Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Secure Sorting and Selection via Function Secret Sharing
- Amit Agarwal,
- Elette Boyle,
- Nishanth Chandran,
- Niv Gilboa,
- Divya Gupta,
- Yuval Ishai,
- Mahimna Kelkar,
- Yiping Ma
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3023–3037https://doi.org/10.1145/3658644.3690359We revisit the problem of concretely efficient secure computation of sorting and selection (e.g., maximum, median, or top-k) on secret-shared data, focusing on the case of security against a single semi-honest party. Previous solutions either have a high ...
- research-articleDecember 2024
Securely Training Decision Trees Efficiently
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4673–4687https://doi.org/10.1145/3658644.3670268Decision trees are an important class of supervised learning algorithms. When multiple entities contribute data to train a decision tree (e.g. for fraud detection in the financial sector), data privacy concerns necessitate the use of a privacy-enhancing ...
- research-articleNovember 2024
Blockchain-Based Semantic Exchange Framework for Summarized Video Contents in Wireless Edge Intelligence Network Enabled Web 3.0
IT Professional (IEEECS_ITPRO), Volume 26, Issue 6Pages 70–76https://doi.org/10.1109/MITP.2024.3479925The proliferation of online multimedia content demands effective approaches for semantic exchange of videos and data authentication for information transfer. Video summaries offer an efficient way to enhance user experience by providing a concise, ...
- research-articleDecember 2023
ICN Based Efficient Content Caching Scheme for Vehicular Networks
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 24, Issue 12Pages 15548–15556https://doi.org/10.1109/TITS.2022.3171662The Information Centric Networking (ICN) is a future internet architecture to support efficient content distribution in a vehicular environment. In-network caching in ICN provides a realistic solution for vehicular communication due to storage of content ...
- research-articleMay 2024
Unmasking Compliance: Leveraging Machine Learning for RealTimeFace Mask Detection and Public Safety
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine IntelligenceArticle No.: 38, Pages 1–4https://doi.org/10.1145/3647444.3647864During the COVID-19 pandemic, face masks have become a crucial part of maintaining public health. The real-time face mask detector has potential implications for public health and safety by allowing for quick and efficient monitoring of mask-wearing ...
-
- research-articleMay 2024
Artificial Intelligence empowered content caching for energy optimization in vehicular networks
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine IntelligenceArticle No.: 21, Pages 1–4https://doi.org/10.1145/3647444.3647847Indeed, the development of future autonomous and intelligent transportation systems depends heavily on vehicular networks. They allow vehicles to connect with one another, with roadside infrastructure, and with centralized control systems. RSUs can store ...
- research-articleMay 2024
Transforming Healthcare through Machine Learning: A Revolution in Patient Care
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine IntelligenceArticle No.: 16, Pages 1–4https://doi.org/10.1145/3647444.3647842Machine learning (ML) ushered in a new era in healthcare by providing unprecedented opportunities to improve patient health, improve clinical decision making, and improve patient outcomes. This article provides an overview of the far-reaching ...
- research-articleAugust 2023
Secure floating-point training
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 354, Pages 6329–6346Secure 2-party computation (2PC) of floating-point arithmetic is improving in performance and recent work runs deep learning algorithms with it, while being as numerically precise as commonly used machine learning (ML) frameworks like PyTorch. We find ...
- research-articleJune 2023
Security paradigm for remote health monitoring edge devices in internet of things
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 35, Issue 6https://doi.org/10.1016/j.jksuci.2022.12.020AbstractThe tremendous growth in the internet of things (IoT) technology has provided great support for e-healthcare applications. The remote health monitoring of patients at home is gaining popularity with the increase in design of number of ...
- research-articleAugust 2022
ICN-edge caching scheme for handling multimedia big data traffic in smart cities
Multimedia Tools and Applications (MTAA), Volume 82, Issue 25Pages 39697–39717https://doi.org/10.1007/s11042-022-13518-3AbstractToday, the rapid development, large volume, and global access of multimedia applications have demanded the shifting of network functionality from the central server to the near user. In recent times, Edge Computing (EC) and Information Centric ...
- ArticleMarch 2022
Secure Computation from Leaky Correlated Randomness
AbstractCorrelated secret randomness is an essential resource for information-theoretic cryptography. In the context of secure two-party computation, the high level of efficiency achieved by information-theoretic protocols has motivated a paradigm of ...
- ArticleMarch 2022
Concurrent Secure Computation via Non-Black Box Simulation
AbstractRecently, Goyal (STOC’13) proposed a new non-black box simulation techniques for fully concurrent zero knowledge with straight-line simulation. Unfortunately, so far this technique is limited to the setting of concurrent zero knowledge. The goal ...
- ArticleMarch 2022
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations
AbstractA non-malleable code protects messages against various classes of tampering. Informally, a code is non-malleable if the message contained in a tampered codeword is either the original message, or a completely unrelated one. Although existence of ...
- research-articleJanuary 2022
Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach
Device-to-device (D2D) communication has attracted many researchers, cellular operators, and equipment makers as mobile traffic and bandwidth demands have increased. It supports direct communication within devices with no need for any intermediate node ...
- research-articleNovember 2021
Secure Featurization and Applications to Secure Phishing Detection
CCSW '21: Proceedings of the 2021 on Cloud Computing Security WorkshopPages 83–95https://doi.org/10.1145/3474123.3486759Secure inference allows a server holding a machine learning (ML) inference algorithm with private weights, and a client with a private input, to obtain the output of the inference algorithm, without revealing their respective private inputs to one ...
- research-articleNovember 2021
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 1182–1204https://doi.org/10.1145/3460120.3484591Multiparty Private Set Intersection (mPSI), enables n parties, each holding private sets (each of size m) to securely compute the intersection of these private sets. While several protocols are known for this task, the only concretely efficient protocol ...
- ArticleOctober 2021
- research-articleJuly 2021
ICN-Based Enhanced Cooperative Caching for Multimedia Streaming in Resource Constrained Vehicular Environment
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 22, Issue 7Pages 4588–4600https://doi.org/10.1109/TITS.2020.3043593Today, with the worldwide offer and rapid increment in multimedia applications on the web, the demands of users to get them accessed are also increasing prominently. The users in vehicular environment too expect efficient multimedia streaming while ...
- research-articleNovember 2020
Blockene: a high-throughput blockchain over mobile devices
- Sambhav Satija,
- Apurv Mehra,
- Sudheesh Singanamalla,
- Karan Grover,
- Muthian Sivathanu,
- Nishanth Chandran,
- Divya Gupta,
- Satya Lokam
OSDI'20: Proceedings of the 14th USENIX Conference on Operating Systems Design and ImplementationArticle No.: 32, Pages 567–582We introduce Blockene, a blockchain that reduces resource usage at member nodes by orders of magnitude, requiring only a smartphone to participate in block validation and consensus. Despite being lightweight, Blockene provides a high throughput of ...
- research-articleNovember 2020
CrypTFlow2: Practical 2-Party Secure Inference
- Deevashwer Rathee,
- Mayank Rathee,
- Nishant Kumar,
- Nishanth Chandran,
- Divya Gupta,
- Aseem Rastogi,
- Rahul Sharma
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityPages 325–342https://doi.org/10.1145/3372297.3417274We present CrypTFlow2, a cryptographic framework for secure inference over realistic Deep Neural Networks (DNNs) using secure 2-party computation. CrypTFlow2 protocols are both correct -- i.e., their outputs are bitwise equivalent to the cleartext ...