How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing

S Sousa, R Kern - Artificial Intelligence Review, 2023 - Springer
Deep learning (DL) models for natural language processing (NLP) tasks often handle
private data, demanding protection against breaches and disclosures. Data protection laws …

Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Forward and backward private searchable encryption from constrained cryptographic primitives

R Bost, B Minaud, O Ohrimenko - … of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can
securely outsource a database to an untrusted server, in such a way that the database can …

∑ oφoς: Forward secure searchable encryption

R Bost - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
Searchable Symmetric Encryption aims at making possible searching over an encrypted
database stored on an untrusted server while keeping privacy of both the queries and the …

All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption

Y Zhang, J Katz, C Papamanthou - 25th USENIX Security Symposium …, 2016 - usenix.org
The goal of searchable encryption (SE) is to enable a client to execute searches over
encrypted files stored on an untrusted server while ensuring some measure of privacy for …

Inference attacks on property-preserving encrypted databases

M Naveed, S Kamara, CV Wright - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Many encrypted database (EDB) systems have been proposed in the last few years as cloud
computing has grown in popularity and data breaches have increased. The state-of-the-art …

Towards public verifiable and forward-privacy encrypted search by using blockchain

Y Guo, C Zhang, C Wang, X Jia - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Dynamic Searchable Symmetric Encryption (DSSE) is a practical cryptographic primitive that
assists servers to provide search and update functionalities in the ciphertext domain. Recent …

Generic attacks on secure outsourced databases

G Kellaris, G Kollios, K Nissim, A O'neill - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …

Practical backward-secure searchable encryption from symmetric puncturable encryption

SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad… - Proceedings of the …, 2018 - dl.acm.org
Symmetric Searchable Encryption (SSE) has received wide attention due to its practical
application in searching on encrypted data. Beyond search, data addition and deletion are …