46 research outputs found
European Examples : Sweden, Denmark and the Netherlands
[Abstract unavailable
Multi-party Private Set Operations with an External Decider
A Private Set Operation (PSO) protocol involves at least two parties with their private input sets. The goal of the protocol is to learn the output of a set operation, e.g., set intersection, on the parties' input sets, without revealing any information about the items that are not in the output set. Commonly, the outcome of the set operation is revealed to parties and no one else. However, in many application areas of PSO, the result of the set operation should be learned by an external participant who does not have an input set. We call this participant the decider. In this paper, we present new variants of multi-party PSO, for the external decider setting. All parties except the decider have a private set. Parties other than the decider neither learn this result, nor anything else from this protocol. Moreover, we studied generic solutions to the problem of PSO in the presence of an external decider.Peer reviewe
Private membership test protocol with low communication complexity
Ramezanian S, Meskanen T, Naderpour M, Junnila V, Niemi V. Private membership test protocol with low communication complexity. Digital Communications and Networks. 2019 May 13.We introduce a practical method to perform private membership tests. In this method, clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server. After executing the queries, the content of the server's set remains secret. One use case for a private membership test is to check whether a file contains any malware by checking its signature against a database of malware samples in a privacy-preserving way. We apply the Bloom filter and the Cuckoo filter in the membership test procedure. In order to achieve privacy properties, we present a novel protocol based on some homomorphic encryption schemes. In our protocol, we rearrange the data in the set into N-dimensional hypercubes. We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check whether a hash value of a given file is in the malware database of the company. The evaluation shows that our method is feasible for real-world applications. We also have tested the performance of our protocol for databases of different sizes and data structures with different dimensions: 2-dimensional, 3-dimensional, and 4-dimensional hypercubes. We present formulas to estimate the cost of computation and communication in our protocol.Peer reviewe
Effect of the exhaust gas side fouling on the performance of a plate and shell type heat exchanger
fi=vertaisarvioimaton|en=nonPeerReviewed
Sealed in a lake : Biology and conservation of the endangered Saimaa ringed seal
Wildlife species living in proximity with humans often suffer from various anthropogenic factors. Here, we focus on the endangered Saimaa ringed seal (Pusa hispida saimensis), which lives in close connection with humans in Lake Saimaa, Finland. This unique endemic population has remained landlocked since the last glacial period, and it currently consists of only similar to 400 individuals. In this review, we summarize the current knowledge on the Saimaa ringed seal, identify the main risk factors and discuss the efficacy of conservation actions put in place to ensure its long-term survival. The main threats for this rare subspecies are bycatch mortality, habitat destruction and increasingly mild winters. Climate change, together with small population size and an extremely impoverished gene pool, forms a new severe threat. The main conservation actions and priorities for the Saimaa ringed seal are implementation of fishing closures, land-use planning, protected areas, and reduction of pup mortality. Novel innovations, such as provisioning of artificial nest structures, may become increasingly important in the future. Although the Saimaa ringed seal still faces the risk of extinction, the current positive trend in the number of seals shows that endangered wildlife populations can recover even in regions with considerable human inhabitation, when legislative protection is combined with intensive research, engagement of local inhabitants, and innovative conservation actions. Such multifaceted conservation approaches are needed in a world with a growing human population and a rapidly changing climate.Peer reviewe
The Resource Publishing Pipeline of the Language Bank of Finland
We present the process of publishing resources in Kielipankki, the Language Bank of Finland. Our pipeline includes all the steps that are needed to publish a resource: from finding and receiving the original data until making the data available via different platforms, e.g., the Korp concordance tool or the download service. Our goal is to standardize the publishing process by creating an ordered check list of tasks with the corresponding documentation and by developing conversion scripts and processing tools that can be shared and applied on different resources.Peer reviewe
Private membership test protocol with low communication complexity
We introduce a practical method to perform private membership tests. In this method, clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server. After executing the queries, the content of the server's set remains secret. One use case for a private membership test is to check whether a file contains any malware by checking its signature against a database of malware samples in a privacy preserving way. We apply the Bloom filter and the Cuckoo filter in the membership test procedure. In order to achieve privacy properties, we present a novel protocol based on some homomorphic encryption schemes. In our protocol, we rearrange the data in the set into N
-dimensional hypercubes. We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check whether a hash value of a given file is in the malware database of the company. The evaluation shows that our method is feasible for real-world applications. We also have tested the performance of our protocol for databases of different sizes and data structures with different dimensions: 2-dimensional, 3-dimensional and 4-dimensional hypercubes. We present formulas to estimate the cost of computation and communication in our protocol.</p