Peeter Laud
YOU?
Author Swipe
View article: Zero-Knowledge Proof-of-Location Protocols for Vehicle Subsidies and Taxation Compliance
Zero-Knowledge Proof-of-Location Protocols for Vehicle Subsidies and Taxation Compliance Open
This paper introduces a new set of privacy-preserving mechanisms for verifying compliance with location-based policies for vehicle taxation, or for (electric) vehicle (EV) subsidies, using Zero-Knowledge Proofs (ZKPs). We present the desig…
View article: Security Proof of Single-Source Shortest Distance Protocols Built on Secure Multiparty Computation Protocols
Security Proof of Single-Source Shortest Distance Protocols Built on Secure Multiparty Computation Protocols Open
Secure secret-sharing Single-Source Shortest Distance (SSSD) protocols, based on secure multiparty computation (SMC), offer a promising solution for securely distributing and managing sensitive information among multiple parties. However, …
View article: Privacy-preserving server-supported decryption
Privacy-preserving server-supported decryption Open
In this paper, we consider encryption systems with two-out-of-two threshold decryption, where one of the parties (the client) initiates the decryption and the other one (the server) assists. Existing threshold decryption schemes disclose t…
View article: Security Proof of SSSD Protocols Built on Top of SMC Protocol
Security Proof of SSSD Protocols Built on Top of SMC Protocol Open
Secure Secret Sharing Single-Source Shortest Distance (SSSD) protocols, built on the Secure Multi-Party Computation (SMC) foundation, have emerged as a promising solution to address the secure distribution and management of sensitive secre…
View article: TOPCOAT: towards practical two-party Crystals-Dilithium
TOPCOAT: towards practical two-party Crystals-Dilithium Open
The development of threshold protocols based on lattice-signature schemes has been of increasing interest in the past several years. The main research focus has been towards protocols constructed for various variants of Crystals-Dilithium,…
View article: TOPCOAT: Towards Practical Two-Party Crystals-Dilithium
TOPCOAT: Towards Practical Two-Party Crystals-Dilithium Open
The development of threshold protocols based on lattice-signature schemes has been of increasing interest in the past several years. The main research focus was towards protocols constructed for various variants of Crystals-Dilithium, futu…
View article: A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra Problem
A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra Problem Open
In this paper, we present a secure multiparty computation (SMC) protocol for single-source shortest distances (SSSD) in undirected graphs, where the location of edges is public, but their length is private. The protocol works in the Arithm…
View article: ZK-SecreC: a Domain-Specific Language for Zero Knowledge Proofs
ZK-SecreC: a Domain-Specific Language for Zero Knowledge Proofs Open
We present ZK-SecreC, a domain-specific language for zero-knowledge proofs. We present the rationale for its design, its syntax and semantics, and demonstrate its usefulness on the basis of a number of non-trivial examples. The design feat…
View article: Parallel Privacy-Preserving Shortest Path Algorithms
Parallel Privacy-Preserving Shortest Path Algorithms Open
In this paper, we propose and present secure multiparty computation (SMC) protocols for single-source shortest distance (SSSD) and all-pairs shortest distance (APSD) in sparse and dense graphs. Our protocols follow the structure of classic…
View article: Content Confidentiality in Named Data Networking
Content Confidentiality in Named Data Networking Open
In this paper we present the design of name based access control scheme which facilitates data confidentiality by applying end-to-end encryption to data published on NDN with flexible fine-grained access control, which allows to define an …
View article: Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy
Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy Open
This paper describes the collaborative effort between privacy and security researchers at nine different institutions along with researchers at the Naval Information Warfare Center to deploy, test, and demonstrate privacy-preserving techno…
View article: A Framework of Metrics for Differential Privacy from Local Sensitivity
A Framework of Metrics for Differential Privacy from Local Sensitivity Open
The meaning of differential privacy (DP) is tightly bound with the notion of distance on databases, typically defined as the number of changed rows. Considering the semantics of data, this metric may be not the most suitable one, particula…
View article: Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes
Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes Open
There are numerous methods of achieving $ε$-differential privacy (DP). The question is what is the appropriate value of $ε$, since there is no common agreement on a "sufficiently small" $ε$, and its goodness depends on the query as well as…
View article: Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing
Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing Open
The aim of Elliptic Curve Cryptosystems (ECC) is to achieve the same security level as RSA but with shorter key size. The basic operation in the ECC is scalar multiplication which is an expensive operation. In this paper, we focus on optim…
View article: Business Process Privacy Analysis in Pleak
Business Process Privacy Analysis in Pleak Open
Pleak is a tool to capture and analyze privacy-enhanced business process models to characterize and quantify to what extent the outputs of a process leak information about its inputs. Pleak incorporates an extensible set of analysis plugin…
View article: Achieving Differential Privacy using Methods from Calculus
Achieving Differential Privacy using Methods from Calculus Open
We introduce derivative sensitivity, an analogue to local sensitivity for continuous functions. We use this notion in an analysis that determines the amount of noise to be added to the result of a database query in order to obtain a certai…
View article: Disclosure Analysis of SQL Workflows
Disclosure Analysis of SQL Workflows Open
In the context of business process management, the implementation of data minimization requirements requires that analysts are able to assert what private data each worker is able to access, not only directly via the inputs of the tasks th…
View article: Privacy-preserving record linkage in large databases using secure multiparty computation
Privacy-preserving record linkage in large databases using secure multiparty computation Open
The solution is ready for practical use. It has well-defined security properties, implied by the properties of Sharemind platform. The solution assumes that exact matching of records is required, and a possible future research would be ext…
View article: Preprocessing Based Verification of Multiparty Protocols with Honest Majority
Preprocessing Based Verification of Multiparty Protocols with Honest Majority Open
This paper presents a generic “GMW-style” method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification phases. Our construction pe…