International audienceAggregator-oblivious encryption is a useful notion put forward by Shi et al. in 2011 that allows an untrusted aggregator to periodically compute an aggregate value over encrypted data contributed by a set of users. Such encryption schemes find numerous applications, in particular in the context of privacy-preserving smart metering.This paper presents a general framework for constructing privacy-preserving aggregator-oblivious encryption schemes using a variant of Cramer-Shoup's paradigm of smooth projective hashing. This abstraction leads to new schemes based on a variety of complexity assumptions. It also improves upon existing constructions, providing schemes with shorter ciphertexts and better encryption times
Many applications depend on privacy-preserving data aggregation schemes to preserve users\u27 privac...
Many applications depend on privacy-preserving data aggregation schemes to preserve users\u27 privac...
Abstract. We consider applications where an untrusted aggregator would like to collect privacy sensi...
International audienceAggregator-oblivious encryption is a useful notion put forward by Shi et al. i...
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can comp...
Abstract. Suppose that a set of multiple users uploads in every time period encrypted values of some...
We consider how an untrusted data aggregator can learn desired statistics over multiple participants...
The conference paper can be viewed at: http://www.isoc.org/isoc/conferences/ndss/11/proceedings.shtm...
Abstract—Much research has been conducted to securely outsource multiple parties ’ data aggregation ...
Abstract—Privacy-preserving protocols allow an untrusted aggregator to evaluate certain statistics o...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
We propose secure multi-party computation techniques for the distributed computation of the average ...
Abstract. With the advent of networking applications collecting user data on a massive scale, the pr...
Many applications depend on privacy-preserving data aggregation schemes to preserve users\u27 privac...
Many applications depend on privacy-preserving data aggregation schemes to preserve users\u27 privac...
Abstract. We consider applications where an untrusted aggregator would like to collect privacy sensi...
International audienceAggregator-oblivious encryption is a useful notion put forward by Shi et al. i...
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can comp...
Abstract. Suppose that a set of multiple users uploads in every time period encrypted values of some...
We consider how an untrusted data aggregator can learn desired statistics over multiple participants...
The conference paper can be viewed at: http://www.isoc.org/isoc/conferences/ndss/11/proceedings.shtm...
Abstract—Much research has been conducted to securely outsource multiple parties ’ data aggregation ...
Abstract—Privacy-preserving protocols allow an untrusted aggregator to evaluate certain statistics o...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
Aggregation of time-series data offers the possibility to learn certain statistics over data periodi...
We propose secure multi-party computation techniques for the distributed computation of the average ...
Abstract. With the advent of networking applications collecting user data on a massive scale, the pr...
Many applications depend on privacy-preserving data aggregation schemes to preserve users\u27 privac...
Many applications depend on privacy-preserving data aggregation schemes to preserve users\u27 privac...
Abstract. We consider applications where an untrusted aggregator would like to collect privacy sensi...