239 research outputs found

    Building a privacy-preserving semantic overlay for Peer-to-Peer networks

    Get PDF
    Searching a Peer-to-Peer (P2P) network without using a central index has been widely investigated but proved to be very difficult. Various strategies have been proposed, however no practical solution to date also addresses privacy concerns. By clustering peers which have similar interests, a semantic overlay provides a method for achieving scalable search. Traditionally, in order to find similar peers, a peer is required to fully expose its preferences for items or content, therefore disclosing this private information. However, in a hostile environment, such as a P2P system, a peer can not know the true identity or intentions of fellow peers. In this paper, we propose two protocols for building a semantic overlay in a privacy-preserving manner by modifying existing solutions to the Private Set Intersection (PSI) problem. Peers in our overlay compute their similarity to other peers in the encrypted domain, allowing them to find similar peers. Using homomorphic encryption, peers can carrying out computations on encrypted values, without needing to decrypt them first. We propose two protocols, one based on the inner product of vectors, the other on multivariate polynomial evaluation, which are able to compute a similarity value between two peers. Both protocols are implemented on top of an existing P2P platform and are designed for actual deployment. Using a supercomputer and a dataset extracted from a real world instance of a semantic overlay, we emulate our protocols in a network consisting of a thousand peers. Finally, we show the actual computational and bandwidth usage of the protocols as recorded during those experiments

    Password-conditioned Anonymization and Deanonymization with Face Identity Transformers

    Full text link
    Cameras are prevalent in our daily lives, and enable many useful systems built upon computer vision technologies such as smart cameras and home robots for service applications. However, there is also an increasing societal concern as the captured images/videos may contain privacy-sensitive information (e.g., face identity). We propose a novel face identity transformer which enables automated photo-realistic password-based anonymization as well as deanonymization of human faces appearing in visual data. Our face identity transformer is trained to (1) remove face identity information after anonymization, (2) make the recovery of the original face possible when given the correct password, and (3) return a wrong--but photo-realistic--face given a wrong password. Extensive experiments show that our approach enables multimodal password-conditioned face anonymizations and deanonymizations, without sacrificing privacy compared to existing anonymization approaches.Comment: ECCV 202

    Secure equality testing protocols in the two-party setting

    Get PDF
    Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In this work, we consider a scenario with two parties where party A has two integers encrypted using an additively homomorphic scheme and party B has the decryption key. Party A would like to obtain an encrypted bit that shows whether the integers are equal or not but nothing more. We propose three secure equality testing protocols, which are more efficient in terms of communication, computation or both compared to the existing work. To support our claims, we present experimental results, which show that our protocols achieve up to 99% computation-wise improvement compared to the state-of-the-art protocols in a fair experimental set-up

    Solving bin-packing problems under privacy preservation: Possibilities and trade-offs

    Get PDF
    We investigate the trade-off between privacy and solution quality that occurs when a kanonymized database is used as input to the bin-packing optimization problem. To investigate the impact of the chosen anonymization method on this trade-off, we consider two recoding methods for k-anonymity: full-domain generalization and partition-based single-dimensional recoding. To deal with the uncertainty created by anonymization in the bin-packing problem, we utilize stochastic programming and robust optimization methods. Our computational results show that the trade-off is strongly dependent on both the anonymization and optimization method. On the anonymization side, we see that using single dimensional recoding leads to significantly better solution quality than using full domain generalization. On the optimization side, we see that using stochastic programming, where we use the multiset of values in an equivalence class, considerably improves the solutions. While publishing these multisets makes the database more vulnerable to a table linkage attack, we argue that it is up to the data publisher to reason if such a loss of anonymization weighs up to the increase in optimization performance

    Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer

    Get PDF
    open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n)O(n) complexity instead of O(2n)O(2^n), where nn is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves its efficiency significantly

    Efficient Verifiable Computation of XOR for Biometric Authentication

    Full text link
    This work addresses the security and privacy issues in remotebiometric authentication by proposing an efficient mechanism to verifythe correctness of the outsourced computation in such protocols.In particular, we propose an efficient verifiable computation of XORingencrypted messages using an XOR linear message authenticationcode (MAC) and we employ the proposed scheme to build a biometricauthentication protocol. The proposed authentication protocol is bothsecure and privacy-preserving against malicious (as opposed to honest-but-curious) adversaries. Specifically, the use of the verifiable computation scheme together with an homomorphic encryption protects the privacy of biometric templates against malicious adversaries. Furthermore, in order to achieve unlinkability of authentication attempts, while keeping a low communication overhead, we show how to apply Oblivious RAM and biohashing to our protocol. We also provide a proof of security for the proposed solution. Our simulation results show that the proposed authentication protocol is efficient

    Features of Barium and Strontium Titanates and Ferrites Synthesized from a Melt in a Solar Furnace

    Get PDF
    Изучены сегнетокерамический материал на базе титаната и магнитный материал на базе феррита бария и стронция, полученные методом синтеза из расплава на солнечной печи. Выявлен немонотонный характер влияния легирования титаната бария оксидом железа Fe2O3, заключающийся в увеличении диэлектрической проницаемости BaTiO3. Определена оптимальная концентрация легирования оксида железа – 6 мол.%, за превышением которого наблюдается насыщение кривых зависимостей диэлектрических свойств титаната бария. Выявлено, что ферриты бария и стронция проявляют высокотемпературные мультиферроидные свойстваA ferro ceramic material based on titanate and a magnetic material based on barium and strontium ferrite obtained by furnace-based melt synthesis have been studied. A nonmonotonic characteristic feature of doping barium titanate with iron oxide Fe2O3, which consists in constructing the permittivity of BaTiO3, has been revealed. The optimal concentration of doping of iron oxide is determined – 6 mol.%, beyond which saturation of the dependence curves of the dielectric properties of barium titanate is observed. It was revealed that barium and strontium ferrites exhibit high-temperature multiferroic propertie

    The global burden of falls: Global, regional and national estimates of morbidity and mortality from the Global Burden of Disease Study 2017

    Get PDF
    Background: Falls can lead to severe health loss including death. Past research has shown that falls are an important cause of death and disability worldwide. The Global Burden of Disease Study 2017 (GBD 2017) provides a comprehensive assessment of morbidity and mortality from falls. Methods: Estimates for mortality, years of life lost (YLLs), incidence, prevalence, years lived with disability (YLDs) and disability-adjusted life years (DALYs) were produced for 195 countries and territories from 1990 to 2017 for all ages using the GBD 2017 framework. Distributions of the bodily injury (eg, hip fracture) were estimated using hospital records. Results: Globally, the age-standardised incidence of falls was 2238 (1990-2532) per 100 000 in 2017, representing a decline of 3.7% (7.4 to 0.3) from 1990 to 2017. Age-standardised prevalence w

    Future and potential spending on health 2015-40: Development assistance for health, and government, prepaid private, and out-of-pocket health spending in 184 countries

    Get PDF
    Background: The amount of resources, particularly prepaid resources, available for health can affect access to health care and health outcomes. Although health spending tends to increase with economic development, tremendous variation exists among health financing systems. Estimates of future spending can be beneficial for policy makers and planners, and can identify financing gaps. In this study, we estimate future gross domestic product (GDP), all-sector government spending, and health spending disaggregated by source, and we compare expected future spending to potential future spending. Methods: We extracted GDP, government spending in 184 countries from 1980-2015, and health spend data from 1995-2014. We used a series of ensemble models to estimate future GDP, all-sector government spending, development assistance for health, and government, out-of-pocket, and prepaid private health spending through 2040. We used frontier analyses to identify patterns exhibited by the countries that dedicate the most funding to health, and used these frontiers to estimate potential health spending for each low-income or middle-income country. All estimates are inflation and purchasing power adjusted. Findings: We estimated that global spending on health will increase from US9.21trillionin2014to9.21 trillion in 2014 to 24.24 trillion (uncertainty interval [UI] 20.47-29.72) in 2040. We expect per capita health spending to increase fastest in upper-middle-income countries, at 5.3% (UI 4.1-6.8) per year. This growth is driven by continued growth in GDP, government spending, and government health spending. Lower-middle income countries are expected to grow at 4.2% (3.8-4.9). High-income countries are expected to grow at 2.1% (UI 1.8-2.4) and low-income countries are expected to grow at 1.8% (1.0-2.8). Despite this growth, health spending per capita in low-income countries is expected to remain low, at 154(UI133181)percapitain2030and154 (UI 133-181) per capita in 2030 and 195 (157-258) per capita in 2040. Increases in national health spending to reach the level of the countries who spend the most on health, relative to their level of economic development, would mean $321 (157-258) per capita was available for health in 2040 in low-income countries. Interpretation: Health spending is associated with economic development but past trends and relationships suggest that spending will remain variable, and low in some low-resource settings. Policy change could lead to increased health spending, although for the poorest countries external support might remain essential

    Secure Arithmetic Computation with Constant Computational Overhead

    Get PDF
    We study the complexity of securely evaluating an arithmetic circuit over a finite field FF in the setting of secure two-party computation with semi-honest adversaries. In all existing protocols, the number of arithmetic operations per multiplication gate grows either linearly with logF\log |F| or polylogarithmically with the security parameter. We present the first protocol that only makes a *constant* (amortized) number of field operations per gate. The protocol uses the underlying field FF as a black box, and its security is based on arithmetic analogues of well-studied cryptographic assumptions. Our protocol is particularly appealing in the special case of securely evaluating a ``vector-OLE\u27\u27 function of the form ax+b\vec{a}x+\vec{b}, where xFx\in F is the input of one party and a,bFw\vec{a},\vec{b}\in F^w are the inputs of the other party. In this case, which is motivated by natural applications, our protocol can achieve an asymptotic rate of 1/31/3 (i.e., the communication is dominated by sending roughly 3w3w elements of FF). Our implementation of this protocol suggests that it outperforms competing approaches even for relatively small fields FF and over fast networks. Our technical approach employs two new ingredients that may be of independent interest. First, we present a general way to combine any linear code that has a fast encoder and a cryptographic (``LPN-style\u27\u27) pseudorandomness property with another linear code that supports fast encoding and *erasure-decoding*, obtaining a code that inherits both the pseudorandomness feature of the former code and the efficiency features of the latter code. Second, we employ local *arithmetic* pseudo-random generators, proposing arithmetic generalizations of boolean candidates that resist all known attacks
    corecore