ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning
Privacy-Preserving Federated Learning (PPFL) is an emerging secure distributed learning
paradigm that aggregates user-trained local gradients into a federated model through a …
paradigm that aggregates user-trained local gradients into a federated model through a …
Cryptanalysis of block ciphers with overdefined systems of equations
NT Courtois, J Pieprzyk - Advances in Cryptology—ASIACRYPT 2002: 8th …, 2002 - Springer
Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of
small S-boxes interconnected by linear key-dependent layers. Their security relies on the …
small S-boxes interconnected by linear key-dependent layers. Their security relies on the …
Multi-biometric template protection based on homomorphic encryption
In spite of the advantages of biometrics as an identity verification technology, some concerns
have been raised due to the high sensitivity of biometric data: any information leakage …
have been raised due to the high sensitivity of biometric data: any information leakage …
A bimodal face and body gesture database for automatic analysis of human nonverbal affective behavior
H Gunes, M Piccardi - 18th International conference on pattern …, 2006 - ieeexplore.ieee.org
To be able to develop and test robust affective multimodal systems, researchers need
access to novel databases containing representative samples of human multi-modal …
access to novel databases containing representative samples of human multi-modal …
A generalization of Paillier's public-key system with applications to electronic voting
I Damgård, M Jurik, JB Nielsen - International Journal of Information …, 2010 - Springer
We propose a generalization of Paillier's probabilistic public-key system, in which the
expansion factor is reduced and which allows to adjust the block length of the scheme even …
expansion factor is reduced and which allows to adjust the block length of the scheme even …
Composite signal representation for fast and storage-efficient processing of encrypted signals
Signal processing tools working directly on encrypted data could provide an efficient
solution to application scenarios where sensitive signals must be protected from an …
solution to application scenarios where sensitive signals must be protected from an …
Enabling privacy-preservation in decentralized optimization
Decentralized optimization is crucial for the design, deployment, and functionality of many
distributed systems. In this paper, we address the problem of privacy-preservation in …
distributed systems. In this paper, we address the problem of privacy-preservation in …
Efficient two-party secure computation on committed inputs
S Jarecki, V Shmatikov - Advances in Cryptology-EUROCRYPT 2007: 26th …, 2007 - Springer
We present an efficient construction of Yao's “garbled circuits” protocol for securely
computing any two-party circuit on committed inputs. The protocol is secure in a universally …
computing any two-party circuit on committed inputs. The protocol is secure in a universally …
Elliptic curve Paillier schemes
SD Galbraith - Journal of Cryptology, 2002 - Springer
This paper is concerned with generalisations of Paillier's probabilistic encryption scheme
from the integers modulo a square to elliptic curves over rings. Paillier himself described two …
from the integers modulo a square to elliptic curves over rings. Paillier himself described two …
[PDF][PDF] Encrypted domain DCT based on homomorphic cryptosystems
Signal processing in the encrypted domain (sped) appears an elegant solution in
application scenarios, where valuable signals must be protected from a possibly malicious …
application scenarios, where valuable signals must be protected from a possibly malicious …