Abstract. With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that allows the data analyzer to compute global statistics over the set of individual inputs that are protected by some confidentiality mechanism. Joye et al. [7] recently suggested a solution that allows a centralized party to compute the sum of encrypted inputs collected through a smart metering network. The main shortcomings of this solution are its reliance on a trusted dealer for key distribution and the need for frequent key updates. In this paper we introduce a secure protocol for aggregation of time-series data that is based on the ...
Abstract—The proliferation and ever-increasing capabilities of mobile devices such as smart phones g...
We propose a privacy-preserving aggregation scheme under a malicious attacks model, in which the agg...
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These d...
Abstract. Suppose that a set of multiple users uploads in every time period encrypted values of some...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
We consider how an untrusted data aggregator can learn desired statistics over multiple participants...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
The conference paper can be viewed at: http://www.isoc.org/isoc/conferences/ndss/11/proceedings.shtm...
Abstract—Privacy-preserving protocols allow an untrusted aggregator to evaluate certain statistics o...
The widespread deployment of Automatic Metering Infrastructures in Smart Grid scenarios rises great ...
We consider the problem of providing integrity of aggregate result in the presence of an untrusted d...
The widespread deployment of Automatic Metering Infrastructures in Smart Grid scenarios rises great ...
Secure data aggregation has been widely studied in the area of smart grid. Many existing schemes hav...
International audienceAggregator-oblivious encryption is a useful notion put forward by Shi et al. i...
Abstract—The proliferation and ever-increasing capabilities of mobile devices such as smart phones g...
We propose a privacy-preserving aggregation scheme under a malicious attacks model, in which the agg...
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These d...
Abstract. Suppose that a set of multiple users uploads in every time period encrypted values of some...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
We consider how an untrusted data aggregator can learn desired statistics over multiple participants...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
The conference paper can be viewed at: http://www.isoc.org/isoc/conferences/ndss/11/proceedings.shtm...
Abstract—Privacy-preserving protocols allow an untrusted aggregator to evaluate certain statistics o...
The widespread deployment of Automatic Metering Infrastructures in Smart Grid scenarios rises great ...
We consider the problem of providing integrity of aggregate result in the presence of an untrusted d...
The widespread deployment of Automatic Metering Infrastructures in Smart Grid scenarios rises great ...
Secure data aggregation has been widely studied in the area of smart grid. Many existing schemes hav...
International audienceAggregator-oblivious encryption is a useful notion put forward by Shi et al. i...
Abstract—The proliferation and ever-increasing capabilities of mobile devices such as smart phones g...
We propose a privacy-preserving aggregation scheme under a malicious attacks model, in which the agg...
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These d...