Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
- ArticleJuly 2024
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy
AbstractThis paper investigates efficient and confidential circuit garbling techniques. The primary contribution of this research is the introduction of GPGRR2 (Gate Privacy preserving Garbled Row Reduction), a technique aimed at constructing garbled ...
- research-articleJanuary 2021
FastGarble: an optimised garbled circuit construction framework
International Journal of Grid and Utility Computing (IJGUC), Volume 12, Issue 3Pages 263–275https://doi.org/10.1504/ijguc.2021.117846The emerging field of cryptography, Secure Computation, can be used to solve a number of distributed computing applications without loss of privacy of sensitive/private data. The applications can be simple as coin tossing, agreement between parties, or ...
- posterOctober 2020
POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model
ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications SecurityPages 895–897https://doi.org/10.1145/3320269.3405436Data stored on centralized cloud servers may have some risks. Moreover, it may leak the data access pattern when accessing data on cloud servers. Oblivious RAM (ORAM) is a candidate solution to hide the data access pattern, but it inherently induces ...
- research-articleNovember 2018
P3: Privacy Preserving Positioning for Smart Automotive Systems
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 23, Issue 6Article No.: 79, Pages 1–19https://doi.org/10.1145/3236625This article presents the first privacy-preserving localization method based on provably secure primitives for smart automotive systems. Using this method, a car that is lost due to unavailability of GPS can compute its location with assistance from ...
- research-articleJune 2018
MAXelerator: FPGA accelerator for privacy preserving multiply-accumulate (MAC) on cloud servers
DAC '18: Proceedings of the 55th Annual Design Automation ConferenceArticle No.: 33, Pages 1–6https://doi.org/10.1145/3195970.3196074This paper presents MAXelerator, the first hardware accelerator for privacy-preserving machine learning (ML) on cloud servers. Cloud-based ML is being increasingly employed in various data sensitive scenarios. While it enhances both efficiency and ...
- research-articleJune 2018
Deepsecure: scalable provably-secure deep learning
DAC '18: Proceedings of the 55th Annual Design Automation ConferenceArticle No.: 2, Pages 1–6https://doi.org/10.1145/3195970.3196023This paper presents DeepSecure, the an scalable and provably secure Deep Learning (DL) framework that is built upon automated design, efficient logic synthesis, and optimization methodologies. DeepSecure targets scenarios in which neither of the ...
- research-articleOctober 2017Best Paper
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 21–37https://doi.org/10.1145/3133956.3134053We propose a simple and efficient framework for obtaining efficient constant-round protocols for maliciously secure two-party computation. Our framework uses a function-independent preprocessing phase to generate authenticated information for the two ...
- research-articleOctober 2017
Global-Scale Secure Multiparty Computation
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 39–56https://doi.org/10.1145/3133956.3133979We propose a new, constant-round protocol for multi-party computation of boolean circuits that is secure against an arbitrary number of malicious corruptions. At a high level, we extend and generalize recent work of Wang et al. in the two-party setting. ...
- research-articleJune 2016
Privacy preserving localization for smart automotive systems
DAC '16: Proceedings of the 53rd Annual Design Automation ConferenceArticle No.: 26, Pages 1–6https://doi.org/10.1145/2897937.2898071This paper presents the first provably secure localization method for smart automotive systems. Using this method, a lost car can compute its location with assistance from three nearby cars while the locations of all the participating cars including the ...
- research-articleJune 2016
GarbledCPU: a MIPS processor for secure computation in hardware
- Ebrahim M. Songhori,
- Shaza Zeitouni,
- Ghada Dessouky,
- Thomas Schneider,
- Ahmad-Reza Sadeghi,
- Farinaz Koushanfar
DAC '16: Proceedings of the 53rd Annual Design Automation ConferenceArticle No.: 73, Pages 1–6https://doi.org/10.1145/2897937.2898027We present GarbledCPU, the first framework that realizes a hardware-based general purpose sequential processor for secure computation. Our MIPS-based implementation enables development of applications (functions) in a high-level language while ...
- research-articleJune 2015
A Privacy-Preserving Bipartite Graph Matching Framework for Multimedia Analysis and Retrieval
ICMR '15: Proceedings of the 5th ACM on International Conference on Multimedia RetrievalPages 243–250https://doi.org/10.1145/2671188.2749286The emergence of cloud computing provides an unlimited computation/storage for users, and yields new opportunities for multimedia analysis and retrieval research. However, privacy of users, e.g., search intention, may be leaked to the server and ...
- research-articleJune 2015
Compacting privacy-preserving k-nearest neighbor search using logic synthesis
DAC '15: Proceedings of the 52nd Annual Design Automation ConferenceArticle No.: 36, Pages 1–6https://doi.org/10.1145/2744769.2744808This paper introduces the first efficient, scalable, and practical method for privacy-preserving k-nearest neighbors (k-NN) search. The approach enables performing the widely used k-NN search in sensitive scenarios where none of the parties reveal their ...
- ArticleMarch 2013
Secure and verifiable outsourcing of sequence comparisons
ICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication TechnologyPages 243–252https://doi.org/10.1007/978-3-642-36818-9_25With the advent of cloud computing, secure outsourcing techniques of sequence comparisons are becoming increasingly valuable, especially for clients with limited resources. One of the most critical functionalities in data outsourcing is verifiability. ...
- ArticleMarch 2009
Verifiable Threshold Secret Sharing and Full Fair Secure Two-Party Computation
AST '09: Proceedings of the 2009 International e-Conference on Advanced Science and TechnologyPages 78–83https://doi.org/10.1109/AST.2009.21Based on the verifiable encryption and zero-knowledge proof protocols of Jarecki and Shmatikov and Pedersen’s verifiable threshold secret sharing scheme, this paper proposes a new full fair secure two-party computation protocols. For getting full fair, ...
- articleJune 2006
COMPUTATIONALLY PRIVATE RANDOMIZING POLYNOMIALS AND THEIR APPLICATIONS
Computational Complexity (COCO), Volume 15, Issue 2Pages 115–162https://doi.org/10.1007/s00037-006-0211-8Randomizing polynomials allow representing a function f ( x ) by a low-degree randomized mapping $$\hat{f}(x, r)$$ whose output distribution on an input x is a randomized encoding of f ( x ). It is known that any function f in uniform $$\bigoplus$$ L/poly (and in ...