Searched for: subject%3A%22Cryptography%22
(1 - 20 of 31)

Pages

document
Attema, T. (author), Dunning, V.A. (author), Everts, M. (author), Langenkamp, P. (author)
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficient protocols with covert security and public verifiability in the honest majority setting. Our compiler works for protocols with any number of parties > 2 and treats the passively secure protocol in a black-box manner. In multi-party computation ...
conference paper 2022
document
Dirks, B.P.F. (author), Ferrario, I. (author), Le Pera, A. (author), Vito Finocchiaro, D. (author), Desmons, M. (author), de Lange, T.J. (author), de Man, H. (author), Meskers, A.J.H. (author), Morits, J.P.J. (author), Neumann, N.M.P. (author), Saathof, R. (author), Witvoet, G. (author)
Due to the distance limitation of quantum communication via ground-based fibre networks, space-based quantum key distribution (QKD) is a viable solution to extend such networks over continental and, ultimately, over global distances. Compared to Low Earth Orbits (LEO), QKD from a Geostationary Orbit (GEO) offers substantial advantages, such as...
conference paper 2021
document
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)
We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...
conference paper 2021
document
Müller, M. (author), de Jong, J. (author), van Heesch, M.P.P. (author), Overeinder, B. (author), van Rijswijk-Deij, R. (author)
article 2020
document
Muller, F. (author), van Heesch, M.P.P. (author)
Globally, great effort is being put into building a quantum computer. Quantum computers are anticipated to outperform conventional (super)computers in solving mathematical problems that lie at the foundation of commonly used cryptosystems. An efficient algorithm to solve the problem of the factorisation of large integers, for example, renders...
report 2020
document
Neumann, N.M.P. (author), van Heesch, M.P.P. (author), Graaf, P. (author)
Communication is vital in everyday life and critical for current and future military operations. However, conventional communication as we know it also has its limitations. Quantum communication allows some of these challenges to be overcome and, thereby, new application areas open up, also in the military domain. In this work quantum...
conference paper 2020
document
QuSoft, QT/e, NWO, het Lorentz Instituut, AMS-IX, StartupDelta en Microsoft, m.m.v. EZK TNO, QuTech, (author)
report 2019
document
Nateghizad, M. (author), Veugen, P.J.M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In...
conference paper 2018
document
van de Kamp, T. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author)
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing the equality of two encrypted vectors. Our construction can be used for the privacy-preserving monitoring of relations among multiple clients. Since both the clients’ data and the predicates are encrypted, our system is suitable for situations in...
conference paper 2018
document
Veugen, T. (author), Doumen, J. (author), Erkin, Z. (author), Pellegrino, G. (author), Verwer, S. (author), Weber, J. (author)
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple outputs, resulting from inputs of frequently changing sets of users. A cryptographic technique, known as random user selection, is...
article 2017
document
Lueks, W. (author), Everts, M.H. (author), Hoepman, J.H. (author)
Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation, most of the damage has already been done. To help...
conference paper 2016
document
Bortolameotti, R. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author), Hartel, P. (author)
We address the problem of determining what data has been leaked from a system after its recovery from a successful attack. This is a forensic process which is relevant to give a better understanding of the impact of a data breach, but more importantly it is becoming mandatory according to the recent developments of data breach notification laws....
conference paper 2016
document
van de Kamp, T.R. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author)
Information sharing helps to better protect computer sys- tems against digital threats and known attacks. However, since security information is usually considered sensitive, parties are hesitant to share all their information through public channels. Instead, they only exchange this informa- tion with parties with whom they already established...
conference paper 2016
document
Sunil, A.B. (author), Erkiny, Z. (author), Veugenyz, T. (author)
License plate matching plays an important role in applications like law enforcement, traffic management and road pricing, where the plate is first recognized and then compared to a database of authorized vehicle registration plates. Unfortunately, there are several privacy related issues that should be taken care of before deploying plate...
conference paper 2016
document
Veugen, P.J.M. (author), Blom, F. (author), de Hoogh, S.J.A. (author), Erkin, Z. (author)
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair...
article 2015
document
Hoffmann, H. (author), Ramachandra, P. (author), Kovacs, I.Z. (author), Jorguseski, L. (author), Gunnarsson, F. (author), Kurner, T. (author)
In recent years Mobile Network Operators (MNOs) worldwide are extensively deploying LTE networks in different spectrum bands and utilising different bandwidth configurations. Initially, the deployment is coverage oriented with macro cells using the lower LTE spectrum bands. As the offered traffic (i.e. the requested traffic from the users)...
article 2015
document
Bakondi, B.G. (author), Peter, A. (author), Everts, M.H. (author), Hartel, P.H. (author), Jonker, W. (author)
Aggregation of time-series data offers the possibility to learn certain statistics over data periodically uploaded by different sources. In case of privacy sensitive data, it is desired to hide every data provider's individual values from the other participants (including the data aggregator). Existing privacy preserving time-series data...
conference paper 2015
document
Erkin, Z. (author), Veugen, P.J.M. (author)
Millions of people are now increasingly using smart devices at home to improve the quality of their lives. Unfortunately, the smart devices that we use at home for comfort and sim-plicity make our lives more complicated in terms of man-agement due to several issues like mismatching interfaces and complexity of the micro-management. One approach...
conference paper 2014
document
Makri, E. (author), Everts, M.H. (author), de Hoogh, S. (author), Peter, A. (author), op den Akker, H. (author), Hartel, P.H. (author), Jonker, W. (author)
We treat the problem of privacy-preserving statistics verification in clinical research. We show that given aggregated results from statistical calculations, we can verify their correctness efficiently, without revealing any of the private inputs used for the calculation. Our construction is based on the primitive of Secure Multi-Party...
conference paper 2014
document
Erkin, Z. (author), Veugen, T. (author), Lagendijk, R.L. (author)
Recommender systems play a crucial role today in on-line applications as they improve the customer satisfaction, and at the same time results in an increase in the profit for the service provider. However, there are serious privacy concerns as such systems rely on the personal data of the customers. There have been several proposals to provide...
conference paper 2013
Searched for: subject%3A%22Cryptography%22
(1 - 20 of 31)

Pages