A survey on ethereum pseudonymity: Techniques, challenges, and future directions

S Jamwal, J Cano, GM Lee, NH Tran… - Journal of Network and …, 2024 - Elsevier
Blockchain technology has emerged as a transformative force in various sectors, including
finance, healthcare, supply chains, and intellectual property management. Beyond Bitcoin's …

Accessible privacy-preserving web-based data analysis for assessing and addressing economic inequalities

A Lapets, F Jansen, KD Albab, R Issa, L Qin… - Proceedings of the 1st …, 2018 - dl.acm.org
An essential component of initiatives that aim to address pervasive inequalities of any kind is
the ability to collect empirical evidence of both the status quo baseline and of any …

Synq: Public Policy Analytics Over Encrypted Data

Z Espiritu, M George, S Kamara… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Data analytics is a core part of modern decision making, especially in public policy.
However, there exists a tension between data privacy and otherwise socially beneficial …

Mind the Gap: Securely modeling cyber risk based on security deviations from a peer group

T Reynolds, S Scheffler, DJ Weitzner, A Wu - arXiv preprint arXiv …, 2024 - arxiv.org
There are two strategic and longstanding questions about cyber risk that organizations
largely have been unable to answer: What is an organization's estimated risk exposure and …

Secure multi-party computation in practice

MC Hastings - 2021 - search.proquest.com
Secure multi-party computation (MPC) is a cryptographic primitive for computing on private
data. MPC provides strong privacy guarantees, but practical adoption requires high-quality …

Asynchronous Delegated Private Set Intersection with Hiding of Intersection Size

W Howe, A Lapets, F Jansen, T Braun… - Cryptology ePrint …, 2022 - eprint.iacr.org
Integrating private set intersection (PSI) protocols within real-world data workflows, software
applications, or web services can be challenging. This can occur because data contributors …

[PDF][PDF] Confidential Computing via Multiparty Computation and Trusted Computing

J Dispan - 2023 - jdispan.de
In the wake of the social sciences' so-called replication crisis, researches increasingly strive
to adopt methods preventing questionable research practices in empirical studies, eg, study …

Towards secure computation for people

R Issa - 2022 - search.proquest.com
My research investigates three questions: How do we customize protocols and
implementations to account for the unique requirement of each setting and its target …

Brief Announcement: Federated Code Auditing and Delivery for MPC

F Jansen, KD Albab, A Lapets, M Varia - … Boston, MA, USA, November 5–8 …, 2017 - Springer
Secure multi-party computation (MPC) is a cryptographic primitive that enables several
parties to compute jointly over their collective private data sets. MPC's objective is to …

Masking text data for secure multiparty computation

P Krishnan, VM Kulkarni, G Varadarajulu… - US Patent …, 2022 - Google Patents
Textual masking for multiparty computation is provided. The method comprises receiving
masked input data from a number of contributors, wherein the input data from each …