Nearest neighbor search is a fundamental building-block for a wide range of applications. A privacy-preserving protocol for nearest neighbor search involves a set of clients who send queries to a remote database. Each client retrieves the nearest neighbor(s) to its query in the database without revealing any information about the query. For database privacy, the client must not learn anything beyond the query answer. Existing protocols for private nearest neighbor search require heavy cryptographic tools, resulting in poor practical performance or large client overheads. In this thesis, we present the first lightweight protocol for private nearest neighbor search. Our protocol is instantiated using two non-colluding servers, each holding...
International audienceSimilarity search in high dimensional space database is split into two worlds:...
Privacy-preserving collaborative data analysis enables richer models than what each party can learn ...
The past few decades have witnessed considerable efforts for achieving a Privacy- Preserving Computi...
International audienceThis paper presents a moderately secure but very efficient approximate nearest...
Data mining is frequently obstructed by privacy concerns. In many cases, data is distributed and br...
The problem of efficiently searching into outsourced encrypted data, while providing strong privacy ...
We address the privacy concerns that raise when running a nearest neighbor (NN) search on confidenti...
The problem of efficiently searching into outsourced encrypted data, while providing strong privacy ...
Real-world applications commonly require untrusting parties to share sensitive information securely....
We study the problem of privacy-preserving approximate kNN search in an outsourced environment — the...
Increasing numbers of people are subscribing to location-based services, but as the popularity grows...
Part 1: Data Anonymization and ComputationInternational audienceWe consider the problem of a client ...
Classification is used in various areas where k-nearest neighbor classification is the most popular ...
In this article, we propose a scheme, named QuickN, which can efficiently and securely enable neares...
Part 6: Query and Data PrivacyInternational audienceThe problem of private database search has been ...
International audienceSimilarity search in high dimensional space database is split into two worlds:...
Privacy-preserving collaborative data analysis enables richer models than what each party can learn ...
The past few decades have witnessed considerable efforts for achieving a Privacy- Preserving Computi...
International audienceThis paper presents a moderately secure but very efficient approximate nearest...
Data mining is frequently obstructed by privacy concerns. In many cases, data is distributed and br...
The problem of efficiently searching into outsourced encrypted data, while providing strong privacy ...
We address the privacy concerns that raise when running a nearest neighbor (NN) search on confidenti...
The problem of efficiently searching into outsourced encrypted data, while providing strong privacy ...
Real-world applications commonly require untrusting parties to share sensitive information securely....
We study the problem of privacy-preserving approximate kNN search in an outsourced environment — the...
Increasing numbers of people are subscribing to location-based services, but as the popularity grows...
Part 1: Data Anonymization and ComputationInternational audienceWe consider the problem of a client ...
Classification is used in various areas where k-nearest neighbor classification is the most popular ...
In this article, we propose a scheme, named QuickN, which can efficiently and securely enable neares...
Part 6: Query and Data PrivacyInternational audienceThe problem of private database search has been ...
International audienceSimilarity search in high dimensional space database is split into two worlds:...
Privacy-preserving collaborative data analysis enables richer models than what each party can learn ...
The past few decades have witnessed considerable efforts for achieving a Privacy- Preserving Computi...