Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








46 Hits in 7.7 sec

BMIAE: Blockchain-based Multi-instance Iris Authentication using Additive ElGamal Homomorphic Encryption

Morampudi Mahesh Kumar, Munaga V.N.K.Prasad, U S N Raju
2020 IET Biometrics  
In the past few years, many biometric authentication systems based on homomorphic encryption have been introduced to provide security for the templates.  ...  BMIAE encrypt the iris templates using ElGamal encryption to guarantee confidentiality and Smart contract running on a Blockchain helps to achieve the integrity of templates and matching result.  ...  ElGamal HE is a multiplicative homomorphic cryptosystem and is more efficient than other algorithms (e.g. RSA and Paillier) in terms of encryption and decryption efficiency [23, 46] .  ... 
doi:10.1049/iet-bmt.2019.0169 fatcat:qpq4glnjcnfaxh5dazkld6z6na

McFly: Verifiable Encryption to the Future Made Practical [article]

Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig
2022 IACR Cryptology ePrint Archive  
The scheme remains practical for a committee of size 2000 with an encryption time of 58s and decryption time of 218s.  ...  For the popular BLS12-381 curve, a 381-bit message and a committee of size 500 the encryption time is 9.8s and decryption is 14.8s.  ...  by solving the time-lock puzzles and retrieving the bids.  ... 
dblp:journals/iacr/DottlingHMW22 fatcat:susa6qzugjcl3p4bi7tujwwehy

A 2 L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs [article]

Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2019 IACR Cryptology ePrint Archive  
and randomizable puzzles.  ...  In theory, we demonstrate for the first time that it is possible to design a secure and privacy-preserving PCH while requiring only digital signatures and timelock functionality from the underlying scripting  ...  Homomorphic encryption scheme.  ... 
dblp:journals/iacr/TairiMM19 fatcat:koopkuh7cng2zivee4wqvb2pre

Key-Nets: Optical Transformation Convolutional Networks for Privacy Preserving Vision Sensors [article]

Jeffrey Byrne and Brian DeCann and Scott Bloom
2020 arXiv   pre-print
Therefore, the key-net is the first practical, efficient and privacy preserving vision sensor based on optical homomorphic encryption.  ...  Finally, we show that a key-net is equivalent to homomorphic encryption using a Hill cipher, with an upper bound on memory and runtime that scales quadratically with a user specified privacy parameter.  ...  Homomorphic encryption (HE) [7] [24] [29] [45] is a form of encryption which allows specific types of computations to be carried out on ciphertext and generate an encrypted result which, when decrypted  ... 
arXiv:2008.04469v2 fatcat:j47cr3erxzdildtn3gnuwkk2kq

Chasing the AIDS virus

Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
2010 Communications of the ACM  
Current Advertising rates can be found by visiting http://www.acm-media.org or by contacting ACM Media sales at (212) 626-0654.  ...  ACM Media Advertising Policy Communications of the ACM and other ACM Media publications accept advertising in both print and electronic formats.  ...  Walter, and the Euresist consortium, especially, Francesca Incardona, Maurizio Zazzi, and Anders Sönnerborg.  ... 
doi:10.1145/1666420.1666440 fatcat:o2qllqh4tzhh5dzgvnjewl52vq

TEE-based decentralized recommender systems: The raw data sharing redemption [article]

Akash Dhasade, Nevena Dresevic, Anne-Marie Kermarrec, Rafael Pires
2022 arXiv   pre-print
that share only parameters, while fully protecting privacy by leveraging trustworthy hardware enclaves with very little overhead.  ...  Firstly, REX enables raw data sharing, which ultimately speeds up convergence and reduces the network load. Secondly, REX fully preserves privacy.  ...  approaches involved differential privacy or homomorphic encryption (HE).  ... 
arXiv:2202.11655v1 fatcat:6jra2xvuzvd5znqynowfi3t63y

Proof of All: Verifiable Computation in a Nutshell [article]

Mario Alessandro Barbara
2019 arXiv   pre-print
I take advantage of this model to analyse innovative technologies (Homomorphic Authenticators, Verifiable Delay Functions) which developed into their own specialised domains, and I attempt to make them  ...  Furthermore, I expand on the future of Verifiable Computation, Universal proof compilers and "Proofs of All", by approaching the state-of-the-art zk-STARK construction from a more accessible and informal  ...  Timed encryption can be leveraged to build scheduled payments: one could prepare multiple transactions in advance, and they would self-decrypt in due time.  ... 
arXiv:1908.02327v2 fatcat:fdhmpzpnqfhprhijoy3zdradze

Privacy-preserving solutions for Blockchain: review and challenges

Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
2019 IEEE Access  
Bitcoin and Ethereum, as well as privacy-preserving research proposals and solutions in permissioned and private blockchains. Diverse blockchain scenarios are analyzed,  ...  in this promising and disrupting technology.  ...  Actual SMPC approaches are starting to be used in production along with Homomorphic Encryption (HE), Garbled circuit (GC), linear secret sharing (LSS) and oblivious RAM constructions [99] .  ... 
doi:10.1109/access.2019.2950872 fatcat:kf2rl7onmrbvnozjudspxrcatu

Secure and Efficient Query Processing in Outsourced Databases [article]

Dmytro Bogatov
2022 arXiv   pre-print
This work starts with the survey of five order-revealing encryption schemes that can be used directly in many database indices and five range query protocols with various security / efficiency tradeoffs  ...  The work presents a construction in which the security of kNN queries is achieved similarly to OPE / ORE solutions – encrypting the input with an approximate Distance Comparison Preserving Encryption scheme  ...  running time and linear space complexity).  ... 
arXiv:2206.10753v2 fatcat:ylb3tar665bkxhed7s3urmsdbq

Blockchain based Decentralized Applications: Technology Review and Development Guidelines [article]

Claudia Pop, Tudor Cioara, Ionut Anghel, Marcel Antal, Ioan Salomie
2020 arXiv   pre-print
Protocol and Network Tier solutions address the digital assets registration, transactions, data structure, and privacy and business rules implementation and the creation of peer-to-peer networks, ledger  ...  replication, and consensus-based state validation.  ...  MimbleWimble uses Elliptic Curve Cryptography and Homomorphic encryption, leveraging on the fact the computations applied on the cyphertexts offer the same results as if applied on the plaintext.  ... 
arXiv:2003.07131v1 fatcat:75xfa7defbhorplxx2bj3y6age

Distributed Ledger Technology Review and Decentralized Applications Development Guidelines

Claudia Antal, Tudor Cioara, Ionut Anghel, Marcel Antal, Ioan Salomie
2021 Future Internet  
Protocol and Network Tier contains solutions for digital assets registration, transactions, data structure, and privacy and business rules implementation and the creation of peer-to-peer networks, ledger  ...  replication, and consensus-based state validation.  ...  MimbleWimble uses Elliptic Curve Cryptography and Homomorphic encryption, leveraging on the fact the computations applied on the cyphertexts offer the same results as if applied on the plaintext.  ... 
doi:10.3390/fi13030062 fatcat:puwa425jnrgndgyaymhh52gxwy

ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices

Iñigo Querejeta-Azurmendi, Panagiotis Papadopoulos, Matteo Varvello, Antonio Nappa, Jiexin Zhang, Benjamin Livshits
2021 Proceedings on Privacy Enhancing Technologies  
., solving mathematical puzzles), which can severely downgrade the end-user's experience, especially on mobile, and provide sporadic humanness verification of questionable accuracy.  ...  More recent solutions like Google's reCAPTCHA v3, leverage user data, thus raising significant privacy concerns.  ...  Acknowledgments We would like to thank our shepherd, Fan Zhang, and the anonymous reviewers for their suggestions to improve the paper.  ... 
doi:10.2478/popets-2021-0058 fatcat:ah2qlsv5pjcxhh4dxqfqghsrfy

Improving Communication Complexity of Quantum Cryptographic Protocols [article]

Γεώργιος Ορέστης Χαρδούβελης, National Technological University Of Athens
2022
Η εργασία αυτή πραγματοποιήθηκε στα πλαίσια υποτροφίας στο Max Planck Institute for Security and Privacy. Οφείλω ένα μεγάλο ευχαριστώ στον υπέυθυνό μου Dr.  ...  Intuitively, a malicious prover cannot solve the time-lock puzzle in the necessary time, whereas in order to prove ZK, the simulator can again "freeze time" and solve the time-lock puzzle, acquiring the  ...  Rate-1 Quantum Fully-Homomorphic Encryption We first examine the description of the rate-1 QFHE scheme. What Makes This a Non-Trivial Problem?  ... 
doi:10.26240/heal.ntua.22319 fatcat:j4l3lzcuhfhk3f2iyxouhq5y2q

Securing AI-based Healthcare Systems using Blockchain Technology: A State-of-the-Art Systematic Literature Review and Future Research Directions [article]

Rucha Shinde, Shruti Patil, Ketan Kotecha, Vidyasagar Potdar, Ganeshsree Selvachandran, Ajith Abraham
2022 arXiv   pre-print
We found that 1) Defence techniques for adversarial attacks on AI are available for specific kind of attacks and even adversarial training is AI based technique which in further prone to different attacks  ...  . 2) Blockchain can address security and privacy issues in healthcare fraternity. 3) Medical data verification and user provenance can be enabled with Blockchain. 4) Blockchain can protect distributed  ...  For privacy-preserving outsourced storage and computing, homomorphic encryption can be leveraged.  ... 
arXiv:2206.04793v1 fatcat:v2wrluwugja65btmjct5wlrfm4

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer.  ...  To fill this gap, the main focus of our work is to systematize and extend the knowledge about the security and privacy aspects of blockchains and contribute to the standardization of this domain.  ...  Another method is homomorphic encryption, which enables the computation of certain operations over encrypted messages (e.g., ElGamal encryption provides additive homomorphism).  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi
« Previous Showing results 1 — 15 out of 46 results