private computation
Recently Published Documents


TOTAL DOCUMENTS

38
(FIVE YEARS 2)

H-INDEX

9
(FIVE YEARS 0)

Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5805
Author(s):  
João S. Resende ◽  
Luís Magalhães ◽  
André Brandão ◽  
Rolando Martins ◽  
Luís Antunes

The growing demand for everyday data insights drives the pursuit of more sophisticated infrastructures and artificial intelligence algorithms. When combined with the growing number of interconnected devices, this originates concerns about scalability and privacy. The main problem is that devices can detect the environment and generate large volumes of possibly identifiable data. Public cloud-based technologies have been proposed as a solution, due to their high availability and low entry costs. However, there are growing concerns regarding data privacy, especially with the introduction of the new General Data Protection Regulation, due to the inherent lack of control caused by using off-premise computational resources on which public cloud belongs. Users have no control over the data uploaded to such services as the cloud, which increases the uncontrolled distribution of information to third parties. This work aims to provide a modular approach that uses cloud-of-clouds to store persistent data and reduce upfront costs while allowing information to remain private and under users’ control. In addition to storage, this work also extends focus on usability modules that enable data sharing. Any user can securely share and analyze/compute the uploaded data using private computing without revealing private data. This private computation can be training machine learning (ML) models. To achieve this, we use a combination of state-of-the-art technologies, such as MultiParty Computation (MPC) and K-anonymization to produce a complete system with intrinsic privacy properties.


2021 ◽  
pp. 1-16
Author(s):  
Ch Koteswara Rao ◽  
Kunwar Singh ◽  
Anoop Kumar

Multi-party computation (MPC) sorting and searching protocols are frequently used in different databases with varied applications, as in cooperative intrusion detection systems, private computation of set intersection and oblivious RAM. Ivan Damgard et al. have proposed two techniques i.e., bit-decomposition protocol and bit-wise less than protocol for MPC. These two protocols are used as building blocks and have proposed two oblivious MPC protocols. The proposed protocols are based on data-dependent algorithms such as insertion sort and binary search. The proposed multi-party sorting protocol takes the shares of the elements as input and outputs the shares of the elements in sorted order. The proposed protocol exhibits O ( 1 ) constant round complexity and O ( n log n ) communication complexity. The proposed multi-party binary search protocol takes two inputs. One is the shares of the elements in sorted order and the other one is the shares of the element to be searched. If the position of the search element exists, the protocol returns the corresponding shares, otherwise it returns shares of zero. The proposed multi-party binary search protocol exhibits O ( 1 ) round complexity and O ( n log n ) communication complexity. The proposed multi-party sorting protocol works better than the existing quicksort protocol when the input is in almost sorted order. The proposed multi-party searching protocol gives almost the same results, when compared to the general binary search algorithm.


2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Cai Zhang ◽  
Yinxiang Long ◽  
Zhiwei Sun ◽  
Qin Li ◽  
Qiong Huang

AbstractPrivate Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA) are two cryptographic primitives whereby two or more parties are able to obtain the cardinalities of the intersection and the union of their respective private sets, and the privacy of their sets is preserved. In this paper, we propose a three-party protocol to finish these tasks by using quantum resources, where every two, as well as three, parties can obtain the cardinalities of the intersection and the union of their private sets with the help of a semi-honest third party (TP). In our protocol, GHZ states play a role in encoding private information that will be used by TP to compute the cardinalities. We show that the presented protocol is secure against well-known quantum attacks. In addition, we analyze the influence of six typical kinds of Markovian noise on our protocol.


2020 ◽  
Vol 2020 (4) ◽  
pp. 131-152 ◽  
Author(s):  
Xihui Chen ◽  
Sjouke Mauw ◽  
Yunior Ramírez-Cruz

AbstractWe present a novel method for publishing differentially private synthetic attributed graphs. Our method allows, for the first time, to publish synthetic graphs simultaneously preserving structural properties, user attributes and the community structure of the original graph. Our proposal relies on CAGM, a new community-preserving generative model for attributed graphs. We equip CAGM with efficient methods for attributed graph sampling and parameter estimation. For the latter, we introduce differentially private computation methods, which allow us to release communitypreserving synthetic attributed social graphs with a strong formal privacy guarantee. Through comprehensive experiments, we show that our new model outperforms its most relevant counterparts in synthesising differentially private attributed social graphs that preserve the community structure of the original graph, as well as degree sequences and clustering coefficients.


Author(s):  
Sean Bowe ◽  
Alessandro Chiesa ◽  
Matthew Green ◽  
Ian Miers ◽  
Pratyush Mishra ◽  
...  
Keyword(s):  

Author(s):  
Eduardo Chielle ◽  
Nektarios Georgios Tsoutsos ◽  
Oleg Mazonka ◽  
Michail Maniatakos
Keyword(s):  

2019 ◽  
Vol 23 (4) ◽  
pp. 2517-2531
Author(s):  
Vijay Kumar Yadav ◽  
Anshul Anand ◽  
Shekhar Verma ◽  
S. Venkatesan

2019 ◽  
Vol 65 (6) ◽  
pp. 3880-3897 ◽  
Author(s):  
Hua Sun ◽  
Syed Ali Jafar
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document