Grote: Group testing for privacy-preserving face identification

A Ibarrondo, H Chabanne, V Despiegel… - Proceedings of the …, 2023 - dl.acm.org
This paper proposes a novel method to perform privacy-preserving face identification based
on the notion of group testing, and applies it to a solution using the Cheon-Kim-Kim-Song …

Securely computing the manhattan distance under the malicious model and its applications

X Liu, X Liu, R Zhang, D Luo, G Xu, X Chen - Applied Sciences, 2022 - mdpi.com
Manhattan distance is mainly used to calculate the total absolute wheelbase of two points in
the standard coordinate system. The secure computation of Manhattan distance is a new …

Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation

A Ibarrondo, H Chabanne, M Önen - PETS 2023, 23rd Privacy …, 2023 - hal.science
We propose a novel privacy-preserving, two-party computation of various distance metrics
(eg, Hamming distance, Scalar Product) followed by a comparison with a fixed threshold …

A secure two-party Euclidean distance computation scheme through a covert adversarial model based on Paillier encryption

L Su, H Geng, S Guo, S He - IEEE Access, 2023 - ieeexplore.ieee.org
Existing secure two-party Euclidean distance computation schemes are mostly performed
based on a semi-honest model, which faces bottlenecks in computation efficiency and …

A Blockchain-Based Fairness Guarantee Approach for Privacy-Preserving Collaborative Training in Computing Force Network

Z Sun, W Li, J Liang, L Yin, C Li, N Wei, J Zhang… - Mathematics, 2024 - mdpi.com
The advent of the big data era has brought unprecedented data demands. The integration of
computing resources with network resources in the computing force network enables the …

Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication

N Cheng, M Önen, A Mitrokotsa, O Chouchane… - Proceedings of the 19th …, 2024 - dl.acm.org
Computing the distance between two non-normalized vectors x and y, represented by Δ (x,
y) and comparing it to a predefined public threshold τ is an essential functionality used in …

Colmade: Collaborative masking in auditable decryption for bfv-based homomorphic encryption

A Ibarrondo, H Chabanne, V Despiegel… - Proceedings of the 2022 …, 2022 - dl.acm.org
This paper proposes a novel collaborative decryption protocol for the Brakerski-Fan-
Vercauteren (BFV) homomorphic encryption scheme in a multiparty distributed setting, and …

[PDF][PDF] Privacy-preserving Cosine Similarity Computation with Malicious Security Applied to Biometric Authentication

N Cheng, M Önen, A Mitrokotsa, O Chouchane… - 2023 - hal.science
Computing distance metrics of sensitive data and comparing to a predefined public
threshold in a privacy-preserving way is an indispensable building block for a wide range of …

[PDF][PDF] Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching.

J Mader, T Lorünser - ICISSP, 2024 - scitepress.org
While biometric data, such as fingerprints, are increasingly used for identification and
authentication, their inability to be revoked once compromised raises privacy concerns. To …

Efficient quantum private comparison protocol based on one direction discrete quantum walks on the circle

JJ Wang, Z Dou, XB Chen, YP Lai, J Li - Chinese Physics B, 2022 - iopscience.iop.org
We propose an efficient quantum private comparison protocol firstly based on one direction
quantum walks. With the help of one direction quantum walk, we develop a novel method …