IoT data markets in public and private institutions have become increasingly relevant in recent years because of their potential to improve data availability and unlock new business …
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing …
S Gan, C Zhang, X Qin, X Tu, K Li… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Coverage-guided fuzzing is a widely used and effective solution to find software vulnerabilities. Tracking code coverage and utilizing it to guide fuzzing are crucial to …
Secure computation enables mutually distrusting parties to jointly evaluate a function on their private inputs without revealing anything but the function's output. Generic secure …
Important decisions about people are increasingly made by algorithms: Votes are counted; voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
This paper presents Prio, a privacy-preserving system for the collection of aggregate statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
ABSTRACT a peer-to-peer network enables different parties to jointly store and run computations on data while keeping the data completely private. Enigma's computational …
Abstract Machine learning classification is used in numerous settings nowadays, such as medical or genomics predictions, spam detection, face recognition, and financial predictions …
E Ben-Sasson, A Chiesa, E Tromer… - 23rd USENIX Security …, 2014 - usenix.org
We build a system that provides succinct non-interactive zero-knowledge proofs (zk- SNARKs) for program executions on a von Neumann RISC architecture. The system has two …