-
Verifiable Encodings for Secure Homomorphic Analytics
Authors:
Sylvain Chatel,
Christian Knabenhans,
Apostolos Pyrgelis,
Carmela Troncoso,
Jean-Pierre Hubaux
Abstract:
Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data. However, the correctness of the computation result is not ensured. We propose two error detection encodings and build authenticators that enable practical client-verification of cloud-based homomorphi…
▽ More
Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data. However, the correctness of the computation result is not ensured. We propose two error detection encodings and build authenticators that enable practical client-verification of cloud-based homomorphic computations under different trade-offs and without compromising on the features of the encryption algorithm. Our authenticators operate on top of trending ring learning with errors based fully homomorphic encryption schemes over the integers. We implement our solution in VERITAS, a ready-to-use system for verification of outsourced computations executed over encrypted data. We show that contrary to prior work VERITAS supports verification of any homomorphic operation and we demonstrate its practicality for various applications, such as ride-hailing, genomic-data analysis, encrypted search, and machine-learning training and inference.
△ Less
Submitted 4 June, 2024; v1 submitted 28 July, 2022;
originally announced July 2022.
-
SoK: Privacy-Preserving Collaborative Tree-based Model Learning
Authors:
Sylvain Chatel,
Apostolos Pyrgelis,
Juan Ramon Troncoso-Pastoriza,
Jean-Pierre Hubaux
Abstract:
Tree-based models are among the most efficient machine learning techniques for data mining nowadays due to their accuracy, interpretability, and simplicity. The recent orthogonal needs for more data and privacy protection call for collaborative privacy-preserving solutions. In this work, we survey the literature on distributed and privacy-preserving training of tree-based models and we systematize…
▽ More
Tree-based models are among the most efficient machine learning techniques for data mining nowadays due to their accuracy, interpretability, and simplicity. The recent orthogonal needs for more data and privacy protection call for collaborative privacy-preserving solutions. In this work, we survey the literature on distributed and privacy-preserving training of tree-based models and we systematize its knowledge based on four axes: the learning algorithm, the collaborative model, the protection mechanism, and the threat model. We use this to identify the strengths and limitations of these works and provide for the first time a framework analyzing the information leakage occurring in distributed tree-based model learning.
△ Less
Submitted 18 June, 2021; v1 submitted 16 March, 2021;
originally announced March 2021.
-
Privacy and Integrity Preserving Computations with CRISP
Authors:
Sylvain Chatel,
Apostolos Pyrgelis,
Juan R. Troncoso-Pastoriza,
Jean-Pierre Hubaux
Abstract:
In the digital era, users share their personal data with service providers to obtain some utility, e.g., access to high-quality services. Yet, the induced information flows raise privacy and integrity concerns. Consequently, cautious users may want to protect their privacy by minimizing the amount of information they disclose to curious service providers. Service providers are interested in verify…
▽ More
In the digital era, users share their personal data with service providers to obtain some utility, e.g., access to high-quality services. Yet, the induced information flows raise privacy and integrity concerns. Consequently, cautious users may want to protect their privacy by minimizing the amount of information they disclose to curious service providers. Service providers are interested in verifying the integrity of the users' data to improve their services and obtain useful knowledge for their business. In this work, we present a generic solution to the trade-off between privacy, integrity, and utility, by achieving authenticity verification of data that has been encrypted for offloading to service providers. Based on lattice-based homomorphic encryption and commitments, as well as zero-knowledge proofs, our construction enables a service provider to process and reuse third-party signed data in a privacy-friendly manner with integrity guarantees. We evaluate our solution on different use cases such as smart-metering, disease susceptibility, and location-based activity tracking, thus showing its versatility. Our solution achieves broad generality, quantum-resistance, and relaxes some assumptions of state-of-the-art solutions without affecting performance.
△ Less
Submitted 12 January, 2021; v1 submitted 8 July, 2020;
originally announced July 2020.
-
Decentralized Privacy-Preserving Proximity Tracing
Authors:
Carmela Troncoso,
Mathias Payer,
Jean-Pierre Hubaux,
Marcel Salathé,
James Larus,
Edouard Bugnion,
Wouter Lueks,
Theresa Stadler,
Apostolos Pyrgelis,
Daniele Antonioli,
Ludovic Barman,
Sylvain Chatel,
Kenneth Paterson,
Srdjan Čapkun,
David Basin,
Jan Beutel,
Dennis Jackson,
Marc Roeschlin,
Patrick Leu,
Bart Preneel,
Nigel Smart,
Aysajan Abidin,
Seda Gürses,
Michael Veale,
Cas Cremers
, et al. (9 additional authors not shown)
Abstract:
This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chai…
▽ More
This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chain. The system aims to minimise privacy and security risks for individuals and communities and guarantee the highest level of data protection. The goal of our proximity tracing system is to determine who has been in close physical proximity to a COVID-19 positive person and thus exposed to the virus, without revealing the contact's identity or where the contact occurred. To achieve this goal, users run a smartphone app that continually broadcasts an ephemeral, pseudo-random ID representing the user's phone and also records the pseudo-random IDs observed from smartphones in close proximity. When a patient is diagnosed with COVID-19, she can upload pseudo-random IDs previously broadcast from her phone to a central server. Prior to the upload, all data remains exclusively on the user's phone. Other users' apps can use data from the server to locally estimate whether the device's owner was exposed to the virus through close-range physical proximity to a COVID-19 positive person who has uploaded their data. In case the app detects a high risk, it will inform the user.
△ Less
Submitted 25 May, 2020;
originally announced May 2020.
-
Experimental approach for optimizing dry fabric formability
Authors:
S. Allaoui,
G. Hivet,
A. Wendling,
D. Soulat,
S. Chatel
Abstract:
In order to understand the mechanisms involved in the forming step of LCM processes and provide validation data to numerical models, a specific experimental device has been designed in collaboration between PRISME Institute and EADS. This toot also makes it possible to test the feasibility to obtain specific double curved shape constituted with dry fabric reinforcement. It contains one mechanical…
▽ More
In order to understand the mechanisms involved in the forming step of LCM processes and provide validation data to numerical models, a specific experimental device has been designed in collaboration between PRISME Institute and EADS. This toot also makes it possible to test the feasibility to obtain specific double curved shape constituted with dry fabric reinforcement. It contains one mechanical module containing the classical tools in forming process, (punch, blank holder, and open-die), and one optical module to measure the 3D-deformed shape and the distribution of local deformations, like shear angles of the woven reinforcement during all the process. The goal of this paper is to present the potentialities and the first results obtained with this device.
△ Less
Submitted 24 October, 2011;
originally announced October 2011.
-
Analysis of Woven Reinforcement Preforming using an Experimental Approach
Authors:
G. Hivet,
S. Allaoui,
D. Soulat,
A. Wendling,
S. Chatel
Abstract:
In order to understand the mechanisms involved in the forming step of LCM processes and provide validation date to numerical models, a specific experimental device has been designed in collaboration between PRISME Institute and EADS. The goal of this paper is to present the potentialities and the first results obtained with this device.
In order to understand the mechanisms involved in the forming step of LCM processes and provide validation date to numerical models, a specific experimental device has been designed in collaboration between PRISME Institute and EADS. The goal of this paper is to present the potentialities and the first results obtained with this device.
△ Less
Submitted 24 October, 2011;
originally announced October 2011.
-
Analyse of Woven Reinforcement Preforming by Experimental Approach
Authors:
D. Soulat,
S. Allaoui,
S. Chatel
Abstract:
An experimental device of dry preform stam** was designed and carried out for the first stage of the RTM process. This tool was developed to test the feasibility to obtain specific double curved shape constituted with dry fabric reinforcement. Optical strain measurement can quantify defects on the composite piece. It is just enough to change the desired punch-die set of the preform. This tool co…
▽ More
An experimental device of dry preform stam** was designed and carried out for the first stage of the RTM process. This tool was developed to test the feasibility to obtain specific double curved shape constituted with dry fabric reinforcement. Optical strain measurement can quantify defects on the composite piece. It is just enough to change the desired punch-die set of the preform. This tool could be used to validate numerical simulation of the process.
△ Less
Submitted 24 October, 2011;
originally announced October 2011.
-
Strategies in object-oriented design
Authors:
Sophie Chatel,
Françoise Détienne
Abstract:
This paper presents a study aiming to analyse the design strategies of experts in object-oriented programming. We report an experiment conducted with four experts. Each subject solved three problems. Our results show that three strategies may be used in program design according to the solution structure. An object-centred strategy and a function-centred strategy are used when the solution has a…
▽ More
This paper presents a study aiming to analyse the design strategies of experts in object-oriented programming. We report an experiment conducted with four experts. Each subject solved three problems. Our results show that three strategies may be used in program design according to the solution structure. An object-centred strategy and a function-centred strategy are used when the solution has a hierarchical structure with vertical communication between objects. In this case, the plan which guides the design activity is declarative. A procedure-centred strategy is used when the solution has a flat structure with horizontal communication between objects. In this case, the plan which guides the design activity is procedural. These results are discussed in relation with results on design strategies in procedural design. Furthermore, our results provide insight into the knowledge structures of experts in object-oriented design. To conclude, we point out limitations of this study and discuss implications of our results for Human-Computer Interaction systems, in particular for systems assisting experts in their design activity.
△ Less
Submitted 2 March, 2007;
originally announced March 2007.