RK
R.G. Kromes
10 records found
1
This research looks at two open-source tools for differential privacy: Google's Differential Privacy Library and the OpenDP Library. The main aim of this study is to test them side-by-side and observe how they compared quantitatively. Specifically, the focus is on their impl
...
Homomorphic Encryption (HE) enables computation directly on encrypted data, while offering strong cryptographic and privacy guarantees for data-driven sectors like healthcare, finance, and cloud computing. However, practical adoption of HE is severely limited by its computational
...
Differential Privacy (DP) has become one of the most used approaches to protect individual data. However, its implementation can vary significantly depending on the context we are using it. In this study, we aim to compare two such implementations of DP: Google's Differential Pri
...
Quantum SMPC: Rich in theory, limited in practice
A systematic review of quantum secure multi-party computation
Secure Multi-Party Computation (SMPC) is a widely-used cryptographic tool for privacy-preserving data analysis. The progress in the field of quantum computing has led to the development of Quantum SMPC (QSMPC), which promises informationtheoretic security based on physics laws. T
...
FATE vs. SecretFlow: A Practical Comparison for Privacy-Preserving Machine Learning
Privacy-Preserving Data Analytics
Secure multi-party computation (SMPC) is a cryptographic technique that enables multiple parties to work together on data without sharing their private information with each other. This paper investigates how two open-source frameworks, SecretFlow and FATE, implement SMPC and oth
...
Threshold signatures play a crucial role in the security of blockchain applications. An efficient threshold signature can be applied to enhance the security of wallets and transactions by enforcing multi-device-based authentication, as this requires adversaries to compromise more
...
The Machine Learning (ML) technology has taken the world by storm since it equipped the machines with previously unimaginable decision-making capabilities. However, building powerful ML models is not an easy task, but the demand for their utilization in different industries and a
...
Blockchain technology has revolutionized the way data is stored, managed, and shared across various industries. Its decentralized nature and immutability make it highly attractive in use cases that require transparency, integrity, and accountability. However, some applications de
...
Blockchain technologies allow users to securely store and trace their data on a fully decentralized system, and have the potential to make a huge impact on many industries. While traditional, permissionless blockchains such as Bitcoin, Ethereum, and Cardano are very popular, they
...
This paper offers a prototype of a smart-contract-based encryption scheme meant to improve the security of user data being uploaded to the ledger. A new extension to the self-encryption scheme was introduced by integrating identity into the encryption process. Such integration al
...