Searched for: author%3A%22Veugen%2C+P.J.M.%22
(1 - 20 of 53)

Pages

document
Veugen, P.J.M. (author), Kamphorst, B. (author), Marcus, M.J.H. (author)
We present the first algorithm that combines privacy-preserving technologies and state-of-the-art explainable AI to enable privacy-friendly explanations of black-box AI models. We provide a secure algorithm for contrastive explanations of black-box machine learning models that securely trains and uses local foil trees. Our work shows that the...
conference paper 2022
document
Veugen, P.J.M. (author)
There is an urgent need for secure data sharing solutions, such that different organisations can jointly compute with their data, without revealing sensitive data to each other. Secure multi-party computation is an innovative cryptographic technology that has recently become more mature, such that it can be used to obtain very secure data...
conference paper 2022
document
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)
We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...
conference paper 2021
document
van Egmond, M.B. (author), Spini, G. (author), van der Galien, O. (author), IJpma, A. (author), Veugen, P.J.M. (author), Kaaij, W. (author), Sangers, A. (author), Rooijakkers, T. (author), Langenkamp, P. (author), Kamphorst, B. (author), van de L'Isle, N. (author), Kooij-Janic, M. (author)
Background: Recent developments in machine learning have shown its potential impact for clinical use such as risk prediction, prognosis, and treatment selection. However, relevant data are often scattered across diferent stakehold ers and their use is regulated, e.g. by GDPR or HIPAA. As a concrete use-case, hospital Erasmus MC and health...
article 2021
document
Veugen, P.J.M. (author), Abspoel, M.A. (author)
We consider secure integer division within a secret-sharing based secure multi-party computation framework, where the dividend is secret-shared, but the divisor is privately known to a single party. We mention various applications where this situation arises. We give a solution within the passive security model, and extend this to the active...
conference paper 2021
document
Veugen, P.J.M. (author)
A framework is introduced for efficiently computing with encrypted data. We assume a semi-honest security model with two computing parties. Two different coding techniques are used with additively homomorphic encryption, such that many values can be put into one large encryption, and additions and multiplications can be performed on all values...
article 2020
document
van Ette, F.T.A. (author), Bastiaansen, H.J.M. (author), Veugen, P.J.M. (author), Veenman, C.J. (author), Bomhof, F.W. (author), Langley, D. (author), Djafari, S. (author), van der Aarssen, L.G. (author), van Lieshout, M.J. (author)
Idealiter is data vrij toegankelijk, maar de realiteit is vaak anders. De data houdt zich vaak op bij verschillende organisaties die zelfstandig keuzes maken over wie de data mag gebruiken en waarvoor. Data heeft waarde, en mag daarom soms niet of beperkt gedeeld worden. Er kunnen kosten mee gemoeid zijn met het beschikbaar stellen van de data....
report 2020
document
Worm, D.T.H. (author), Kamphorst, B. (author), Rooijakkers, T.A. (author), Veugen, P.J.M. (author), Cellamare, M. (author), Geleijnse, G. (author), Knoors, D. (author), Martin, F. (author)
Integraal Kankercentrum Nederland (IKNL) maintains the Netherlands Cancer Registry (NCR). The NCR is a comprehensive, population-based registry with data on diagnosis and treatment. However, in an increasing amount of research projects, there is a need for additional data items that can be found in other databases. In particular the setting...
report 2020
document
Veugen, P.J.M. (author), Attema, T. (author), Spini, G. (author)
We consider the problem of securely generating the keys of the Paillier crypto system [11] with (t; n) threshold decryption, without a trusted dealer. Nishide and Sakurai [10] describe a solution, secure in the malicious model. We use their ideas to make a simpler solution for the semi-honest model, and further introduce a few optimisations. We...
article 2019
document
Sangers, A. (author), van Heesch, M.P.P. (author), Attema, T. (author), Veugen, P.J.M. (author), Wiggerman, M. (author), Veldsink, J. (author), Bloemen, O. (author), Worm, D.T.H. (author)
Collaboration between financial institutions helps to improve detection of fraud. However, exchange of relevant data between these institutions is often not possible due to privacy constraints and data confidentiality. An important example of relevant data for fraud detection is given by a transaction graph, where the nodes represent bank accounts...
conference paper 2019
document
de Ridder, F. (author), Neumann, N.M.P. (author), Veugen, P.J.M. (author), Kooij, R. (author)
In this work, we consider the following problem: given a graph, the addition of which single edge minimises the effective graph resistance of the resulting (or, augmented) graph. A graph’s effective graph resistance is inversely proportional to its robustness, which means the graph augmentation problem is relevant to, in particular, applications...
conference paper 2019
document
Sangers, A. (author), van Heesch, M.P.P. (author), Attema, T. (author), Veugen, P.J.M. (author), Wiggerman, M. (author), Veldsink, J. (author), Bloemen, O. (author), Worm, D.T.H. (author)
Collaboration between financial institutions helps to improve detection of fraud. However, exchange of relevant data between these institutions is often not possible due to privacy constraints and data confidentiality. An important example of relevant data for fraud detection is given by a transaction graph, where the nodes represent bank accounts...
public lecture 2019
document
Spini, G. (author), van Heesch, M.P.P. (author), Veugen, P.J.M. (author), Chatterjea, S. (author)
Optimizing the workflow of a complex organization such as a hospital is a difficult task. An accurate option is to use a real-time locating system to track locations of both patients and staff. However, privacy regulations forbid hospital management to assess location data of their staff members. In this exploratory work, we propose a secure...
article 2019
document
Nateghizad, M. (author), Veugen, P.J.M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In...
conference paper 2018
document
Veugen, P.J.M. (author)
other 2018
document
Veugen, P.J.M. (author)
We present a solution to the well-known millionaires’ problem, such that both parties only need to compute and communicate with bits. This avoids using complicated cryptographic libraries during implementation, and seriously reduces the computational and communication complexity compared to existing solutions. A trusted dealer is needed to...
conference paper 2018
document
Veeningen, M. (author), Chatterjea, S. (author), Horváth, A.Z. (author), Spindler, G. (author), Boersma, E. (author), van der Spek, P. (author), van der GaliËn, O. (author), Gutteling, J. (author), Kraaij, W. (author), Veugen, P.J.M. (author)
conference paper 2018
document
Veugen, P.J.M. (author)
In the current age of information, with growing internet connectivity, people are looking for service providers to store their data, and compute with it. On the other hand, sensitive personal data is easily misused for unintended purposes. Wouldn’t it be great to have a scalable framework, where multiple users can upload personal data, which...
article 2016
document
Veugen, P.J.M. (author), Blom, F. (author), de Hoogh, S.J.A. (author), Erkin, Z. (author)
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair...
article 2015
document
Veugen, P.J.M. (author)
In the field of signal processing in the encrypted domain, linear operations are usually easy to perform, whereas multiplications, and bitwise operations like comparison, are more costly in terms of computation and communication. These bitwise operations frequently require a decomposition of the secret value into bits. To minimize the...
article 2015
Searched for: author%3A%22Veugen%2C+P.J.M.%22
(1 - 20 of 53)

Pages