Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

MP-SPDZ: A versatile framework for multi-party computation

M Keller - Proceedings of the 2020 ACM SIGSAC conference on …, 2020 - dl.acm.org
Multi-Protocol SPDZ (MP-SPDZ) is a fork of SPDZ-2 (Keller et al., CCS'13), an
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …

[HTML][HTML] Privacy preservation in federated learning: An insightful survey from the GDPR perspective

N Truong, K Sun, S Wang, F Guitton, YK Guo - Computers & Security, 2021 - Elsevier
In recent years, along with the blooming of Machine Learning (ML)-based applications and
services, ensuring data privacy and security have become a critical obligation. ML-based …

Sok: General purpose compilers for secure multi-party computation

M Hastings, B Hemenway, D Noble… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …

[HTML][HTML] Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

S Ali, SA Wadho, A Yichiet, ML Gan, CK Lee - Egyptian Informatics Journal, 2024 - Elsevier
Cloud computing security and data protection are becoming increasingly critical as its use
increases. The research we present demonstrates how undercover sharing techniques and …

Secret-sharing schemes: A survey

A Beimel - International conference on coding and cryptology, 2011 - Springer
A secret-sharing scheme is a method by which a dealer distributes shares to parties such
that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes …

[图书][B] Secure multiparty computation

R Cramer, IB Damgård - 2015 - books.google.com
In a data-driven society, individuals and companies encounter numerous situations where
private information is an important resource. How can parties handle confidential data if they …

Private circuits: Securing hardware against probing attacks

Y Ishai, A Sahai, D Wagner - Advances in Cryptology-CRYPTO 2003: 23rd …, 2003 - Springer
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider
the problem of protecting privacy in c ircuits, when faced with an adversary that can access a …

Privacy-preserving set operations

L Kissner, D Song - Annual International Cryptology Conference, 2005 - Springer
In many important applications, a collection of mutually distrustful parties must perform
private computation over multisets. Each party's input to the function is his private input …