Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Marina Blanton"'
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:432-445
Motivated by the importance of floating-point computations, we study the problem of securely and accurately summing many floating-point numbers. Prior work has focused on security absent accuracy or accuracy absent security, whereas our approach achi
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:608-626
Secure multi-party computation has seen significant performance advances and increasing use in recent years. Techniques based on secret sharing offer attractive performance and are a popular choice for privacy-preserving machine learning applications
Autor:
Marina Blanton, Chen Yuan
Publikováno v:
Proceedings 2022 Network and Distributed System Security Symposium.
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030578077
ACNS (1)
ACNS (1)
Secure multi-party computation permits evaluation of any desired functionality on private data without disclosing the data to the participants. It is gaining its popularity due to increasing collection of user, customer, or patient data and the need
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6d4bfd32979393c85c5bb8d8d060e2c7
https://doi.org/10.1007/978-3-030-57808-4_19
https://doi.org/10.1007/978-3-030-57808-4_19
Publikováno v:
International Journal of Information Security. 18:371-391
In this paper, we consider the problem of secure pattern matching that uses evaluation of non-deterministic string matching automata (NSMA). Our solution is based on a class of hardware-based pattern matching algorithms called bit-parallel pattern ma
Publikováno v:
ACM Computing Surveys. 51:1-40
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outs
Publikováno v:
ACM Transactions on Privacy and Security. 21:1-34
Recent compilers allow a general-purpose program (written in a conventional programming language) that handles private data to be translated into a secure distributed implementation of the corresponding functionality. The resulting program is then gu
Publikováno v:
IEEE Security & Privacy. 15:20-28
In many genomic applications, especially nonmedical applications, computations are carried out in a server-mediated setting where the server enables joint genomic computations between users. Thus, it’s sensible to utilize the server’s computation
Publikováno v:
International Journal of Information Security. 16:577-601
Hidden Markov model (HMM) is a popular statistical tool with a large number of applications in pattern recognition. In some of these applications, such as speaker recognition, the computation involves personal data that can identify individuals and m
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 4, Pp 144-164 (2016)
Computation based on genomic data is becoming increasingly popular today, be it for medical or other purposes. Non-medical uses of genomic data in a computation often take place in a server-mediated setting where the server offers the ability for joi