4.7 Article

Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Privacy-Preserving Object Detection for Medical Images With Faster R-CNN

Yang Liu et al.

Summary: This paper proposes a lightweight privacy-preserving Faster R-CNN framework (SecRCNN) for object detection in medical images. It improves the efficiency through the use of additive secret sharing technique and edge computing, and demonstrates the effectiveness and security through comprehensive theoretical analysis and extensive experiments.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Hardware & Architecture

Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions

Minghui Li et al.

Summary: This article proposes a CNN prediction scheme that preserves privacy in the outsourced setting, and the scheme achieves significant improvements in overall latency and accuracy through optimizations such as secret sharing and triplet generation.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning

Yang Liu et al.

Summary: This article introduces a novel federated learning framework RevFRF and discusses the participant revocation issue in federated learning. By implementing homomorphic encryption based secure protocols, RevFRF can efficiently realize federated random forest and ensure the secure removal of memories of revoked participants in the trained model.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Theory & Methods

SOCI: A Toolkit for Secure Outsourced Computation on Integers

Bowen Zhao et al.

Summary: This paper proposes a secure outsourced computation method, called SOCI, based on partially homomorphic encryption and a twin-server architecture, which enables efficient computation on encrypted integers and improves the security and correctness of the computations.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Proceedings Paper Computer Science, Information Systems

Garbled Circuits with Sublinear Evaluator

Abida Haque et al.

Summary: This article presents a garbling scheme called GCWise, which achieves fully sublinear evaluation by including the evaluator's work within the sublinearity scope. The application of garbled PIR is also demonstrated, which enables non-interactive and sublinear access to private elements in a database.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I (2022)

Article Computer Science, Information Systems

SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing

Xuejiao Liu et al.

Summary: Fog-aided computing is a new computing paradigm aimed at providing various computation services to end users. Researchers propose a secure and efficient outsourcing computing scheme in vehicular fog computing (SE-VFC) which combines lightweight BLS signature and group signature for batch anonymous authentication of fog vehicles while protecting their privacy. Security analysis confirms the effectiveness of the scheme.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Proceedings Paper Computer Science, Information Systems

Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication

Kelong Cong et al.

Summary: This study presents algorithmic improvements on using fully homomorphic encryption for private set intersection protocols in unbalanced settings. The new protocol shows better computation cost and communication complexity compared to previous works, performing particularly well in practical scenarios.

CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)

Proceedings Paper Computer Science, Artificial Intelligence

AsySQN: Faster Vertical Federated Learning Algorithms with Better Computation Resource Utilization

Qingsong Zhang et al.

Summary: The study introduces an asynchronous stochastic quasi-Newton (AsySQN) framework for VFL, which converges faster in practice than SGD methods, significantly reducing the number of communication rounds and better utilizing computation resources.

KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING (2021)

Proceedings Paper Computer Science, Information Systems

Oblivious Key-Value Stores and Amplification for Private Set Intersection

Gayathri Garimella et al.

Summary: The concept of oblivious key-value stores (OKVS) is introduced to compactly represent mappings, leading to new constructions for faster OKVS. OKVS structures can hide the keys used to generate them, enhancing privacy in private set intersection (PSI) protocols.

ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II (2021)

Proceedings Paper Computer Science, Information Systems

Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits

Mike Rosulek et al.

Summary: This paper presents a new and improved garbling scheme for boolean circuits that bypasses the previously established lower bound for AND gate costs. By slicing wire labels in half and operating separately on them, this novel technique achieves efficient garbling with only slightly more computation than existing schemes.

ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I (2021)

Article Computer Science, Theory & Methods

Faster unbalanced Private Set Intersection in the semi-honest setting

Amanda Cristina Davi Resende et al.

Summary: Private Set Intersection (PSI) protocols are essential cryptographic techniques for performing joint operations on datasets while preserving privacy, with optimizations being proposed for unbalanced set sizes in recent studies.

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2021)

Proceedings Paper Computer Science, Information Systems

Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning

Harsh Chaudhari et al.

27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)

Article Computer Science, Hardware & Architecture

Efficient Delegated Private Set Intersection on Outsourced Private Datasets

Aydin Abadi et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Proceedings Paper Computer Science, Information Systems

Efficient Circuit-Based PSI with Linear Communication

Benny Pinkas et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III (2019)

Article Computer Science, Information Systems

Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties

Ye Li et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Scalable Private Set Intersection Based on OT Extension

Benny Pinkas et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2018)

Proceedings Paper Computer Science, Theory & Methods

Fast Secure Computation for Small Population over the Internet

Megha Byali et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

PIR with compressed queries and amortized query processing

Sebastian Angel et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Proceedings Paper Computer Science, Theory & Methods

Scalable Multi-party Private Set-Intersection

Carmit Hazay et al.

PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I (2017)

Proceedings Paper Computer Science, Information Systems

Efficient Batched Oblivious PRF with Applications to Private Set Intersection

Vladimir Kolesnikov et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Theory & Methods

MORE ROBUST HASHING: CUCKOO HASHING WITH A STASH

Adam Kirsch et al.

SIAM JOURNAL ON COMPUTING (2009)