Skip to main content

Showing 1–3 of 3 results for author: Hazay, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.16253  [pdf, ps, other

    cs.DC

    Towards Optimal Communication Byzantine Reliable Broadcast under a Message Adversary

    Authors: Timothé Albouy, Davide Frey, Ran Gelles, Carmit Hazay, Michel Raynal, Elad Michael Schiller, Francois Taiani, Vassilis Zikas

    Abstract: We address the problem of Reliable Broadcast in asynchronous message-passing systems with $n$ nodes, of which up to $t$ are malicious (faulty), in addition to a message adversary that can drop some of the messages sent by correct (non-faulty) nodes. We present a Message-Adversary-Tolerant Byzantine Reliable Broadcast (MBRB) algorithm that communicates an almost optimal amount of $O(|m|+n^2κ)$ bi… ▽ More

    Submitted 25 December, 2023; originally announced December 2023.

  2. arXiv:1812.01372  [pdf, other

    cs.CR

    Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation

    Authors: Siddharth Garg, Zahra Ghodsi, Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam

    Abstract: In several settings of practical interest, two parties seek to collaboratively perform inference on their private data using a public machine learning model. For instance, several hospitals might wish to share patient medical records for enhanced diagnostics and disease prediction, but may not be able to share data in the clear because of privacy concerns. In this work, we propose an actively secu… ▽ More

    Submitted 4 December, 2018; originally announced December 2018.

  3. arXiv:1009.1759  [pdf, other

    cs.IT cs.CR

    On Compression of Data Encrypted with Block Ciphers

    Authors: Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin

    Abstract: This paper investigates compression of data encrypted with block ciphers, such as the Advanced Encryption Standard (AES). It is shown that such data can be feasibly compressed without knowledge of the secret key. Block ciphers operating in various chaining modes are considered and it is shown how compression can be achieved without compromising security of the encryption scheme. Further, it is sho… ▽ More

    Submitted 9 September, 2010; originally announced September 2010.