A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
BMIAE: Blockchain-based Multi-instance Iris Authentication using Additive ElGamal Homomorphic Encryption
2020
IET Biometrics
In the past few years, many biometric authentication systems based on homomorphic encryption have been introduced to provide security for the templates. ...
BMIAE encrypt the iris templates using ElGamal encryption to guarantee confidentiality and Smart contract running on a Blockchain helps to achieve the integrity of templates and matching result. ...
ElGamal HE is a multiplicative homomorphic cryptosystem and is more efficient than other algorithms (e.g. RSA and Paillier) in terms of encryption and decryption efficiency [23, 46] . ...
doi:10.1049/iet-bmt.2019.0169
fatcat:qpq4glnjcnfaxh5dazkld6z6na
McFly: Verifiable Encryption to the Future Made Practical
[article]
2022
IACR Cryptology ePrint Archive
The scheme remains practical for a committee of size 2000 with an encryption time of 58s and decryption time of 218s. ...
For the popular BLS12-381 curve, a 381-bit message and a committee of size 500 the encryption time is 9.8s and decryption is 14.8s. ...
by solving the time-lock puzzles and retrieving the bids. ...
dblp:journals/iacr/DottlingHMW22
fatcat:susa6qzugjcl3p4bi7tujwwehy
A 2 L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs
[article]
2019
IACR Cryptology ePrint Archive
and randomizable puzzles. ...
In theory, we demonstrate for the first time that it is possible to design a secure and privacy-preserving PCH while requiring only digital signatures and timelock functionality from the underlying scripting ...
Homomorphic encryption scheme. ...
dblp:journals/iacr/TairiMM19
fatcat:koopkuh7cng2zivee4wqvb2pre
Key-Nets: Optical Transformation Convolutional Networks for Privacy Preserving Vision Sensors
[article]
2020
arXiv
pre-print
Therefore, the key-net is the first practical, efficient and privacy preserving vision sensor based on optical homomorphic encryption. ...
Finally, we show that a key-net is equivalent to homomorphic encryption using a Hill cipher, with an upper bound on memory and runtime that scales quadratically with a user specified privacy parameter. ...
Homomorphic encryption (HE) [7] [24] [29] [45] is a form of encryption which allows specific types of computations to be carried out on ciphertext and generate an encrypted result which, when decrypted ...
arXiv:2008.04469v2
fatcat:j47cr3erxzdildtn3gnuwkk2kq
Chasing the AIDS virus
2010
Communications of the ACM
Current Advertising rates can be found by visiting http://www.acm-media.org or by contacting ACM Media sales at (212) 626-0654. ...
ACM Media Advertising Policy Communications of the ACM and other ACM Media publications accept advertising in both print and electronic formats. ...
Walter, and the Euresist consortium, especially, Francesca Incardona, Maurizio Zazzi, and Anders Sönnerborg. ...
doi:10.1145/1666420.1666440
fatcat:o2qllqh4tzhh5dzgvnjewl52vq
TEE-based decentralized recommender systems: The raw data sharing redemption
[article]
2022
arXiv
pre-print
that share only parameters, while fully protecting privacy by leveraging trustworthy hardware enclaves with very little overhead. ...
Firstly, REX enables raw data sharing, which ultimately speeds up convergence and reduces the network load. Secondly, REX fully preserves privacy. ...
approaches involved differential privacy or homomorphic encryption (HE). ...
arXiv:2202.11655v1
fatcat:6jra2xvuzvd5znqynowfi3t63y
Proof of All: Verifiable Computation in a Nutshell
[article]
2019
arXiv
pre-print
I take advantage of this model to analyse innovative technologies (Homomorphic Authenticators, Verifiable Delay Functions) which developed into their own specialised domains, and I attempt to make them ...
Furthermore, I expand on the future of Verifiable Computation, Universal proof compilers and "Proofs of All", by approaching the state-of-the-art zk-STARK construction from a more accessible and informal ...
Timed encryption can be leveraged to build scheduled payments: one could prepare multiple transactions in advance, and they would self-decrypt in due time. ...
arXiv:1908.02327v2
fatcat:fdhmpzpnqfhprhijoy3zdradze
Privacy-preserving solutions for Blockchain: review and challenges
2019
IEEE Access
Bitcoin and Ethereum, as well as privacy-preserving research proposals and solutions in permissioned and private blockchains. Diverse blockchain scenarios are analyzed, ...
in this promising and disrupting technology. ...
Actual SMPC approaches are starting to be used in production along with Homomorphic Encryption (HE), Garbled circuit (GC), linear secret sharing (LSS) and oblivious RAM constructions [99] . ...
doi:10.1109/access.2019.2950872
fatcat:kf2rl7onmrbvnozjudspxrcatu
Secure and Efficient Query Processing in Outsourced Databases
[article]
2022
arXiv
pre-print
This work starts with the survey of five order-revealing encryption schemes that can be used directly in many database indices and five range query protocols with various security / efficiency tradeoffs ...
The work presents a construction in which the security of kNN queries is achieved similarly to OPE / ORE solutions – encrypting the input with an approximate Distance Comparison Preserving Encryption scheme ...
running time and linear space complexity). ...
arXiv:2206.10753v2
fatcat:ylb3tar665bkxhed7s3urmsdbq
Blockchain based Decentralized Applications: Technology Review and Development Guidelines
[article]
2020
arXiv
pre-print
Protocol and Network Tier solutions address the digital assets registration, transactions, data structure, and privacy and business rules implementation and the creation of peer-to-peer networks, ledger ...
replication, and consensus-based state validation. ...
MimbleWimble uses Elliptic Curve Cryptography and Homomorphic encryption, leveraging on the fact the computations applied on the cyphertexts offer the same results as if applied on the plaintext. ...
arXiv:2003.07131v1
fatcat:75xfa7defbhorplxx2bj3y6age
Distributed Ledger Technology Review and Decentralized Applications Development Guidelines
2021
Future Internet
Protocol and Network Tier contains solutions for digital assets registration, transactions, data structure, and privacy and business rules implementation and the creation of peer-to-peer networks, ledger ...
replication, and consensus-based state validation. ...
MimbleWimble uses Elliptic Curve Cryptography and Homomorphic encryption, leveraging on the fact the computations applied on the cyphertexts offer the same results as if applied on the plaintext. ...
doi:10.3390/fi13030062
fatcat:puwa425jnrgndgyaymhh52gxwy
ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices
2021
Proceedings on Privacy Enhancing Technologies
., solving mathematical puzzles), which can severely downgrade the end-user's experience, especially on mobile, and provide sporadic humanness verification of questionable accuracy. ...
More recent solutions like Google's reCAPTCHA v3, leverage user data, thus raising significant privacy concerns. ...
Acknowledgments We would like to thank our shepherd, Fan Zhang, and the anonymous reviewers for their suggestions to improve the paper. ...
doi:10.2478/popets-2021-0058
fatcat:ah2qlsv5pjcxhh4dxqfqghsrfy
Improving Communication Complexity of Quantum Cryptographic Protocols
[article]
2022
Η εργασία αυτή πραγματοποιήθηκε στα πλαίσια υποτροφίας στο Max Planck Institute for Security and Privacy. Οφείλω ένα μεγάλο ευχαριστώ στον υπέυθυνό μου Dr. ...
Intuitively, a malicious prover cannot solve the time-lock puzzle in the necessary time, whereas in order to prove ZK, the simulator can again "freeze time" and solve the time-lock puzzle, acquiring the ...
Rate-1 Quantum Fully-Homomorphic Encryption We first examine the description of the rate-1 QFHE scheme. What Makes This a Non-Trivial Problem? ...
doi:10.26240/heal.ntua.22319
fatcat:j4l3lzcuhfhk3f2iyxouhq5y2q
Securing AI-based Healthcare Systems using Blockchain Technology: A State-of-the-Art Systematic Literature Review and Future Research Directions
[article]
2022
arXiv
pre-print
We found that 1) Defence techniques for adversarial attacks on AI are available for specific kind of attacks and even adversarial training is AI based technique which in further prone to different attacks ...
. 2) Blockchain can address security and privacy issues in healthcare fraternity. 3) Medical data verification and user provenance can be enabled with Blockchain. 4) Blockchain can protect distributed ...
For privacy-preserving outsourced storage and computing, homomorphic encryption can be leveraged. ...
arXiv:2206.04793v1
fatcat:v2wrluwugja65btmjct5wlrfm4
The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses
[article]
2020
arXiv
pre-print
The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer. ...
To fill this gap, the main focus of our work is to systematize and extend the knowledge about the security and privacy aspects of blockchains and contribute to the standardization of this domain. ...
Another method is homomorphic encryption, which enables the computation of certain operations over encrypted messages (e.g., ElGamal encryption provides additive homomorphism). ...
arXiv:1910.09775v2
fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi
« Previous
Showing results 1 — 15 out of 46 results