A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

Privacy-preserving machine learning: Methods, challenges and directions

R Xu, N Baracaldo, J Joshi - arXiv preprint arXiv:2108.04417, 2021 - arxiv.org
Machine learning (ML) is increasingly being adopted in a wide variety of application
domains. Usually, a well-performing ML model relies on a large volume of training data and …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Pad-net: Multi-tasks guided prediction-and-distillation network for simultaneous depth estimation and scene parsing

D Xu, W Ouyang, X Wang… - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
Depth estimation and scene parsing are two particularly important tasks in visual scene
understanding. In this paper we tackle the problem of simultaneous depth estimation and …

[图书][B] Obfuscation: A user's guide for privacy and protest

F Brunton, H Nissenbaum - 2015 - books.google.com
How we can evade, protest, and sabotage today's pervasive digital surveillance by
deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

The complexity of differential privacy

S Vadhan - Tutorials on the Foundations of Cryptography …, 2017 - Springer
Differential privacy is a theoretical framework for ensuring the privacy of individual-level data
when performing statistical analysis of privacy-sensitive datasets. This tutorial provides an …

Practical dynamic searchable encryption with small leakage

E Stefanov, C Papamanthou, E Shi - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Abstract Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his
document collection in a way that it is still searchable and efficiently updatable. However, all …

Blindbox: Deep packet inspection over encrypted traffic

J Sherry, C Lan, RA Popa, S Ratnasamy - Proceedings of the 2015 ACM …, 2015 - dl.acm.org
Many network middleboxes perform deep packet inspection (DPI), a set of useful tasks
which examine packet payloads. These tasks include intrusion detection (IDS), exfiltration …

Noninteractive zero knowledge for NP from (plain) learning with errors

C Peikert, S Shiehian - Annual International Cryptology Conference, 2019 - Springer
We finally close the long-standing problem of constructing a noninteractive zero-knowledge
(NIZK) proof system for any NP language with security based on the plain Learning With …