Privacy Protected Spatial Query Processing
|
|
- Samuel Bryan
- 5 years ago
- Views:
Transcription
1 Privacy Protected Spatial Query Processing Slide 1 Topics Introduction Cloaking-based Solution Transformation-based Solution Private Information Retrieval-based Solution Slide 2 1
2 Motivation The proliferation of mobile devices Smartphones, laptops, tablets, etc. The popularity of positioning technologies GPS, Galileo, etc. Privacy threat from accessing Location-Based Services e.g., Find me the closest ATM (bank). How to protect mobile users location privacy? Slide 3 Presentation Outline Introduction Cloaking-based Solution Transformation-based Solution Private Information Retrieval-based Solution Slide 4 2
3 System Architecture Slide 5 System Architecture (Cont.) Access Points Tablets, cell phones, laptops, etc. Location-based Service Providers e.g., Find my nearest gas station - users have to reveal their identity. Location Cloaker A trusted server which implements K-Anonymity mechanisms and manages the location information of users. User privacy policy K-anonymous and the minimum cloaked region size. Need new query processing algorithms. Slide 6 3
4 K-Anonymity The mechanism blurs the identities of K users [Swe02]. One trusted server (i.e., the location cloaker) is needed to cloak K users locations for protecting location privacy. Slide 7 The Data Structure for Managing Mobile User locations Slide 8 4
5 Algorithm for Nearest Neighbor Queries Slide 9 Algorithm for Nearest Neighbor Queries (Cont.) Slide 10 5
6 Solution for Road Networks Slide 11 Solution for Road Networks (Cont.) Slide 12 6
7 Solution for Road Networks (Cont.) Slide 13 Privacy Protected Nearest Neighbor Query (k = 1) Slide 14 7
8 Privacy Protected Range Query Slide 15 Topics Introduction Cloaking-based Solution Transformation-based Solution Private Information Retrieval-based Solution Slide 16 8
9 Preliminary We observed that one-way function can be an ideal mechanism to preserve users privacy. A one-way function is easy to compute but difficult to invert, meaning that some algorithms can compute the function in polynomial time while no probabilistic polynomial-time algorithm can compute an inverse image of the function with better than negligible probability. Slide 17 Preliminary (Cont.) The applied transformation function has to allow fast computation of its preimage with special information, called trapdoor. In mathematical terms, if f is a trapdoor function there exists some secret information y, such that given f(x) and y it is easy to compute x. Multiplication of two large prime numbers. Slide 18 9
10 Space Encryption A space-filling curve is a continuous curve, which passes through every point of a closed space. The important property of these curves is that they retain the proximity and neighboring aspects of the indexed data. The paper investigates the applicability of space-filling curves as ciphers for preserving location privacy of mobile users. Slide 19 Space Encryption (Cont.) A user applies space-filling curves to encrypt the locations of spatial objects in a 2-D space before sending requests to service providers. Since the user knows the curve parameters (i.e., the curve order and orientation), the query results returned from the service provider can be decrypted with the corresponding curve order and orientation as the trapdoor. Slide 20 10
11 Space Encryption (Cont.) Slide 21 Space Encryption (Cont.) For a two dimensional space, we define as the m th order Hilbert curve with the o th orientation. We can formalize the relationship as where x and y are the coordinates of a 2-D space point. Slide 22 11
12 Query Evaluation Range Query Slide 23 Query Evaluation - knn Slide 24 12
13 Improving query processing accuracy Slide 25 Tradeoff Modeling Slide 26 13
14 System Architecture Slide 27 System Architecture (Cont.) The number of encryption keys to be stored in a client? The relationship between encryption key number and location privacy. Encryption key updating frequency. Slide 28 14
15 Topics Introduction Cloaking-based Solution Transformation-based Solution Private Information Retrieval-based Solution Slide 29 Private Information Retrieval (PIR) A user needs to gain access to a specific record of a database but does not want to reveal the record in which s/he is interested. A PIR protocol allows a user to retrieve the i th record from a database of size n stored at an untrusted server, without revealing i to the server. Theoretical PIR and practical PIR. Slide 30 15
16 Theoretical PIR The client and server follow a secure twoparty computation which allows the client to privately retrieve the i th bit from a bit string of size n owned by the server. Slide 31 Practical PIR Slide 32 16
17 Practical PIR (Cont.) Slide 33 17
Overview of Cryptography
18739A: Foundations of Security and Privacy Overview of Cryptography Anupam Datta CMU Fall 2007-08 Is Cryptography A tremendous tool The basis for many security mechanisms Is not The solution to all security
More informationSolutions. Location-Based Services (LBS) Problem Statement. PIR Overview. Spatial K-Anonymity
2 Location-Based Services (LBS) Private Queries in Location-Based Services: Anonymizers are Not Necessary Gabriel Ghinita Panos Kalnis Ali Khoshgozaran 2 Cyrus Shahabi 2 Kian Lee Tan LBS users Mobile devices
More informationIntroduction to Secure Multi-Party Computation
Introduction to Secure Multi-Party Computation Many thanks to Vitaly Shmatikov of the University of Texas, Austin for providing these slides. slide 1 Motivation General framework for describing computation
More informationIntroduction to Secure Multi-Party Computation
CS 380S Introduction to Secure Multi-Party Computation Vitaly Shmatikov slide 1 Motivation General framework for describing computation between parties who do not trust each other Example: elections N
More informationFoundations of Cryptography CS Shweta Agrawal
Foundations of Cryptography CS 6111 Shweta Agrawal Course Information 4-5 homeworks (20% total) A midsem (25%) A major (35%) A project (20%) Attendance required as per institute policy Challenge questions
More informationOblivious Transfer(OT)
Oblivious Transfer(OT) Abhishek Gunda, 14807257 Bhargav Reddy, 14468 Sai Harsha Nalluru, 14408 Prof. Shashank Singh, IIT Kanpur April 4, 2018 April 4, 2018 1 / 20 Overview What is Oblivious Transfer Variants
More informationSecure Multiparty Computation
CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationPrivate Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services Ali Khoshgozaran and Cyrus Shahabi University of Southern California Department of Computer Science Information
More informationPublic Key Cryptography and RSA
Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange
More informationCS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong
CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationPost-Quantum Cryptography A Collective Challenge
Post-Quantum Cryptography A Collective Challenge Christophe Petit University of Oxford Mathematical Institute Christophe Petit -Oxford Crypto Day 1 Cryptography is very useful Cryptography is the science
More informationAn Overview of Secure Multiparty Computation
An Overview of Secure Multiparty Computation T. E. Bjørstad The Selmer Center Department of Informatics University of Bergen Norway Prøveforelesning for PhD-graden 2010-02-11 Outline Background 1 Background
More informationPrivacy Preserving Location Based Services R.Bala Krishnan 1, N.Hari Prasad 2, U.Gokul 3, P.Subashini 4 1, 2, 3, 4
DOI 10.4010/2016.635 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 3 Privacy Preserving Location Based Services R.Bala Krishnan 1, N.Hari Prasad 2, U.Gokul 3, P.Subashini 4 1, 2, 3, 4 UG
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationIntroduction to Cryptography Lecture 7
Introduction to Cryptography Lecture 7 Public-Key Encryption: El-Gamal, RSA Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing
More informationPrivacy preservation in the dissemination of location data
Privacy preservation in the dissemination of location data Manolis Terrovitis Institute for the Management of Information Systems (IMIS) Research Center thena thens, Greece mter@imis.athena-innovation.gr
More informationPrivacy Preserving Location Based Messaging Service
Privacy Preserving Location Based Messaging Service 1 Sangeetha U, 2 Sanjay Kamar C K 1 M. Tech Final Year Student, 2 Asst. Professor, 1 Computer Network Engineering, 2 PG Studies In CE & A NIE Mysuru,
More informationOther Topics in Cryptography. Truong Tuan Anh
Other Topics in Cryptography Truong Tuan Anh 2 Outline Public-key cryptosystem Cryptographic hash functions Signature schemes Public-Key Cryptography Truong Tuan Anh CSE-HCMUT 4 Outline Public-key cryptosystem
More informationApproaches to distributed privacy protecting data mining
Approaches to distributed privacy protecting data mining Bartosz Przydatek CMU Approaches to distributed privacy protecting data mining p.1/11 Introduction Data Mining and Privacy Protection conflicting
More informationThe New Casper: Query Processing for Location Services without Compromising Privacy
The New Casper: Query Processing for Location Services without Compromising Privacy Mohamed F.Mokbel 2 Chi-Yin Chow Walid G. Aref D ep art ment of Comp u t er S cien ce an d En gin eerin g, U n iversity
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationDISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, 2014 Page No. 5594-5599 DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING
More informationIntro to Public Key Cryptography Diffie & Hellman Key Exchange
Intro to Public Key Cryptography Diffie & Hellman Key Exchange Course Summary Introduction Stream & Block Ciphers Block Ciphers Modes (ECB,CBC,OFB) Advanced Encryption Standard (AES) Message Authentication
More informationTAPAS: Trustworthy privacy-aware participatory sensing
Knowl Inf Syst DOI 10.1007/s10115-012-0573-y REGULAR PAPER TAPAS: Trustworthy privacy-aware participatory sensing Leyla Kazemi Cyrus Shahabi Received: 24 January 2012 / Revised: 1 September 2012 / Accepted:
More informationSecure Conjunctive Keyword Ranked Search over Encrypted Cloud Data
Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Shruthishree M. K, Prasanna Kumar R.S Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared
More informationIndrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin
Airavat: Security and Privacy for MapReduce Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin Computing in the year 201X 2 Data Illusion of
More informationSecure Multi-party Computation
Secure Multi-party Computation What it is, and why you d care Manoj Prabhakaran University of Illinois, Urbana-Champaign SMC SMC SMC conceived more than 30 years back SMC SMC conceived more than 30 years
More informationEfficient Oblivious Computation Techniques for Privacy-Preserving Mobile Applications
Efficient Oblivious Computation Techniques for Privacy-Preserving Mobile Applications Henry Carter, Chaitrali Amrutkar, Italo Dacosta, and Patrick Traynor Converging Infrastructure Security (CISEC) Laboratory
More informationarxiv: v2 [cs.db] 6 Nov 2010
Noname manuscript No. (will be inserted by the editor) Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies Sergio Mascetti Dario Freni Claudio Bettini
More informationSpatial Cloaking algorithm for location privacy preservation.
International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 619 Spatial Cloaking algorithm for location privacy preservation. Suchita R. Shastry, Dr. A. B. Bagwan, Department
More informationEncryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message
More information19.1. Security must consider external environment of the system, and protect it from:
Module 19: Security The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT 19.1 The Security Problem Security must consider external
More informationA Location Based Queries for Securing Content and Assuring Privacy
A Location Based Queries for Securing Content and Assuring Privacy R.Tejaswi M.Tech Student Department of CSE B V Raju Institute of Technology Narsapur, India. ABSTRACT In today s modern world, it is very
More informationLecture 18 - Chosen Ciphertext Security
Lecture 18 - Chosen Ciphertext Security Boaz Barak November 21, 2005 Public key encryption We now go back to public key encryption. As we saw in the case of private key encryption, CPA security is not
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from
More informationSecure digital certificates with a blockchain protocol
Secure digital certificates with a blockchain protocol Federico Pintore 1 Trento, 10 th February 2017 1 University of Trento Federico Pintore Blockchain and innovative applications Trento, 10 th February
More informationSecure Multiparty Computation
Secure Multiparty Computation Li Xiong CS573 Data Privacy and Security Outline Secure multiparty computation Problem and security definitions Basic cryptographic tools and general constructions Yao s Millionnare
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor(SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 2,Issue 6, June -2015 e-issn(o): 2348-4470 p-issn(p): 2348-6406 THIRD PARTY
More informationLecture IV : Cryptography, Fundamentals
Lecture IV : Cryptography, Fundamentals Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University Spring 2012 Basic Principles
More informationPrivacy and Accountability for Location-based Aggregate Statistics
Privacy and Accountability for Location-based Aggregate Statistics Raluca Ada Popa MIT ralucap@mit.edu Andrew J. Blumberg University of Texas, Austin blumberg@math.utexas.edu Frank H. Li MIT frankli@mit.edu
More informationIntroduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption
Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that
More informationCOMP4109 : Applied Cryptography
COMP4109 : Applied Cryptography Fall 2013 M. Jason Hinek Carleton University Applied Cryptography Day 2 information security cryptographic primitives unkeyed primitives NSA... one-way functions hash functions
More informationEfficient Private Information Retrieval
Efficient Private Information Retrieval K O N S T A N T I N O S F. N I K O L O P O U L O S T H E G R A D U A T E C E N T E R, C I T Y U N I V E R S I T Y O F N E W Y O R K K N I K O L O P O U L O S @ G
More informationPreserving Location Privacy in Geo-Social Applications
IEEE TRANSACTIONS ON MOBILE COMPUTING VOL:3 NO: YEAR 204 Preserving Location Privacy in Geo-Social Applications Krishna P. N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Amr El Abbadi,
More informationICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification
ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another
More informationExploring Techniques for Providing Privacy in Location-Based Services Nearest Neighbor Query
University of Central Florida Electronic Theses and Dissertations Doctoral Dissertation (Open Access) Exploring Techniques for Providing Privacy in Location-Based Services Nearest Neighbor Query 2015 John-Charles
More informationPrivacy in geo-social networks: proximity notification with untrusted service providers and curious buddies
VLDBJ manuscript No. (will be inserted by the editor) Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies Sergio Mascetti Dario Freni Claudio Bettini
More informationDesign and Implementation of Privacy-Preserving Surveillance. Aaron Segal
1 Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016 Advisor: Joan Feigenbaum 2 Overview Introduction Surveillance and Privacy Privacy Principles for
More informationSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking Abinayaa.J 1, Abinaya.K 2,Abinaya.R 3, Abinaya.N 4 1234 Student, Department of Information Technology, Dr. Mahalingam College of Engineering and Technology,
More informationQuery Processing In Location-based Services
University of Central Florida Electronic Theses and Dissertations Doctoral Dissertation (Open Access) Query Processing In Location-based Services 2010 Fuyu Liu University of Central Florida Find similar
More informationPrivacy Preserving Collaborative Filtering
Privacy Preserving Collaborative Filtering Emily Mu, Christopher Shao, Vivek Miglani May 2017 1 Abstract As machine learning and data mining techniques continue to grow in popularity, it has become ever
More informationLecture 10, Zero Knowledge Proofs, Secure Computation
CS 4501-6501 Topics in Cryptography 30 Mar 2018 Lecture 10, Zero Knowledge Proofs, Secure Computation Lecturer: Mahmoody Scribe: Bella Vice-Van Heyde, Derrick Blakely, Bobby Andris 1 Introduction Last
More informationSeparation Shielding and Content Supporting Locus Positioned Problems
Separation Shielding and Content Supporting Locus Positioned Problems Urlam Sridhar Assistant Professor, Department of CSE, Sri Venkateswara College of Engineering and Technology. ABSTRACT: In this paper
More informationSecure Multiparty Computation: Introduction. Ran Cohen (Tel Aviv University)
Secure Multiparty Computation: Introduction Ran Cohen (Tel Aviv University) Scenario 1: Private Dating Alice and Bob meet at a pub If both of them want to date together they will find out If Alice doesn
More informationRSA. Public Key CryptoSystem
RSA Public Key CryptoSystem DIFFIE AND HELLMAN (76) NEW DIRECTIONS IN CRYPTOGRAPHY Split the Bob s secret key K to two parts: K E, to be used for encrypting messages to Bob. K D, to be used for decrypting
More information0x1A Great Papers in Computer Security
CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ C. Dwork Differential Privacy (ICALP 2006 and many other papers) Basic Setting DB= x 1 x
More informationUsable PIR. Network Security and Applied. Cryptography Laboratory.
Network Security and Applied Cryptography Laboratory http://crypto.cs.stonybrook.edu Usable PIR NDSS '08, San Diego, CA Peter Williams petertw@cs.stonybrook.edu Radu Sion sion@cs.stonybrook.edu ver. 2.1
More informationASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1
ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD 1 Recommended Book Steven Levy. Crypto. Penguin books. 2001. A non-technical account of the history of public-key cryptography and the colorful characters
More informationLecture 8: Privacy and Anonymity Using Anonymizing Networks. CS 336/536: Computer Network Security Fall Nitesh Saxena
Lecture 8: Privacy and Anonymity Using Anonymizing Networks CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus Jacobson Course Admin HW/Lab 3
More informationSPi Calculus: Outline. What is it? Basic SPi Calculus Notation Basic Example Example with Channel Establishment Example using Cryptography
SPi Calculus: Outline What is it? Basic SPi Calculus Notation Basic Example Example with Channel Establishment Example using Cryptography SPi Calculus: What is it? SPi Calculus is an executable model for
More informationCrypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))
Introduction (Mihir Bellare Text/Notes: http://cseweb.ucsd.edu/users/mihir/cse207/) Cryptography provides: Data Privacy Data Integrity and Authenticity Crypto-systems all around us ATM machines Remote
More informationInformation Retrieval. (M&S Ch 15)
Information Retrieval (M&S Ch 15) 1 Retrieval Models A retrieval model specifies the details of: Document representation Query representation Retrieval function Determines a notion of relevance. Notion
More information1 A Tale of Two Lovers
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Dec. 12, 2006 Lecture Notes 19 (expanded): Secure Two-Party Computation Recommended Reading. Goldreich Volume II 7.2.2, 7.3.2, 7.3.3.
More informationSecure Multi-Party Computation of Probabilistic Threat Propagation
Secure Multi-Party Computation of Probabilistic Threat Propagation Emily Shen Nabil Schear, Ellen Vitercik, Arkady Yerukhimovich Graph Exploitation Symposium 216 DISTRIBUTION STATEMENT A. Approved for
More informationRandom Oracles - OAEP
Random Oracles - OAEP Anatoliy Gliberman, Dmitry Zontov, Patrick Nordahl September 23, 2004 Reading Overview There are two papers presented this week. The first paper, Random Oracles are Practical: A Paradigm
More informationCryptography Today. Ali El Kaafarani. Mathematical Institute Oxford University. 1 of 44
Cryptography Today Ali El Kaafarani Mathematical Institute Oxford University 1 of 44 About the Course Regular classes with worksheets so you can work with some concrete examples (every Friday at 1pm).
More informationCryptography: More Primitives
Design and Analysis of Algorithms May 8, 2015 Massachusetts Institute of Technology 6.046J/18.410J Profs. Erik Demaine, Srini Devadas and Nancy Lynch Recitation 11 Cryptography: More Primitives 1 Digital
More informationPublic Key Cryptography
graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,
More informationPrivacy Preserving Location-Based Service Protocol
Privacy Preserving Location-Based Service Protocol George Antony Jasmine. D Vel Tech Multi tech Dr.R.R,Dr.S.R Engineering College, Avadi, Chennai, India S.Vinod Vel Tech Multi tech Dr.R.R,Dr.S.R Engineering
More informationImplementation of 5PM(5ecure Pattern Matching) on Android Platform
Implementation of 5PM(5ecure Pattern Matching) on Android Platform Overview - Main Objective: Search for a pattern on the server securely The answer at the end -> either YES it is found or NO it is not
More informationPrivacy Preservation Approach Using Grid Base Techniques for Mobile Users
Privacy Preservation Approach Using Grid Base Techniques for Mobile Users Trupti Takale, Prof. Archana Jadhav Department of Computer Engineering, Alard College of Engineering and Management, Pune, India
More informationAttribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationRelaxing IND-CCA: Indistinguishability Against Chosen. Chosen Ciphertext Verification Attack
Relaxing IND-CCA: Indistinguishability Against Chosen Ciphertext Verification Attack Indian Statistical Institute Kolkata January 14, 2012 Outline 1 Definitions Encryption Scheme IND-CPA IND-CCA IND-CCVA
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.5 Public Key Algorithms CSC 474/574 Dr. Peng Ning 1 Public Key Algorithms Public key algorithms covered in this class RSA: encryption and digital signature
More informationPseudorandomness and Cryptographic Applications
Pseudorandomness and Cryptographic Applications Michael Luby PRINCETON UNIVERSITY PRESS PRINCETON, NEW JERSEY Overview and Usage Guide Mini-Courses Acknowledgments ix xiii xv Preliminaries 3 Introduction
More informationVolume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /
More informationCSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationKey Protection for Endpoint, Cloud and Data Center
Key Protection for Endpoint, Cloud and Data Center ENCRYPTION IS ONLY AS SECURE AS ITS LEAST SECURE KEY Encryption is undoubtedly one of the pillars of information security. It is used everywhere today:
More informationPublishing CitiSense Data: Privacy Concerns and Remedies
Publishing CitiSense Data: Privacy Concerns and Remedies Kapil Gupta Advisor : Prof. Bill Griswold 1 Location Based Services Great utility of location based services data traffic control, mobility management,
More informationLecture 3 Algorithms with numbers (cont.)
Advanced Algorithms Floriano Zini Free University of Bozen-Bolzano Faculty of Computer Science Academic Year 2013-2014 Lecture 3 Algorithms with numbers (cont.) 1 Modular arithmetic For cryptography it
More informationASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1
ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD 1 Recommended Book Steven Levy. Crypto. Penguin books. 2001. A non-technical account of the history of public-key cryptography and the colorful characters
More informationCloaking Locations for Anonymous Location Based Services: A Hybrid Approach
Cloaking Locations for Anonymous Location Based Services: A Hybrid Approach Chengyang Zhang and Yan Huang Computer Science and Engineering Department University of North Texas Abstract. An important privacy
More informationIntroduction to Cryptography and Security Mechanisms. Abdul Hameed
Introduction to Cryptography and Security Mechanisms Abdul Hameed http://informationtechnology.pk Before we start 3 Quiz 1 From a security perspective, rather than an efficiency perspective, which of the
More informationShiftRoute: Achieving Location Privacy for Map Services on Smartphones
ShiftRoute: Achieving Location Privacy for Map Services on Smartphones Peng Zhang, Member, IEEE, Chengchen Hu, Member, IEEE, Di Chen, Hao Li, Member, IEEE, and Qi Li, Senior Member, IEEE Abstract Map services,
More informationOutline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationSHE AND FHE. Hammad Mushtaq ENEE759L March 10, 2014
SHE AND FHE Hammad Mushtaq ENEE759L March 10, 2014 Outline Introduction Needs Analogy Somewhat Homomorphic Encryption (SHE) RSA, EL GAMAL (MULT) Pallier (XOR and ADD) Fully Homomorphic Encryption (FHE)
More informationSharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode
Int. J. Nonlinear Anal. Appl. 5 (2014) No. 2, 60-66 ISSN: 2008-6822 (electronic) http://www.ijnaa.semnan.ac.ir Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode
More informationHiding in the Cloud: The Perils and Promise of Searchable Encryption
Hiding in the Cloud: The Perils and Promise of Searchable Encryption Jason Perry Lewis University In collaboration with: David Cash Rutgers University Paul Grubbs Cornell University Tom Ristenpart Cornell
More informationPrivacy in geo-social networks: proximity notification with untrusted service providers and curious buddies
The VLDB Journal (2011) 20:541 566 DOI 10.1007/s00778-010-0213-7 REGULAR PAPER Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies Sergio Mascetti
More informationSymmetric Encryption. Thierry Sans
Symmetric Encryption Thierry Sans Design principles (reminder) 1. Kerkoff Principle The security of a cryptosystem must not rely on keeping the algorithm secret 2. Diffusion Mixing-up symbols 3. Confusion
More informationHomework 1 CS161 Computer Security, Spring 2008 Assigned 2/4/08 Due 2/13/08
Homework 1 CS161 Computer Security, Spring 2008 Assigned 2/4/08 Due 2/13/08 This homework assignment is due Wednesday, February 13 at the beginning of lecture. Please bring a hard copy to class; either
More informationCPSC 467b: Cryptography and Computer Security
Outline ZKIP Other IP CPSC 467b: Cryptography and Computer Security Lecture 19 Michael J. Fischer Department of Computer Science Yale University March 31, 2010 Michael J. Fischer CPSC 467b, Lecture 19
More informationPublic Key Algorithms
CSE597B: Special Topics in Network and Systems Security Public Key Cryptography Instructor: Sencun Zhu The Pennsylvania State University Public Key Algorithms Public key algorithms RSA: encryption and
More informationParallel Coin-Tossing and Constant-Round Secure Two-Party Computation
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Yehuda Lindell Department of Computer Science and Applied Math, Weizmann Institute of Science, Rehovot, Israel. lindell@wisdom.weizmann.ac.il
More informationPassBio: Privacy-Preserving User-Centric Biometric Authentication
1 PassBio: Privacy-Preserving User-Centric Biometric Authentication Kai Zhou and Jian Ren arxiv:1711.04902v1 [cs.cr] 14 Nov 2017 Abstract The proliferation of online biometric authentication has necessitated
More informationOutline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)
Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key
More informationSecure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining
CS573 Data Privacy and Security Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining Li Xiong Slides credit: Chris Clifton, Purdue University; Murat Kantarcioglu, UT
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationAnnouncements. Image Matching! Source & Destination Images. Image Transformation 2/ 3/ 16. Compare a big image to a small image
2/3/ Announcements PA is due in week Image atching! Leave time to learn OpenCV Think of & implement something creative CS 50 Lecture #5 February 3 rd, 20 2/ 3/ 2 Compare a big image to a small image So
More information