Skip to main content

Showing 1–9 of 9 results for author: Blanton, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.10247  [pdf, other

    cs.CR cs.DS

    Secure and Accurate Summation of Many Floating-Point Numbers

    Authors: Marina Blanton, Michael T. Goodrich, Chen Yuan

    Abstract: Motivated by the importance of floating-point computations, we study the problem of securely and accurately summing many floating-point numbers. Prior work has focused on security absent accuracy or accuracy absent security, whereas our approach achieves both of them. Specifically, we show how to implement floating-point superaccumulators using secure multi-party computation techniques, so that a… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: Corrected version of the paper published at PETS 2023

    Journal ref: Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 3, pp. 432-445, 2023

  2. arXiv:2306.00308  [pdf, other

    cs.PL cs.CR

    A Formal Model for Secure Multiparty Computation

    Authors: Amy Rathore, Marina Blanton, Marco Gaboardi, Lukasz Ziarek

    Abstract: Although Secure Multiparty Computation (SMC) has seen considerable development in recent years, its use is challenging, resulting in complex code which obscures whether the security properties or correctness guarantees hold in practice. For this reason, several works have investigated the use of formal methods to provide guarantees for SMC systems. However, these approaches have been applied mostl… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  3. arXiv:2209.10457  [pdf, other

    cs.CR cs.IT

    Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation

    Authors: Alessandro Baccarini, Marina Blanton, Shaofeng Zou

    Abstract: Secure multi-party computation has seen substantial performance improvements in recent years and is being increasingly used in commercial products. While a significant amount of work was dedicated to improving its efficiency under standard security models, the threat models do not account for information leakage from the output of secure function evaluation. Quantifying information disclosure abou… ▽ More

    Submitted 20 March, 2024; v1 submitted 21 September, 2022; originally announced September 2022.

    Comments: This is the full version of our conference paper, appearing in the proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy (CODASPY), Porto, Portugal, 2024

  4. arXiv:2012.04721  [pdf, other

    cs.RO astro-ph.IM

    SDSS-V Algorithms: Fast, Collision-Free Trajectory Planning for Heavily Overlapping Robotic Fiber Positioners

    Authors: Conor Sayres, José R. Sánchez-Gallego, Michael R. Blanton, Ricardo Araujo, Mohamed Bouri, Loïc Grossen, Jean-Paul Kneib, Juna A. Kollmeier, Luzius Kronig, Richard W. Pogge, Sarah Tuttle

    Abstract: Robotic fiber positioner (RFP) arrays are becoming heavily adopted in wide field massively multiplexed spectroscopic survey instruments. RFP arrays decrease nightly operational overheads through rapid reconfiguration between fields and exposures. In comparison to similar instruments, SDSS-V has selected a very dense RFP packing scheme where any point in a field is typically accessible to three or… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: To be published in the Astronomical Journal

  5. arXiv:1806.06477  [pdf, other

    cs.CR

    Privacy Preserving Analytics on Distributed Medical Data

    Authors: Marina Blanton, Ah Reum Kang, Subhadeep Karan, Jaroslaw Zola

    Abstract: Objective: To enable privacy-preserving learning of high quality generative and discriminative machine learning models from distributed electronic health records. Methods and Results: We describe general and scalable strategy to build machine learning models in a provably privacy-preserving way. Compared to the standard approaches using, e.g., differential privacy, our method does not require al… ▽ More

    Submitted 17 June, 2018; originally announced June 2018.

  6. arXiv:1702.03379  [pdf, other

    cs.CR

    Secure Fingerprint Alignment and Matching Protocols

    Authors: Fattaneh Bayatbabolghani, Marina Blanton, Mehrdad Aliasgari, Michael Goodrich

    Abstract: We present three private fingerprint alignment and matching protocols, based on what are considered to be the most precise and efficient fingerprint recognition algorithms, which use minutia points. Our protocols allow two or more honest-but-curious parties to compare their respective privately-held fingerprints in a secure way such that they each learn nothing more than an accurate score of how w… ▽ More

    Submitted 16 December, 2017; v1 submitted 10 February, 2017; originally announced February 2017.

  7. arXiv:1612.08678  [pdf, ps, other

    cs.CR

    Optimizing Secure Statistical Computations with PICCO

    Authors: Justin DeBenedetto, Marina Blanton

    Abstract: Growth in research collaboration has caused an increased need for sharing of data. However, when this data is private, there is also an increased need for maintaining security and privacy. Secure multi-party computation enables any function to be securely evaluated over private data without revealing any unintended data. A number of tools and compilers have been recently developed to support evalu… ▽ More

    Submitted 27 December, 2016; originally announced December 2016.

  8. arXiv:1509.01763  [pdf, ps, other

    cs.CR cs.PL

    Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler

    Authors: Yihua Zhang, Marina Blanton, Ghada Almashaqbeh

    Abstract: Recent compilers allow a general-purpose program (written in a conventional programming language) that handles private data to be translated into secure distributed implementation of the corresponding functionality. The resulting program is then guaranteed to provably protect private data using secure multi-party computation techniques. The goals of such compilers are generality, usability, and ef… ▽ More

    Submitted 30 June, 2017; v1 submitted 5 September, 2015; originally announced September 2015.

  9. arXiv:0904.4670  [pdf, ps, other

    cs.DS cs.CG

    Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric

    Authors: Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu

    Abstract: This paper studies a discrepancy-sensitive approach to dynamic fractional cascading. We provide an efficient data structure for dominated maxima searching in a dynamic set of points in the plane, which in turn leads to an efficient dynamic data structure that can answer queries for nearest neighbors using any Minkowski metric. We provide an efficient data structure for dominated maxima searching… ▽ More

    Submitted 29 April, 2009; originally announced April 2009.

    Comments: Expanded version of a paper that appeared in WADS 2007