Searched for: subject%3A%22Multi%255C-Party%255C%2BComputation%22
(1 - 17 of 17)
document
Kamphorst, B. (author), Rooijakkers, T. (author), Veugen, T. (author), Cellamare, M. (author), Knoors, D. (author)
article 2022
document
Veugen, P.J.M. (author), Kamphorst, B. (author), Marcus, M.J.H. (author)
We present the first algorithm that combines privacy-preserving technologies and state-of-the-art explainable AI to enable privacy-friendly explanations of black-box AI models. We provide a secure algorithm for contrastive explanations of black-box machine learning models that securely trains and uses local foil trees. Our work shows that the...
conference paper 2022
document
Neumann, N.M.P. (author), Wezeman, R.S. (author)
Quantum computers can solve specific complex tasks for which no reasonable-time classical algorithm is known. Quantum computers do however also offer inherent security of data, as measurements destroy quantum states. Using shared entangled states, multiple parties can collaborate and securely compute quantum algorithms. In this paper we propose...
conference paper 2022
document
Attema, T. (author), Dunning, V.A. (author), Everts, M. (author), Langenkamp, P. (author)
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficient protocols with covert security and public verifiability in the honest majority setting. Our compiler works for protocols with any number of parties > 2 and treats the passively secure protocol in a black-box manner. In multi-party computation ...
conference paper 2022
document
Veugen, P.J.M. (author)
There is an urgent need for secure data sharing solutions, such that different organisations can jointly compute with their data, without revealing sensitive data to each other. Secure multi-party computation is an innovative cryptographic technology that has recently become more mature, such that it can be used to obtain very secure data...
conference paper 2022
document
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)
We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...
conference paper 2021
document
Attema, T. (author), Worm, D. (author)
Data sharing and analysis are essential when it comes to achieving economic growth and solving societal challenges. However, data sharing is yet to really get off the ground due to commercial and/or legal barriers, including the fundamental right to privacy. Innovative technologies such as Federated Learning and Multi-Party Computation offer a...
report 2021
document
van Egmond, M.B. (author), Spini, G. (author), van der Galien, O. (author), IJpma, A. (author), Veugen, P.J.M. (author), Kaaij, W. (author), Sangers, A. (author), Rooijakkers, T. (author), Langenkamp, P. (author), Kamphorst, B. (author), van de L'Isle, N. (author), Kooij-Janic, M. (author)
Background: Recent developments in machine learning have shown its potential impact for clinical use such as risk prediction, prognosis, and treatment selection. However, relevant data are often scattered across diferent stakehold ers and their use is regulated, e.g. by GDPR or HIPAA. As a concrete use-case, hospital Erasmus MC and health...
article 2021
document
Veugen, P.J.M. (author), Abspoel, M.A. (author)
We consider secure integer division within a secret-sharing based secure multi-party computation framework, where the dividend is secret-shared, but the divisor is privately known to a single party. We mention various applications where this situation arises. We give a solution within the passive security model, and extend this to the active...
conference paper 2021
document
van Haaften, W. (author), Sangers, A. (author), Engers, T. (author), Djafari, s. (author)
Analysing combined data sets can result in signifi cant added value for many organisations, but the GDPR has put strict constraints on processing personal data. Anonymization by using Multi-Party Computation (MPC) however may off er organizations some relief of the perceived burden of GDPR under specifi c conditions. In this paper, we will...
conference paper 2020
document
Spini, G. (author), van Heesch, M.P.P. (author), Veugen, P.J.M. (author), Chatterjea, S. (author)
Optimizing the workflow of a complex organization such as a hospital is a difficult task. An accurate option is to use a real-time locating system to track locations of both patients and staff. However, privacy regulations forbid hospital management to assess location data of their staff members. In this exploratory work, we propose a secure...
article 2019
document
Veeningen, M. (author), Chatterjea, S. (author), Horváth, A.Z. (author), Spindler, G. (author), Boersma, E. (author), van der Spek, P. (author), van der GaliËn, O. (author), Gutteling, J. (author), Kraaij, W. (author), Veugen, P.J.M. (author)
conference paper 2018
document
Veugen, P.J.M. (author), Blom, F. (author), de Hoogh, S.J.A. (author), Erkin, Z. (author)
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair...
article 2015
document
Veugen, P.J.M. (author)
In the field of signal processing in the encrypted domain, linear operations are usually easy to perform, whereas multiplications, and bitwise operations like comparison, are more costly in terms of computation and communication. These bitwise operations frequently require a decomposition of the secret value into bits. To minimize the...
article 2015
document
Veugen, P.J.M. (author)
When processing data in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Integer division of encrypted data however requires an additional protocol between the client and the server and will be relatively expensive. We present new solutions for dividing encrypted data in the semi-honest...
article 2014
document
Makri, E. (author), Everts, M.H. (author), de Hoogh, S. (author), Peter, A. (author), op den Akker, H. (author), Hartel, P.H. (author), Jonker, W. (author)
We treat the problem of privacy-preserving statistics verification in clinical research. We show that given aggregated results from statistical calculations, we can verify their correctness efficiently, without revealing any of the private inputs used for the calculation. Our construction is based on the primitive of Secure Multi-Party...
conference paper 2014
document
Erkin, Z. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)
Recommender systems have become increasingly important in e-commerce as they can guide customers with finding personalized services and products. A variant of recommender systems that generates recommendations from a set of trusted people is recently getting more attention in social networks. However, people are concerned about their privacy as...
conference paper 2011
Searched for: subject%3A%22Multi%255C-Party%255C%2BComputation%22
(1 - 17 of 17)