Secure Multi-Party Computation is a domain of Cryptography that enables several participants to compute a public function of their own private inputs, while preserving the secrecy of the inputs and without resorting to any trusted third party. Elaborate protocols have been designed in order to help participants to collaborate in order to compute functions in such a way. These protocols ensure that no information about the private inputs is ever revealed, apart from that which flows from the public and intended output of the computation. Intriguingly, the output of a computation, as a function of the inputs, inevitably leaks some information about the private inputs. The main objectives of this thesis are to further investigate this inevitab...
Rapid development in computing technology and the Internet has given rise to new challenges in large...
International audienceDifferential privacy aims at protecting the privacy of participants instatisti...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
The purpose of Secure Multi-Party Computation is to enable protocol participants to compute a public...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Secure multiparty computation enables protocol participants to compute the output of a public functi...
International audienceSecure information flow is the problem of ensuring that the information made p...
Algorithmic stability is a measure of how much the output of an algorithm changes in response to sma...
We consider interactive computation of randomized functions between two users with the following pri...
Secure computation is a fundamental problem in modern cryptography in which multiple parties join to...
Privacy-preserving data release is about disclosing information about useful data while retaining th...
Each agent in a network makes a local observation that is linearly related to a set of public and pr...
Empirical thesis.Bibliography: pages 55-62.1. Introduction -- 2. Literature review -- 3. Privacy pre...
A differentially private algorithm adds randomness to its computations to ensure that its output rev...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Rapid development in computing technology and the Internet has given rise to new challenges in large...
International audienceDifferential privacy aims at protecting the privacy of participants instatisti...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
The purpose of Secure Multi-Party Computation is to enable protocol participants to compute a public...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Secure multiparty computation enables protocol participants to compute the output of a public functi...
International audienceSecure information flow is the problem of ensuring that the information made p...
Algorithmic stability is a measure of how much the output of an algorithm changes in response to sma...
We consider interactive computation of randomized functions between two users with the following pri...
Secure computation is a fundamental problem in modern cryptography in which multiple parties join to...
Privacy-preserving data release is about disclosing information about useful data while retaining th...
Each agent in a network makes a local observation that is linearly related to a set of public and pr...
Empirical thesis.Bibliography: pages 55-62.1. Introduction -- 2. Literature review -- 3. Privacy pre...
A differentially private algorithm adds randomness to its computations to ensure that its output rev...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Rapid development in computing technology and the Internet has given rise to new challenges in large...
International audienceDifferential privacy aims at protecting the privacy of participants instatisti...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...