Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …
contexts. For instance, with the emergence of distributed applications, several providers are …
Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
MP-SPDZ: A versatile framework for multi-party computation
M Keller - Proceedings of the 2020 ACM SIGSAC conference on …, 2020 - dl.acm.org
Multi-Protocol SPDZ (MP-SPDZ) is a fork of SPDZ-2 (Keller et al., CCS'13), an
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
[HTML][HTML] Privacy preservation in federated learning: An insightful survey from the GDPR perspective
In recent years, along with the blooming of Machine Learning (ML)-based applications and
services, ensuring data privacy and security have become a critical obligation. ML-based …
services, ensuring data privacy and security have become a critical obligation. ML-based …
Sok: General purpose compilers for secure multi-party computation
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …
compute a joint function on their inputs without revealing any information beyond the result …
[HTML][HTML] Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing
Cloud computing security and data protection are becoming increasingly critical as its use
increases. The research we present demonstrates how undercover sharing techniques and …
increases. The research we present demonstrates how undercover sharing techniques and …
Secret-sharing schemes: A survey
A Beimel - International conference on coding and cryptology, 2011 - Springer
A secret-sharing scheme is a method by which a dealer distributes shares to parties such
that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes …
that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes …
[图书][B] Secure multiparty computation
R Cramer, IB Damgård - 2015 - books.google.com
In a data-driven society, individuals and companies encounter numerous situations where
private information is an important resource. How can parties handle confidential data if they …
private information is an important resource. How can parties handle confidential data if they …
Private circuits: Securing hardware against probing attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider
the problem of protecting privacy in c ircuits, when faced with an adversary that can access a …
the problem of protecting privacy in c ircuits, when faced with an adversary that can access a …
Privacy-preserving set operations
L Kissner, D Song - Annual International Cryptology Conference, 2005 - Springer
In many important applications, a collection of mutually distrustful parties must perform
private computation over multisets. Each party's input to the function is his private input …
private computation over multisets. Each party's input to the function is his private input …