Skip to main content

Showing 1–9 of 9 results for author: Yerukhimovich, A

.
  1. arXiv:2109.07708  [pdf, other

    cs.CR cs.CC

    Compressed Oblivious Encoding for Homomorphically Encrypted Search

    Authors: Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich

    Abstract: Fully homomorphic encryption (FHE) enables a simple, attractive framework for secure search. Compared to other secure search systems, no costly setup procedure is necessary; it is sufficient for the client merely to upload the encrypted database to the server. Confidentiality is provided because the server works only on the encrypted query and records. While the search functionality is enabled by… ▽ More

    Submitted 16 September, 2021; originally announced September 2021.

  2. arXiv:2109.04559  [pdf, other

    cs.CR

    Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS)

    Authors: Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich

    Abstract: Recent years have seen a strong uptick in both the prevalence and real-world consequences of false information spread through online platforms. At the same time, encrypted messaging systems such as WhatsApp, Signal, and Telegram, are rapidly gaining popularity as users seek increased privacy in their digital lives. The challenge we address is how to combat the viral spread of misinformation with… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

    Comments: 16 pages, to appear in NDSS 2022

  3. arXiv:2011.04919  [pdf, other

    cs.CR cs.DC

    Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things

    Authors: Chunchi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lv

    Abstract: With the prevalence of Internet of Things (IoT) applications, IoT devices interact closely with our surrounding environments, bringing us unparalleled smartness and convenience. However, the development of secure IoT solutions is getting a long way lagged behind, making us exposed to common unauthorized accesses that may bring malicious attacks and unprecedented danger to our daily life. Overprivi… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

  4. arXiv:1909.12454  [pdf, other

    cs.CR cs.CY cs.SE

    SoK: Blockchain Technology and Its Potential Use Cases

    Authors: Scott Ruoti, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert Cunningham

    Abstract: Bitcoin's success has led to significant interest in its underlying components, particularly Blockchain technology. Over 10 years after Bitcoin's initial release, the community still suffers from a lack of clarity regarding what properties defines Blockchain technology, its relationship to similar technologies, and which of its proposed use-cases are tenable and which are little more than hype. In… ▽ More

    Submitted 26 September, 2019; originally announced September 2019.

    Comments: Technical report

  5. arXiv:1807.02719  [pdf, other

    cs.CR

    Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns

    Authors: Mikhail Andreev, Avi Klausner, Trishita Tiwari, Ari Trachtenberg, Arkady Yerukhimovich

    Abstract: We evaluate the power of simple networks side-channels to violate user privacy on Android devices. Specifically, we show that, using blackbox network metadata alone (i.e., traffic statistics such as transmission time and size of packets) it is possible to infer several elements of a user's location and also identify their web browsing history (i.e, which sites they visited). We do this with relati… ▽ More

    Submitted 7 July, 2018; originally announced July 2018.

  6. arXiv:1703.02014  [pdf, ps, other

    cs.CR

    SoK: Cryptographically Protected Database Search

    Authors: Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham

    Abstract: Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly; systems are offered by academia, start-ups, and established companies. However, there… ▽ More

    Submitted 2 June, 2017; v1 submitted 6 March, 2017; originally announced March 2017.

    Comments: 20 pages, to appear to IEEE Security and Privacy

  7. POPE: Partial Order Preserving Encoding

    Authors: Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich

    Abstract: Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such queries is order-preserving encryption/encoding (OPE) which results in ciphertexts that preserve the relative order of the underlying plaintexts thus allowing range and comparison queries to be perfor… ▽ More

    Submitted 13 October, 2016; originally announced October 2016.

    Comments: Appears in ACM CCS 2016 Proceedings

  8. Computing on Masked Data to improve the Security of Big Data

    Authors: Vijay Gadepally, Braden Hancock, Benjamin Kaiser, Jeremy Kepner, Pete Michaleas, Mayank Varia, Arkady Yerukhimovich

    Abstract: Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users. However, recent events underscore the need for improving the security of data stored in such untrusted servers or databases. Advances in cryptographic techniques and database techn… ▽ More

    Submitted 6 April, 2015; originally announced April 2015.

    Comments: 6 pages, Accepted to IEEE HST Conference

  9. arXiv:1406.5751  [pdf

    cs.CR astro-ph.IM cs.DB cs.IR

    Computing on Masked Data: a High Performance Method for Improving Big Data Veracity

    Authors: Jeremy Kepner, Vijay Gadepally, Pete Michaleas, Nabil Schear, Mayank Varia, Arkady Yerukhimovich, Robert K. Cunningham

    Abstract: The growing gap between data and users calls for innovative tools that address the challenges faced by big data volume, velocity and variety. Along with these standard three V's of big data, an emerging fourth "V" is veracity, which addresses the confidentiality, integrity, and availability of the data. Traditional cryptographic techniques that ensure the veracity of data can have overheads that a… ▽ More

    Submitted 22 June, 2014; originally announced June 2014.

    Comments: to appear in IEEE High Performance Extreme Computing 2014 (ieee-hpec.org)