE/ACM transactions on …, 2018 - ieeexplore.ieee.org
We improve the quality of cryptographically privacy-preserving genome-wide association
studies by correctly handling population stratification-the inherent genetic difference of …

FuturesMEX: secure, distributed futures market exchange

F Massacci, CN Ngo, J Nie, D Venturi… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
In a Futures-Exchange, such as the Chicago Mercantile Exchange, traders buy and sell
contractual promises (futures) to acquire or deliver, at some future pre-specified date, assets …

Trusted smart statistics: Motivations and principles

F Ricciato, A Wirthmann… - Statistical Journal of …, 2019 - content.iospress.com
In this contribution we outline the concept of Trusted Smart Statistics as the natural evolution
of official statistics in the new datafied world. Traditional data sources, namely survey and …