41 research outputs found

    Privacy-Preserving Distributed Set Intersection *

    Get PDF
    Abstract With the growing demand of databases outsourcing and its security concerns, we investigate privacy-preserving set intersection in a distributed scenario. We propose a one-round protocol for privacy-preserving set intersection based on a combination of secret sharing scheme and homomorphic encryption. We then show that, with an extra permutation performed by each contacted server, the cardinality of set intersection can be computed efficiently. All protocols constructed in this paper are provably secure against an honest-but-curious adversary under the Decisional Diffie-Hellman assumption

    A Framework for Fully-Simulatable tt-out-of-nn Oblivious Transfer

    Get PDF
    Oblivious transfer is a fundamental building block for multiparty computation protocols. In this paper, we present a generally realizable framework for fully-simulatable tt-out-of-nn oblivious transfer (\mbox{OT}^{n}_{t}) with security against non-adaptive malicious adversaries in the plain mode. Our construction relies on a single cryptographic primitive which is a variant of smooth projective hashing (SPH). A direct consequence of our work is that the existence of protocols for \mbox{OT}^{n}_{t} is reduced to the existence of this SPH variant. Before this paper, the only known reductions provided half-simulatable security and every known efficient protocol involved at least two distinct cryptographic primitives. We show how to instantiate this new SPH variant under not only the decisional Diffie-Hellman assumption, the decisional NN-th residuosity assumption and the decisional quadratic residuosity assumption as currently existing SPH constructions, but also the learning with errors problem. Our framework only needs 44 communication rounds, which implies that it is more round-efficient than known protocols holding identical features

    Attack simulation based software protection assessment method

    Get PDF
    Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections. To solve these issues, we present a novel attack simulation based software protection assessment method to assess and compare various protection solutions. Our solution relies on Petri Nets to specify and visualize attack models, and we developed a Monte Carlo based approach to simulate attacking processes and to deal with uncertainty. Then, based on this simulation and estimation, a novel protection comparison model is proposed to compare different protection solutions. Lastly, our attack simulation based software protection assessment method is presented. We illustrate our method by means of a software protection assessment process to demonstrate that our approach can provide a suitable software protection assessment for developers and software companies

    Attack simulation based software protection assessment method

    Get PDF
    Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections. To solve these issues, we present a novel attack simulation based software protection assessment method to assess and compare various protection solutions. Our solution relies on Petri Nets to specify and visualize attack models, and we developed a Monte Carlo based approach to simulate attacking processes and to deal with uncertainty. Then, based on this simulation and estimation, a novel protection comparison model is proposed to compare different protection solutions. Lastly, our attack simulation based software protection assessment method is presented. We illustrate our method by means of a software protection assessment process to demonstrate that our approach can provide a suitable software protection assessment for developers and software companies

    Attack simulation based software protection assessment method

    Get PDF
    Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections. To solve these issues, we present a novel attack simulation based software protection assessment method to assess and compare various protection solutions. Our solution relies on Petri Nets to specify and visualize attack models, and we developed a Monte Carlo based approach to simulate attacking processes and to deal with uncertainty. Then, based on this simulation and estimation, a novel protection comparison model is proposed to compare different protection solutions. Lastly, our attack simulation based software protection assessment method is presented. We illustrate our method by means of a software protection assessment process to demonstrate that our approach can provide a suitable software protection assessment for developers and software companies

    Mesenchymal and stemness circulating tumor cells in early breast cancer diagnosis

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Epithelial mesenchymal transition (EMT) is a crucial event likely involved in dissemination of epithelial cancer cells. This process enables them to acquire migratory/invasive properties, contributing to tumor and metastatic spread. To know if this event is an early one in breast cancer, we developed a clinical trial. The aim of this protocol was to detect circulating tumor cells endowed with mesenchymal and/or stemness characteristics, at the time of initial diagnosis. Breast cancer patients (n = 61), without visceral or bone metastasis were enrolled and analysis of these dedifferentiated circulating tumor cells (ddCTC) was realized.</p> <p>Methods</p> <p><it>AdnaGen </it>method was used for enrichment cell selection. Then, ddCTC were characterized by RT-PCR study of the following genes: PI3Kα, Akt-2, Twist1 (EMT markers) and ALDH1, Bmi1 and CD44 (stemness indicators).</p> <p>Results</p> <p>Among the studied primary breast cancer cohort, presence of ddCTC was detected in 39% of cases. This positivity is independant from tumor clinicopathological factors apart from the lymph node status.</p> <p>Conclusions</p> <p>Our data uniquely demonstrated that <it>in vivo </it>EMT occurs in the primary tumors and is associated with an enhanced ability of tumor cells to intravasate in the early phase of cancer disease. These results suggest that analysis of circulating tumor cells focused on cells showing mesenchymal or stemness characteristics might facilitate assessment of new drugs in clinical trials.</p

    Verifiable multi-secret sharing schemes for multiple threshold access structures

    Get PDF
    A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition some secrets may require a higher security level than others involving the need for different threshold values. Recently Chan and Chang designed such a scheme but their construction only allows a single secret to be shared per threshold value. In this article we combine the previous two approaches to design a multiple time verifiable multi-secret sharing scheme where several secrets can be shared for each threshold value. Since the running time is an important factor for practical applications, we will provide a complexity comparison of our combined approach with respect to the previous schemes

    Dynamic threshold and cheater resistance for Shamir secret sharing scheme

    No full text
    In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t,n)-threshold scheme without interacting with the dealer. Our construction will reduce the problem of secret recovery to the polynomial reconstruction problem which can be solved using a recent algorithm by Guruswami and Sudan. In addition to be dealer-free, our protocol does not increase the communication cost between the dealer and the n participants when compared to the original (t,n)-threshold scheme. Despite an increase of the asymptotic time complexity at the combiner, we show that recovering the secret from the output of the previous polynomial reconstruction algorithm is still realistic even for large values of t. Furthermore the scheme does not require every share to be authenticated before being processed by the combiner. This will enable us to reduce the number of elements to be publicly known to recover the secret to one digest produced by a collision resistant hash function which is smaller than the requirements of most verifiable secret sharing schemes.15 page(s
    corecore