Mouchet, Christian Troncoso-Pastoriza, Juan Bossuat, Jean-Philippe Hubaux, Jean-Pierre
Published in
Proceedings on Privacy Enhancing Technologies
We propose and evaluate a secure-multiparty-computation (MPC) solution in the semi-honest model with dishonest majority that is based on multiparty homomorphic encryption (MHE). To support our solution, we introduce a multiparty version of the Brakerski-Fan-Vercauteren homomorphic cryptosystem and implement it in an open-source library. MHE-based M...
Barman, Ludovic Dacosta, Italo Zamani, Mahdi Zhai, Ennan Pyrgelis, Apostolos Ford, Bryan Feigenbaum, Joan Hubaux, Jean-Pierre
Published in
Proceedings on Privacy Enhancing Technologies
Organizational networks are vulnerable to trafficanalysis attacks that enable adversaries to infer sensitive information fromnetwork traffic—even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks.We present PriFi, an anonymous communication protocol for LAN...
Froelicher, David Troncoso-Pastoriza, Juan R. Pyrgelis, Apostolos Sav, Sinem Sousa, Joao Sa Bossuat, Jean-Philippe Hubaux, Jean-Pierre
Published in
Proceedings on Privacy Enhancing Technologies
In this paper, we address the problem of privacy-preserving distributed learning and the evaluation of machine-learning models by analyzing it in the widespread MapReduce abstraction that we extend with privacy constraints. We design spindle (Scalable Privacy-preservINg Distributed LEarning), the first distributed and privacy-preserving system that...
Chatel, Sylvain Pyrgelis, Apostolos Troncoso-Pastoriza, Juan Ramón Hubaux, Jean-Pierre
Published in
Proceedings on Privacy Enhancing Technologies
Tree-based models are among the most efficient machine learning techniques for data mining nowadays due to their accuracy, interpretability, and simplicity. The recent orthogonal needs for more data and privacy protection call for collaborative privacy-preserving solutions. In this work, we survey the literature on distributed and privacy-preservin...
Lueks, Wouter Gürses, Seda Veale, Michael Bugnion, Edouard Salathé, Marcel Paterson, Kenneth G. Troncoso, Carmela
Published in
Proceedings on Privacy Enhancing Technologies
There is growing evidence that SARS-CoV-2 can be transmitted beyond close proximity contacts, in particular in closed and crowded environments with insufficient ventilation. To help mitigation efforts, contact tracers need a way to notify those who were present in such environments at the same time as infected individuals. Neither traditional human...
Lueks, Wouter Hampiholi, Brinda Alpár, Greg Troncoso, Carmela
Published in
Proceedings on Privacy Enhancing Technologies
Users’ devices, e.g., smartphones or laptops, are typically incapable of securely storing and processing cryptographic keys.We present Tandem, a novel set of protocols for securing cryptographic keys with support from a central server. Tandem uses one-time-use key-share tokens to preserve users’ privacy with respect to a malicious central server. A...
Holland, James K Hopper, Nicholas
Published in
Proceedings on Privacy Enhancing Technologies
Website Fingerprinting (WF) attacks are used by local passive attackers to determine the destination of encrypted internet traffic by comparing the sequences of packets sent to and received by the user to a previously recorded data set. As a result, WF attacks are of particular concern to privacy-enhancing technologies such as Tor. In response, a v...
Tolsdorf, Jan Reinhardt, Delphine Iacono, Luigi Lo
Published in
Proceedings on Privacy Enhancing Technologies
The processing of employees’ personal data is dramatically increasing, yet there is a lack of tools that allow employees to manage their privacy. In order to develop these tools, one needs to understand what sensitive personal data are and what factors influence employees’ willingness to disclose. Current privacy research, however, lacks such insig...
Tahaei, Mohammad Li, Tianshi Vaniea, Kami
Published in
Proceedings on Privacy Enhancing Technologies
Privacy tasks can be challenging for developers, resulting in privacy frameworks and guidelines from the research community which are designed to assist developers in considering privacy features and applying privacy enhancing technologies in early stages of software development. However, how developers engage with privacy design strategies is not ...
Alabi, Daniel McMillan, Audra Sarathy, Jayshree Smith, Adam Vadhan, Salil
Published in
Proceedings on Privacy Enhancing Technologies
Economics and social science research often require analyzing datasets of sensitive personal information at fine granularity, with models fit to small subsets of the data. Unfortunately, such fine-grained analysis can easily reveal sensitive individual information. We study regression algorithms that satisfy differential privacy, a constraint which...