In 2009, Craig Gentry introduced the first "fully" homomorphic encryption scheme allowing arbitrary circuits to be evaluated on encrypted data [17]. Homomorphic encryption is a very powerful cryptographic pr...
详细信息
ISBN:
(纸本)9781450356930
In 2009, Craig Gentry introduced the first "fully" homomorphic encryption scheme allowing arbitrary circuits to be evaluated on encrypted data [17]. Homomorphic encryption is a very powerful cryptographic primitive, though it has often been viewed by practitioners as too inefficient for practical applications. However, the performance of these encryption schemes has come a long way from that of Gentry's original work: there are now several well-maintained libraries implementing homomorphic encryption schemes and protocols demonstrating impressive performance results, alongside an ongoing standardization effort by the community. In this tutorial we survey the existing homomorphic encryption landscape, providing both a general overview of the state of the art, as well as a deeper dive into several of the existing libraries. We aim to provide a thorough introduction to homomorphic encryption accessible by the broader computer security community. Several of the presenters are core developers of well-known publicly available homomorphic encryption libraries, and organizers of the homomorphic encryption standardization effort *** [2]. This tutorial is targeted at application developers, security researchers, privacy engineers, graduate students, and anyone else interested in learning the basics of modern homomorphic encryption. The tutorial is divided into two parts: Part I is accessible by everyone comfortable with basic college-level math;Part II will cover more advanced topics, including descriptions of some of the different homomorphic encryption schemes and libraries, concrete example applications and code samples, and a deeper discussion on implementation challenges. Part II requires the audience to be familiar with modern C++.
The proceedings contain 129 papers. The topics discussed include: influence factors on the quality of user experience in OS reliability: a qualitative experimental study;finally Johnny can encrypt. but does this make ...
ISBN:
(纸本)9781450364485
The proceedings contain 129 papers. The topics discussed include: influence factors on the quality of user experience in OS reliability: a qualitative experimental study;finally Johnny can encrypt. but does this make him feel more secure?;an efficient cryptography-based access control using inner-product proxy re-encryption scheme;non-interactive key exchange from identity-based encryption;the other side of the coin: a framework for detecting and analyzing web-based cryptocurrency mining campaigns;a pyramidal-based model to compute the impact of cyber security events;together: towards automatic investigation of Android malware cyber-infrastructures;attack graph-based assessment of exploitability risks in automotive on-board networks;comparison of data flow error detection techniques in embedded systems: an empirical study;distributed and cooperative firewall/controller in cloud environments;an investigation of a deep learning based malware detection system;towards the automatic generation of low-interaction web application HoneyPots;assessing internet-wide cyber situational awareness of critical sectors;spreading alerts quietly: new insights from theory and practice;what are security patterns? a formal model for security and design of software;and a NLP-based solution to prevent from privacy leaks in social network posts.
Much of the research that our community publishes is based on data. However, an open question remains: are the results of data science trustworthy, and how can we increase our trust in data science? Accomplishing this...
详细信息
ISBN:
(纸本)9781450345231
Much of the research that our community publishes is based on data. However, an open question remains: are the results of data science trustworthy, and how can we increase our trust in data science? Accomplishing this goal is difficult, as we must trust the inputs, systems, and results of data science. This panel will discuss the current state of trustworthy data science, and explore possible technical, legal, and cultural solutions that can increase our trust in the input, systems, and results of data science.
Life Cycle Assessment(LCA) is crucial for evaluating the ecological sustainability of a product or service, and the accurate evaluation of sustainability requires detailed and transparent information about industrial ...
详细信息
ISBN:
(纸本)9781450345231
Life Cycle Assessment(LCA) is crucial for evaluating the ecological sustainability of a product or service, and the accurate evaluation of sustainability requires detailed and transparent information about industrial activities. However, such information is usually considered confidential and withheld from the public. In this paper, we present a study of privacy in the context of LCA. The main goal is to explore the privacy challenges in sustainability assessment considering the protection of trade secrets while increasing transparency of industrial activities. To overcome privacy concerns, we apply differential privacy to LCA computations considering the idiosyncratic features of LCA data. Our assessments on a specific real-life example show that it is possible to achieve privacy-preserving LCA computations without losing the utility of data completely.
暂无评论