In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys (EPOM). Using EPOM, a large scale of users can securely …
F Farokhi, I Shames, N Batterham - Control Engineering Practice, 2017 - Elsevier
Networked control systems with encrypted sensors measurements is considered. Semi- homomorphic encryption, specifically the Paillier encryption, is used so that the controller …
Cosegmentation is typically defined as the task of jointly segmenting “something similar” in a given set of images. Existing methods are too generic and so far have not demonstrated …
In this paper, we propose a framework for efficient and privacy-preserving outsourced calculation of rational numbers, which we refer to as POCR. Using POCR, a user can …
T Duong, DH Phan, N Trieu - International Conference on the Theory and …, 2020 - Springer
Abstract Private Set Intersection Cardinality (PSI-CA) allows two parties, each holding a set of items, to learn the size of the intersection of those sets without revealing any additional …
We examine the feasibility of private set intersection (PSI) over massive datasets. PSI, which allows two parties to find the intersection of their sets without revealing them to each other …
A Bay, Z Erkin, JH Hoepman… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Privacy-preserving techniques for processing sets of information have attracted the research community's attention in recent years due to society's increasing dependency on the …
Outsourcing data to the cloud can be considered as a perfect solution for the storage and computationally constrained data owners. However, data confidentiality is compromised …
B Wang, M Li, H Wang - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Geometric range search is a fundamental primitive for spatial data analysis in SQL and NoSQL databases. It has extensive applications in location-based services, computer-aided …