[HTML][HTML] Convergence of Blockchain, k-medoids and homomorphic encryption for privacy preserving biomedical data classification

S Akter, F Reza, M Ahmed - Internet of Things and Cyber-Physical Systems, 2022 - Elsevier
Data privacy on the Internet of Medical Things (IoMT) remains a critical concern when
handling biomedical data. While extant studies focus on cryptography and differential …

The formal theory of relative monads

N Arkor, D McDermott - Journal of Pure and Applied Algebra, 2024 - Elsevier
We develop the theory of relative monads and relative adjunctions in a virtual equipment,
extending the theory of monads and adjunctions in a 2-category. The theory of relative …

Asynchronous Probabilistic Couplings in Higher-Order Separation Logic

SO Gregersen, A Aguirre, PG Haselwarter… - Proceedings of the …, 2024 - dl.acm.org
Probabilistic couplings are the foundation for many probabilistic relational program logics
and arise when relating random sampling statements across two programs. In relational …

Measure construction by extension in dependent type theory with application to integration

R Affeldt, C Cohen - Journal of Automated Reasoning, 2023 - Springer
We report on an original formalization of measure and integration theory in the Coq proof
assistant. We build the Lebesgue measure following a standard construction that had not yet …

State separation for code-based game-playing proofs

C Brzuska, A Delignat-Lavaud, C Fournet… - Advances in Cryptology …, 2018 - Springer
The security analysis of real-world protocols involves reduction steps that are conceptually
simple but still have to account for many protocol complications found in standards and …

Stateful protocol composition in Isabelle/HOL

AV Hess, SA Mödersheim, AD Brucker - ACM Transactions on Privacy …, 2023 - dl.acm.org
Communication networks like the Internet form a large distributed system where a huge
number of components run in parallel, such as security protocols and distributed web …

Formalizing soundness proofs of SNARKs

B Bailey, A Miller - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract Succinct Non-interactive Arguments of Knowledge (SNARKs) have seen interest
and development from the cryptographic community over recent years, and there are now …

Formalizing Soundness Proofs of Linear {PCP}{SNARKs}

B Bailey, A Miller - 33rd USENIX Security Symposium (USENIX Security …, 2024 - usenix.org
Succinct Non-interactive Arguments of Knowledge (SNARKs) have seen interest and
development from the cryptographic community over recent years, and there are now …

A state-separating proof for yao's garbling scheme

C Brzuska, S Oechsner - 2023 IEEE 36th Computer Security …, 2023 - ieeexplore.ieee.org
Secure multiparty computation enables mutually distrusting parties to compute a public
function of their secret inputs. One of the main approaches for designing MPC protocols are …

Extracting functional programs from Coq, in Coq

D Annenkov, M Milo, JB Nielsen… - Journal of Functional …, 2022 - cambridge.org
We implement extraction of Coq programs to functional languages based on MetaCoq's
certified erasure. We extend the MetaCoq erasure output language with typing information …