Show simple item record

dc.creatorHallgren P. 
dc.creatorKishore R. 
dc.creatorOchoa M. 
dc.creatorSabelfeld A. 
dc.date.accessioned2020-05-25T23:56:04Z
dc.date.available2020-05-25T23:56:04Z
dc.date.created2018
dc.identifier.issn0926227X
dc.identifier.urihttps://repository.urosario.edu.co/handle/10336/22313
dc.description.abstract"We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field can be jointly computed on encrypted data using an additively homomorphic encryption scheme. Our protocol is secure against malicious adversaries. To motivate and illustrate applications of this technique, we demonstrate an attack on a class of known protocols showing how to compromise location privacy of honest users by manipulating messages in protocols with additively homomorphic encryption. We demonstrate how to apply the technique in order to solve different problems in geometric applications. We evaluate our approach using a prototypical implementation. The results show that the added overhead of our approach is small compared to insecure outsourced multiplication. © 2018-IOS Press and the authors. All rights reserved."
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.relation.ispartofJournal of Computer Security, ISSN:0926227X, Vol.26, No.4 (2018); pp. 557-587
dc.relation.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85050381101&doi=10.3233%2fJCS-171085&partnerID=40&md5=afd823371f931904181effa25de53889
dc.sourceinstname:Universidad del Rosario
dc.sourcereponame:Repositorio Institucional EdocUR
dc.titleAssuring BetterTimes
dc.typearticle
dc.publisherIOS Press
dc.subject.keywordData privacy
dc.subject.keywordGeometric applications
dc.subject.keywordHo-momorphic encryptions
dc.subject.keywordHomomorphic Encryption Schemes
dc.subject.keywordLocation privacy
dc.subject.keywordMalicious adversaries
dc.subject.keywordPrivacy enhancing technologies
dc.subject.keywordPrototypical implementation
dc.subject.keywordSecure multi-party computation
dc.subject.keywordCryptography
dc.subject.keywordLocation privacy
dc.subject.keywordPrivacy-enhancing technologies
dc.subject.keywordSecure multi-party computation
dc.rights.accesRightsinfo:eu-repo/semantics/openAccess
dc.type.spaArtículo
dc.rights.accesoAbierto (Texto Completo)
dc.type.hasVersioninfo:eu-repo/semantics/publishedVersion
dc.identifier.doihttps://doi.org/10.3233/JCS-171085
dc.relation.citationEndPage587
dc.relation.citationIssueNo. 4
dc.relation.citationStartPage557
dc.relation.citationTitleJournal of Computer Security
dc.relation.citationVolumeVol. 26


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record