Skip to main content

Showing 1–12 of 12 results for author: Troncoso-Pastoriza, J R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.00690  [pdf, other

    cs.CR

    slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference

    Authors: Francesco Intoci, Sinem Sav, Apostolos Pyrgelis, Jean-Philippe Bossuat, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux

    Abstract: Homomorphic encryption (HE), which allows computations on encrypted data, is an enabling technology for confidential cloud computing. One notable example is privacy-preserving Prediction-as-a-Service (PaaS), where machine-learning predictions are computed on encrypted data. However, develo** HE-based solutions for encrypted PaaS is a tedious task which requires a careful design that predominantl… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: Accepted for publication at 5th Workshop on Cloud Security and Privacy (Cloud S&P 2023)

  2. Scalable and Privacy-Preserving Federated Principal Component Analysis

    Authors: David Froelicher, Hyunghoon Cho, Manaswitha Edupalli, Joao Sa Sousa, Jean-Philippe Bossuat, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Bonnie Berger, Jean-Pierre Hubaux

    Abstract: Principal component analysis (PCA) is an essential algorithm for dimensionality reduction in many data science domains. We address the problem of performing a federated PCA on private data distributed among multiple data providers while ensuring data confidentiality. Our solution, SF-PCA, is an end-to-end secure system that preserves the confidentiality of both the original data and all intermedia… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: Published elsewhere. IEEE Symposium on Security and Privacy 2023

  3. arXiv:2103.08987  [pdf, other

    cs.CR cs.LG

    SoK: Privacy-Preserving Collaborative Tree-based Model Learning

    Authors: Sylvain Chatel, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux

    Abstract: Tree-based models are among the most efficient machine learning techniques for data mining nowadays due to their accuracy, interpretability, and simplicity. The recent orthogonal needs for more data and privacy protection call for collaborative privacy-preserving solutions. In this work, we survey the literature on distributed and privacy-preserving training of tree-based models and we systematize… ▽ More

    Submitted 18 June, 2021; v1 submitted 16 March, 2021; originally announced March 2021.

    Journal ref: Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2021, Issue 3

  4. arXiv:2101.08879  [pdf, other

    cs.CR

    Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies

    Authors: Anisa Halimi, Leonard Dervishi, Erman Ayday, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux, Xiaoqian Jiang, Jaideep Vaidya

    Abstract: Providing provenance in scientific workflows is essential for reproducibility and auditability purposes. Workflow systems model and record provenance describing the steps performed to obtain the final results of a computation. In this work, we propose a framework that verifies the correctness of the statistical test results that are conducted by a researcher while protecting individuals' privacy i… ▽ More

    Submitted 7 November, 2022; v1 submitted 21 January, 2021; originally announced January 2021.

    Comments: Appeared in the Proceedings on Privacy Enhancing Technologies Symposium (PETS) 2022

  5. arXiv:2010.14445  [pdf

    cs.CR cs.CY

    Revolutionizing Medical Data Sharing Using Advanced Privacy Enhancing Technologies: Technical, Legal and Ethical Synthesis

    Authors: James Scheibner, Jean Louis Raisaro, Juan Ramón Troncoso-Pastoriza, Marcello Ienca, Jacques Fellay, Effy Vayena, Jean-Pierre Hubaux

    Abstract: Multisite medical data sharing is critical in modern clinical practice and medical research. The challenge is to conduct data sharing that preserves individual privacy and data usability. The shortcomings of traditional privacy-enhancing technologies mean that institutions rely on bespoke data sharing contracts. These contracts increase the inefficiency of data sharing and may disincentivize impor… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: 19 pages, 2 figures, 1 table

  6. arXiv:2009.00349  [pdf, other

    cs.CR cs.LG

    POSEIDON: Privacy-Preserving Federated Neural Network Learning

    Authors: Sinem Sav, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao Sa Sousa, Jean-Pierre Hubaux

    Abstract: In this paper, we address the problem of privacy-preserving training and evaluation of neural networks in an $N$-party, federated learning setting. We propose a novel system, POSEIDON, the first of its kind in the regime of privacy-preserving neural network training. It employs multiparty lattice-based cryptography to preserve the confidentiality of the training data, the model, and the evaluation… ▽ More

    Submitted 8 January, 2021; v1 submitted 1 September, 2020; originally announced September 2020.

    Comments: Accepted for publication at Network and Distributed Systems Security (NDSS) Symposium 2021

  7. arXiv:2007.04025  [pdf, other

    cs.CR

    Privacy and Integrity Preserving Computations with CRISP

    Authors: Sylvain Chatel, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Jean-Pierre Hubaux

    Abstract: In the digital era, users share their personal data with service providers to obtain some utility, e.g., access to high-quality services. Yet, the induced information flows raise privacy and integrity concerns. Consequently, cautious users may want to protect their privacy by minimizing the amount of information they disclose to curious service providers. Service providers are interested in verify… ▽ More

    Submitted 12 January, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Journal ref: USENIX Security Symposium 2021

  8. arXiv:2005.09532  [pdf, other

    cs.CR

    Scalable Privacy-Preserving Distributed Learning

    Authors: David Froelicher, Juan R. Troncoso-Pastoriza, Apostolos Pyrgelis, Sinem Sav, Joao Sa Sousa, Jean-Philippe Bossuat, Jean-Pierre Hubaux

    Abstract: In this paper, we address the problem of privacy-preserving distributed learning and the evaluation of machine-learning models by analyzing it in the widespread MapReduce abstraction that we extend with privacy constraints. We design SPINDLE (Scalable Privacy-preservINg Distributed LEarning), the first distributed and privacy-preserving system that covers the complete ML workflow by enabling the e… ▽ More

    Submitted 14 July, 2021; v1 submitted 19 May, 2020; originally announced May 2020.

    Comments: Published at the 21st Privacy Enhancing Technologies Symposium (PETS 2021)

  9. arXiv:1902.03785  [pdf, other

    cs.CR

    Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets

    Authors: David Froelicher, Juan R. Troncoso-Pastoriza, Joao Sa Sousa, Jean-Pierre Hubaux

    Abstract: Data sharing has become of primary importance in many domains such as big-data analytics, economics and medical research, but remains difficult to achieve when the data are sensitive. In fact, sharing personal information requires individuals' unconditional consent or is often simply forbidden for privacy and security reasons. In this paper, we propose Drynx, a decentralized system for privacy-con… ▽ More

    Submitted 27 February, 2020; v1 submitted 11 February, 2019; originally announced February 2019.

    Comments: Accepted for publication at IEEE Transactions on Information Forensics and Security

  10. arXiv:1712.00848  [pdf, other

    cs.CR

    Multivariate Cryptosystems for Secure Processing of Multidimensional Signals

    Authors: Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González

    Abstract: Multidimensional signals like 2-D and 3-D images or videos are inherently sensitive signals which require privacy-preserving solutions when processed in untrustworthy environments, but their efficient encrypted processing is particularly challenging due to their structure, dimensionality and size. This work introduces a new cryptographic hard problem denoted m-RLWE (multivariate Ring Learning with… ▽ More

    Submitted 3 December, 2017; originally announced December 2017.

  11. arXiv:1607.05244  [pdf, ps, other

    cs.CR cs.DM

    On Ring Learning with Errors over the Tensor Product of Number Fields

    Authors: Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González

    Abstract: The "Ring Learning with Errors" (RLWE) problem was formulated as a variant of the "Learning with Errors" (LWE) problem, with the purpose of taking advantage of an additional algebraic structure in the underlying considered lattices; this enables improvements on the efficiency and cipher expansion on those cryptographic applications which were previously based on the LWE problem. In Eurocrypt 2010,… ▽ More

    Submitted 1 February, 2018; v1 submitted 18 July, 2016; originally announced July 2016.

  12. arXiv:1607.05229  [pdf, other

    cs.CR

    Number Theoretic Transforms for Secure Signal Processing

    Authors: Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González

    Abstract: Multimedia contents are inherently sensitive signals that must be protected whenever they are outsourced to an untrusted environment. This problem becomes a challenge when the untrusted environment must perform some processing on the sensitive signals; a paradigmatic example is Cloud-based signal processing services. Approaches based on Secure Signal Processing (SSP) address this challenge by prop… ▽ More

    Submitted 29 January, 2018; v1 submitted 18 July, 2016; originally announced July 2016.