You are currently on the new version of our website. Access the old version .

9 Results Found

  • Article
  • Open Access
1 Citations
4,273 Views
23 Pages

Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation

  • Mingfei Yu,
  • Dewmini Sudara Marakkalage and
  • Giovanni De Micheli

Garbled circuit (GC) is one of the few promising protocols to realize general-purpose secure computation. The target computation is represented by a Boolean circuit that is subsequently transformed into a network of encrypted tables for execution. Th...

  • Article
  • Open Access
1,570 Views
18 Pages

A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online Time

  • Xu Yan,
  • Bin Lian,
  • Yunhao Yang,
  • Xiaotie Wang,
  • Jialin Cui,
  • Xianghong Zhao,
  • Fuqun Wang and
  • Kefei Chen

28 May 2024

The secure computation of symmetric encryption schemes using Yao’s garbled circuits, such as AES, allows two parties, where one holds a plaintext block m and the other holds a key k, to compute Enc(k,m) without leaking m and k to one another. D...

  • Article
  • Open Access
1 Citations
6,958 Views
25 Pages

Supporting Privacy of Computations in Mobile Big Data Systems

  • Sriram Nandha Premnath and
  • Zygmunt J. Haas

Cloud computing systems enable clients to rent and share computing resources of third party platforms, and have gained widespread use in recent years. Numerous varieties of mobile, small-scale devices such as smartphones, red e-health devices, etc.,...

  • Article
  • Open Access
1 Citations
2,838 Views
20 Pages

25 March 2022

With the rapid development of cloud servers, storing data on cloud servers has become a popular option. However, cloud servers are centralized. Storing data on centralized cloud servers may involve some risks. For example, the data access pattern may...

  • Article
  • Open Access
1,310 Views
31 Pages

Composable Privacy-Preserving Framework for Stakes-Based Online Peer-to-Peer Applications

  • Nikola Hristov-Kalamov,
  • Raúl Fernández-Ruiz,
  • Agustín Álvarez-Marquina,
  • Julio Guillén-García,
  • Roberto Gallardo-Cava and
  • Daniel Palacios-Alonso

As the demand for expansive back-end systems in online applications continues to grow, novel frameworks are necessitated to address the escalating operational demands, energy consumption, and associated costs. Traditional Client–Server models,...

  • Article
  • Open Access
75 Views
42 Pages

Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the neares...

  • Article
  • Open Access
1,615 Views
21 Pages

28 December 2023

Deep learning is widely utilized to acquire predictive models for mobile crowdsensing systems (MCSs). These models significantly improve the availability and performance of MCSs in real-world scenarios. However, training these models requires substan...

  • Article
  • Open Access
9 Citations
3,309 Views
18 Pages

pShare: Privacy-Preserving Ride-Sharing System with Minimum-Detouring Route

  • Junxin Huang,
  • Yuchuan Luo,
  • Ming Xu,
  • Bowen Hu and
  • Jian Long

14 January 2022

Online ride-hailing (ORH) services allow people to enjoy on-demand transportation services through their mobile devices in a short responding time. Despite the great convenience, users need to submit their location information to the ORH service prov...