Threshold aggregation reporting systems promise a practical, privacy preserving solution for developers to learn about how their developed applications are used "\emph{in-the-wild}". Unfortunately, proposed systems to date prove impractical for wide scale adoption, suffering from a combination of requiring: \textit{i)} prohibitive trust assumptions; \textit{ii)} high computation costs; or \textit{iii)} massive user bases. As a result, adoption of truly-private approaches has been limited to only a small number of enormous (and excessively costly) projects. This work improves the state of private data collection by proposing $\mathsf{STAR}$, a highly efficient, easily deployable system for providing cryptographically-enforced $\kappa$-anon...
Existing work on data collection and analysis for aggregation is mainly focused on confidentiality i...
Abstract—Privacy-preserving protocols allow an untrusted aggregator to evaluate certain statistics o...
In this paper, we revisit the private top-κ data aggregation problem. First we formally define ...
This paper introduces Prio+, a privacy-preserving system for the collection of aggregate statistics,...
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the h...
LNCS v. 7397 entitled: Financial cryptography and data security : 16th International Conference, FC ...
This paper introduces Prio+, a privacy-preserving system for the collection of aggregate statistics,...
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These d...
Secure Multiparty Computation (MPC) can improve the security and privacy of data owners while allowi...
Abstract. We consider applications where an untrusted aggregator would like to collect privacy sensi...
Private messaging platforms provide strong protection against platform eavesdropping, but malicious ...
The amount of personal data collected in our everyday interactions with connected devices offers gre...
We provide a practical solution to performing cross-user machine learning through aggregation on a s...
The progress in communication and hardware technology increases the computational capabilities of pe...
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwil...
Existing work on data collection and analysis for aggregation is mainly focused on confidentiality i...
Abstract—Privacy-preserving protocols allow an untrusted aggregator to evaluate certain statistics o...
In this paper, we revisit the private top-κ data aggregation problem. First we formally define ...
This paper introduces Prio+, a privacy-preserving system for the collection of aggregate statistics,...
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the h...
LNCS v. 7397 entitled: Financial cryptography and data security : 16th International Conference, FC ...
This paper introduces Prio+, a privacy-preserving system for the collection of aggregate statistics,...
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These d...
Secure Multiparty Computation (MPC) can improve the security and privacy of data owners while allowi...
Abstract. We consider applications where an untrusted aggregator would like to collect privacy sensi...
Private messaging platforms provide strong protection against platform eavesdropping, but malicious ...
The amount of personal data collected in our everyday interactions with connected devices offers gre...
We provide a practical solution to performing cross-user machine learning through aggregation on a s...
The progress in communication and hardware technology increases the computational capabilities of pe...
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwil...
Existing work on data collection and analysis for aggregation is mainly focused on confidentiality i...
Abstract—Privacy-preserving protocols allow an untrusted aggregator to evaluate certain statistics o...
In this paper, we revisit the private top-κ data aggregation problem. First we formally define ...