Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2023
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets
ACM Transactions on Privacy and Security (TOPS), Volume 26, Issue 3Article No.: 37, Pages 1–38https://doi.org/10.1145/3592608Multi-user (mu) security considers large-scale attackers that, given access to a number of cryptosystem instances, attempt to compromise at least one of them. We initiate the study of mu security of the so-called GGM tree that stems from the pseudorandom ...
- research-articleJuly 2023
Probabilistic Indistinguishability and the Quality of Validity in Byzantine Agreement
AFT '22: Proceedings of the 4th ACM Conference on Advances in Financial TechnologiesPages 111–125https://doi.org/10.1145/3558535.3559789This paper provides a formal framework for reasoning about randomized distributed algorithms. We generalize the notion of indistinguishability, the most useful tool in deterministic lower bounds, to apply to a probabilistic setting. We use the new ...
- research-articleMarch 2022
- research-articleNovember 2021
Indistinguishability Prevents Scheduler Side Channels in Real-Time Systems
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 666–684https://doi.org/10.1145/3460120.3484769Scheduler side-channels can leak critical information in real-time systems, thus posing serious threats to many safety-critical applications. The main culprit is the inherent determinism in the runtime timing behavior of such systems, e.g., the (...
- keynoteNovember 2021
Pseudo-Randomness and the Crystal Ball
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 1–2https://doi.org/10.1145/3460120.3482790The last decade has witnessed the emergence of algorithmic fairness as a new frontier in the application of theoretical computer science to problems of societal concern. The delay between academic investigation and industrial rhetoric acknowledging the ...
-
- research-articleApril 2021
Interval‐valued equivalence measures respecting uncertainty in image processing
- Barbara Pȩkala,
- Urszula Bentkowska,
- Dawid Kosior,
- Zdenko Takáč,
- Aitor Castillo,
- Mikel Sesma‐Sara,
- Javier Fernandez,
- Julio Lafuente,
- Humberto Bustince
International Journal of Intelligent Systems (IJIS), Volume 36, Issue 6Pages 2767–2796https://doi.org/10.1002/int.22401AbstractA new concept of equivalence between intervals and the induced indistinguishability between interval‐valued (IV) fuzzy sets are proposed and considered. A new notion of the degree of IV equivalence is presented where partial or linear orders and ...
- research-articleMarch 2020
A Hypothesis Testing Approach to Sharing Logs with Confidence
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyPages 307–318https://doi.org/10.1145/3374664.3375743Logs generated by systems and applications contain a wide variety of heterogeneous information that is important for performance profiling, failure detection, and security analysis. There is a strong need for sharing the logs among different parties to ...
- research-articleJanuary 2020
An internet-of-things-based security scheme for healthcare environment for robust location privacy
International Journal of Computational Science and Engineering (IJCSE), Volume 21, Issue 2Pages 298–303https://doi.org/10.1504/ijcse.2020.105742Recently, various applications of internet of things have been developed for the healthcare sector. Our contribution is to provide a secure and low-cost environment for the IoT devices in healthcare. The main goal is to make patients' lives easier and ...
- research-articleJanuary 2019
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
International Journal of Security and Networks (IJSN), Volume 14, Issue 4Pages 191–204https://doi.org/10.1504/ijsn.2019.103150Non-malleable asymmetric encryption schemes which prove plaintext knowledge are sufficient for secrecy in some domains. For example, ballot secrecy in voting. In these domains, some applications derive encryption schemes by coupling malleable ciphertexts ...
- research-articleOctober 2018
Machine Learning with Membership Privacy using Adversarial Regularization
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 634–646https://doi.org/10.1145/3243734.3243855Machine learning models leak significant amount of information about their training sets, through their predictions. This is a serious privacy concern for the users of machine learning as a service. To address this concern, in this paper, we focus on ...
- short-paperMay 2018
A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityPages 253–260https://doi.org/10.1145/3196494.3196505A distinguisher is employed by an adversary to explore the privacy property of a cryptographic primitive. If a cryptographic primitive is said to be private, there is no distinguisher algorithm that can be used by an adversary to distinguish the ...
- research-articleOctober 2015
Frequency-Hiding Order-Preserving Encryption
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityPages 656–667https://doi.org/10.1145/2810103.2813629Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data. This makes its performance and functionality very suitable for data outsourcing in cloud computing scenarios, but the security of ...
- research-articleNovember 2014
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityPages 275–286https://doi.org/10.1145/2660267.2660277Order-preserving encryption enables performing many classes of queries -- including range queries -- on encrypted databases. Popa et al. recently presented an ideal-secure order-preserving encryption (or encoding) scheme, but their cost of insertions (...
- research-articleNovember 2014
Location Privacy Protection for Smartphone Users
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityPages 239–250https://doi.org/10.1145/2660267.2660270As smartphones are increasingly used to run apps that provide users with location-based services, the users' location privacy has become a major concern. Existing solutions to this concern are deficient in terms of practicality, efficiency, and ...
- research-articleJune 2013
Side-channel indistinguishability
HASP '13: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and PrivacyArticle No.: 9, Pages 1–8https://doi.org/10.1145/2487726.2487735We introduce a masking strategy for hardware that prevents any side-channel attacker from recovering uniquely the secret key of a cryptographic device. In this masking scheme, termed homomorphic, the sensitive data is exclusive-ored with a random value ...
- ArticleDecember 2012
Obfuscated Counting in Single-Hop Radio Network
ICPADS '12: Proceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed SystemsPages 692–693https://doi.org/10.1109/ICPADS.2012.98In this paper we consider the problem of listing all active stations in a single hop radio network in such a way that the outer adversary observing communication could not gain any significant information about the real number of stations. We also ...
- research-articleSeptember 2012
Using indistinguishability in ubiquitous robot organizations
UbiComp '12: Proceedings of the 2012 ACM Conference on Ubiquitous ComputingPages 866–872https://doi.org/10.1145/2370216.2370413As robots become more pervasive and ubiquitous in the lives of humans, they become increasingly involved in everyday tasks formerly executed by humans. Humans should expect robots to take on tasks to simplify our lives, by working with humans just as ...
- ArticleApril 2012
A framework for security analysis of key derivation functions
ISPEC'12: Proceedings of the 8th international conference on Information Security Practice and ExperiencePages 199–216https://doi.org/10.1007/978-3-642-29101-2_14This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable ...
- research-articleMarch 2012
Indistinguishable regions in geographic privacy
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied ComputingPages 1463–1469https://doi.org/10.1145/2245276.2232010The ubiquity of positioning devices poses a natural security challenge: users want to take advantage of location-related services as well as social sharing of their position but at the same time have security concerns about how much information should ...
- ArticleJune 2011
Termination-Insensitive Computational Indistinguishability (and Applications to Computational Soundness)
CSF '11: Proceedings of the 2011 IEEE 24th Computer Security Foundations SymposiumPages 251–265https://doi.org/10.1109/CSF.2011.24We defined a new notion of computational indistinguishability: termination-insensitive computational indistinguishability (tic-indistinguishability). Tic-indistinguishability models indistinguishability with respect to distinguishers that cannot ...