Skip to main content

Showing 1–8 of 8 results for author: Chatel, S

.
  1. arXiv:2207.14071  [pdf, other

    cs.CR

    Verifiable Encodings for Secure Homomorphic Analytics

    Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux

    Abstract: Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data. However, the correctness of the computation result is not ensured. We propose two error detection encodings and build authenticators that enable practical client-verification of cloud-based homomorphi… ▽ More

    Submitted 4 June, 2024; v1 submitted 28 July, 2022; originally announced July 2022.

    Comments: update appendices

  2. arXiv:2103.08987  [pdf, other

    cs.CR cs.LG

    SoK: Privacy-Preserving Collaborative Tree-based Model Learning

    Authors: Sylvain Chatel, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux

    Abstract: Tree-based models are among the most efficient machine learning techniques for data mining nowadays due to their accuracy, interpretability, and simplicity. The recent orthogonal needs for more data and privacy protection call for collaborative privacy-preserving solutions. In this work, we survey the literature on distributed and privacy-preserving training of tree-based models and we systematize… ▽ More

    Submitted 18 June, 2021; v1 submitted 16 March, 2021; originally announced March 2021.

    Journal ref: Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2021, Issue 3

  3. arXiv:2007.04025  [pdf, other

    cs.CR

    Privacy and Integrity Preserving Computations with CRISP

    Authors: Sylvain Chatel, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Jean-Pierre Hubaux

    Abstract: In the digital era, users share their personal data with service providers to obtain some utility, e.g., access to high-quality services. Yet, the induced information flows raise privacy and integrity concerns. Consequently, cautious users may want to protect their privacy by minimizing the amount of information they disclose to curious service providers. Service providers are interested in verify… ▽ More

    Submitted 12 January, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Journal ref: USENIX Security Symposium 2021

  4. arXiv:2005.12273  [pdf

    cs.CR cs.CY

    Decentralized Privacy-Preserving Proximity Tracing

    Authors: Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Čapkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers , et al. (9 additional authors not shown)

    Abstract: This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chai… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 46 pages, 6 figures, first published 3 April 2020 on https://github.com/DP-3T/documents where companion documents and code can be found

  5. arXiv:1110.5179  [pdf

    physics.gen-ph

    Experimental approach for optimizing dry fabric formability

    Authors: S. Allaoui, G. Hivet, A. Wendling, D. Soulat, S. Chatel

    Abstract: In order to understand the mechanisms involved in the forming step of LCM processes and provide validation data to numerical models, a specific experimental device has been designed in collaboration between PRISME Institute and EADS. This toot also makes it possible to test the feasibility to obtain specific double curved shape constituted with dry fabric reinforcement. It contains one mechanical… ▽ More

    Submitted 24 October, 2011; originally announced October 2011.

    Comments: 14th European Conference on Composite Materials, Budapest : Hungary (2010)

  6. arXiv:1110.5178  [pdf

    physics.class-ph

    Analysis of Woven Reinforcement Preforming using an Experimental Approach

    Authors: G. Hivet, S. Allaoui, D. Soulat, A. Wendling, S. Chatel

    Abstract: In order to understand the mechanisms involved in the forming step of LCM processes and provide validation date to numerical models, a specific experimental device has been designed in collaboration between PRISME Institute and EADS. The goal of this paper is to present the potentialities and the first results obtained with this device.

    Submitted 24 October, 2011; originally announced October 2011.

    Comments: 17th International Conference on Composite Materials, Edinburgh : United Kingdom (2010)

  7. arXiv:1110.5177  [pdf

    physics.class-ph

    Analyse of Woven Reinforcement Preforming by Experimental Approach

    Authors: D. Soulat, S. Allaoui, S. Chatel

    Abstract: An experimental device of dry preform stam** was designed and carried out for the first stage of the RTM process. This tool was developed to test the feasibility to obtain specific double curved shape constituted with dry fabric reinforcement. Optical strain measurement can quantify defects on the composite piece. It is just enough to change the desired punch-die set of the preform. This tool co… ▽ More

    Submitted 24 October, 2011; originally announced October 2011.

    Comments: 2nd International Conference "Advanced Composite Materials Engineering, Brasov : Romania (2008)

  8. arXiv:cs/0703008  [pdf

    cs.HC

    Strategies in object-oriented design

    Authors: Sophie Chatel, Françoise Détienne

    Abstract: This paper presents a study aiming to analyse the design strategies of experts in object-oriented programming. We report an experiment conducted with four experts. Each subject solved three problems. Our results show that three strategies may be used in program design according to the solution structure. An object-centred strategy and a function-centred strategy are used when the solution has a… ▽ More

    Submitted 2 March, 2007; originally announced March 2007.

    Journal ref: Acta Psychologica 91 (1996) 245-269