Publicly verifiable homomorphic secret sharing for polynomial evaluation
X Chen, LF Zhang - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
There are two main security concerns in outsourcing computations. One is how to protect the
privacy of the outsourced data, and the other is how to ensure the correctness of the …
privacy of the outsourced data, and the other is how to ensure the correctness of the …
Non-interactive, secure verifiable aggregation for decentralized, privacy-preserving learning
We propose a novel primitive called NIVA NIVA that allows the distributed aggregation of
multiple users' secret inputs by multiple untrusted servers. The returned aggregation result …
multiple users' secret inputs by multiple untrusted servers. The returned aggregation result …
: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning
Aggregating data from multiple sources is often required in multiple applications. In this
paper, we introduce DEVA DEVA, a protocol that allows a distributed set of servers to …
paper, we introduce DEVA DEVA, a protocol that allows a distributed set of servers to …
Practical and provably secure distributed aggregation: Verifiable additive homomorphic secret sharing
Often clients (eg, sensors, organizations) need to outsource joint computations that are
based on some joint inputs to external untrusted servers. These computations often rely on …
based on some joint inputs to external untrusted servers. These computations often rely on …
Homomorphic Secret Sharing with Verifiable Evaluation
AR Choudhuri, A Goel, A Hegde, A Jain - Theory of Cryptography …, 2025 - Springer
A homomorphic secret sharing (HSS) scheme allows a client to delegate a computation to a
group of untrusted servers while achieving input privacy as long as at least one server is …
group of untrusted servers while achieving input privacy as long as at least one server is …
Verifiable Homomorphic Secret Sharing for Machine Learning Classifiers
X Chen - IEEE Access, 2023 - ieeexplore.ieee.org
When using machine learning classifiers to classify data in cloud computing, it is crucial to
maintain data privacy and ensure the correctness of classification results. To address these …
maintain data privacy and ensure the correctness of classification results. To address these …
WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks
Large amounts of data are collected by IoT devices, and transmitted wirelessly to cloud
servers for aggregation. These data are often sensitive and need to remain secret …
servers for aggregation. These data are often sensitive and need to remain secret …
Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE
P Xu, LP Wang - Australasian Conference on Information Security and …, 2023 - Springer
Homomorphic secret sharing (HSS) allows participants to share their private data between
computing servers for the joint computation of a public function without fully homomorphic …
computing servers for the joint computation of a public function without fully homomorphic …
[图书][B] Cryptographic Tools for Privacy Preservation
C Brunetta - 2021 - search.proquest.com
Cryptographic Tools for Privacy Preservation Page 1 Thesis for The Degree of Doctor of
Philosophy Cryptographic Tools for Privacy Preservation Carlo Brunetta Department of …
Philosophy Cryptographic Tools for Privacy Preservation Carlo Brunetta Department of …
Aggregated Set Membership Proofs
E Hanna - 2021 - odr.chalmers.se
This thesis addresses the issue of inflated computational complexity for the verification of
multiple zero-knowledge proofs. More precisely, verification of numerous zero-knowledge …
multiple zero-knowledge proofs. More precisely, verification of numerous zero-knowledge …