Computing similarity between data is a fundamental problem in information retrieval and data mining. To address the relevant performance and scalability challenges, approximation methods are employed for large-scale similarity computation. A common characteristic among all privacy- preserving approximation protocols based on sketching is that the sketching is performed locally and is based on common randomness. In the semi-honest model the input to the sketching algorithm is independent of the common randomness. We, however, consider a new threat model where a party is allowed to use the common randomness to perturb her input 1) offline, and 2) before the execution of any secure protocol so as to steer the approximation result to a malicio...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
Data sketches are widely used to accelerate operations in big data analytics. For example, algorithm...
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subcla...
Similarity coefficients play an important role in many application aspects. Recently, a privacy-pres...
International audienceIn this paper, we address the problem of computing the similarity between two ...
Imagine a collection of individuals who each possess private data that they do not wish to share wi...
International audienceIn this paper, we consider the scenario in which the profile of a user is repr...
We describe and evaluate an attack that reconstructs the histogram of any target attribute of a sens...
Consider two data providers that want to contribute data to a certain learning model. Recent works h...
Computing the distance between two non-normalized vectors \mathbfit{x} and \mathbfit{y}, represented...
This paper revisits related randomness attacks against public key encryption schemes as introduced b...
International audienceThis paper presents a moderately secure but very efficient approximate nearest...
International audienceSimilarity search in high dimensional space database is split into two worlds:...
We formalize a realistic model for computations over massive data sets. The model, re-ferred to as t...
In 2010, Resch and Plank proposed a computationally secure secret sharing scheme, called AONT-RS. We...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
Data sketches are widely used to accelerate operations in big data analytics. For example, algorithm...
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subcla...
Similarity coefficients play an important role in many application aspects. Recently, a privacy-pres...
International audienceIn this paper, we address the problem of computing the similarity between two ...
Imagine a collection of individuals who each possess private data that they do not wish to share wi...
International audienceIn this paper, we consider the scenario in which the profile of a user is repr...
We describe and evaluate an attack that reconstructs the histogram of any target attribute of a sens...
Consider two data providers that want to contribute data to a certain learning model. Recent works h...
Computing the distance between two non-normalized vectors \mathbfit{x} and \mathbfit{y}, represented...
This paper revisits related randomness attacks against public key encryption schemes as introduced b...
International audienceThis paper presents a moderately secure but very efficient approximate nearest...
International audienceSimilarity search in high dimensional space database is split into two worlds:...
We formalize a realistic model for computations over massive data sets. The model, re-ferred to as t...
In 2010, Resch and Plank proposed a computationally secure secret sharing scheme, called AONT-RS. We...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
Data sketches are widely used to accelerate operations in big data analytics. For example, algorithm...
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subcla...