ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning

Z Ma, J Ma, Y Miao, Y Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Privacy-Preserving Federated Learning (PPFL) is an emerging secure distributed learning
paradigm that aggregates user-trained local gradients into a federated model through a …

Cryptanalysis of block ciphers with overdefined systems of equations

NT Courtois, J Pieprzyk - Advances in Cryptology—ASIACRYPT 2002: 8th …, 2002 - Springer
Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of
small S-boxes interconnected by linear key-dependent layers. Their security relies on the …

Multi-biometric template protection based on homomorphic encryption

M Gomez-Barrero, E Maiorana, J Galbally, P Campisi… - Pattern Recognition, 2017 - Elsevier
In spite of the advantages of biometrics as an identity verification technology, some concerns
have been raised due to the high sensitivity of biometric data: any information leakage …

A bimodal face and body gesture database for automatic analysis of human nonverbal affective behavior

H Gunes, M Piccardi - 18th International conference on pattern …, 2006 - ieeexplore.ieee.org
To be able to develop and test robust affective multimodal systems, researchers need
access to novel databases containing representative samples of human multi-modal …

A generalization of Paillier's public-key system with applications to electronic voting

I Damgård, M Jurik, JB Nielsen - International Journal of Information …, 2010 - Springer
We propose a generalization of Paillier's probabilistic public-key system, in which the
expansion factor is reduced and which allows to adjust the block length of the scheme even …

Composite signal representation for fast and storage-efficient processing of encrypted signals

T Bianchi, A Piva, M Barni - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
Signal processing tools working directly on encrypted data could provide an efficient
solution to application scenarios where sensitive signals must be protected from an …

Enabling privacy-preservation in decentralized optimization

C Zhang, Y Wang - IEEE Transactions on Control of Network …, 2018 - ieeexplore.ieee.org
Decentralized optimization is crucial for the design, deployment, and functionality of many
distributed systems. In this paper, we address the problem of privacy-preservation in …

Efficient two-party secure computation on committed inputs

S Jarecki, V Shmatikov - Advances in Cryptology-EUROCRYPT 2007: 26th …, 2007 - Springer
We present an efficient construction of Yao's “garbled circuits” protocol for securely
computing any two-party circuit on committed inputs. The protocol is secure in a universally …

Elliptic curve Paillier schemes

SD Galbraith - Journal of Cryptology, 2002 - Springer
This paper is concerned with generalisations of Paillier's probabilistic encryption scheme
from the integers modulo a square to elliptic curves over rings. Paillier himself described two …

[PDF][PDF] Encrypted domain DCT based on homomorphic cryptosystems

T Bianchi, A Piva, M Barni - EURASIP Journal on Information Security, 2009 - Springer
Signal processing in the encrypted domain (sped) appears an elegant solution in
application scenarios, where valuable signals must be protected from a possibly malicious …