Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation

A Kulshrestha, J Mayer - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …

Clustering-based efficient privacy-preserving face recognition scheme without compromising accuracy

M Liu, H Hu, H Xiang, C Yang, L Lyu… - ACM Transactions on …, 2021 - dl.acm.org
Recently, biometric identification has been extensively used for border control. Some face
recognition systems have been designed based on Internet of Things. But the rich personal …

[PDF][PDF] Secure judgment of point and line relationship against malicious adversaries and its applications

X Liu, Y Xu, G Xu, XB Chen, YL Chen - Journal of Internet …, 2022 - jit.ndhu.edu.tw
With the rapid development of the Internet and information technology, the problem of zero-
trust networks has become increasingly prominent, and secure multi-party computation has …

Research on the Millionaires' Problem under the Malicious Model Based on the Elliptic Curve Cryptography

X Liu, Y Xu, G Xu, B Li - Security and Communication Networks, 2022 - Wiley Online Library
With the rapid development of blockchain, big data, cloud computing, and artificial
intelligence, the security of multisource data collaborative computing has become …

The secure judgment of graphic similarity against malicious adversaries

X Liu, Y Xu, G Xu, XB Chen - 2022 - researchsquare.com
With the the advent era of big data, the secure computation calculates data on the premise of
protecting data privacy, to realize the availability and invisibility of data. Secure multi-party …