EM

E.A. Markatou

7 records found

Federated Space Public Key Infrastructure (PKI) can offer a scalable foundation for secure and interoperable communications in collaborative space missions. Yet, its deployment faces challenges stemming from resource-constrained assets, architectural complexity, and the transitio ...

Computation Capabilities of Server-Side Trusted Execution Environments

A Comparison of TEEs to Privacy-Preserving Technologies

While securing data-in-use was assured by well-known encryption algorithms, the industry shifted towards trusting hardware manufacturers in exchange for efficiency speedups through Trusted Execution Environments. However, there are many technologies to choose from, each with its ...

Secure Multi-party Computation: A Survey

A Comparison of Secure Multi-party Computation Protocols and other Techniques for Computing on Encrypted Data

Secure multi-party computation (MPC) allows parties to compute on their secret inputs, without revealing them to each other. As an area of theoretical interest, many MPC protocol have been developed in the last four decades. They each present different characteristics and are cla ...

Computing with Fully Homomorphic Encryption

Constructions, Characteristics and Comparisons

In the digital economy, individual data sovereignty is a requirement for sustainable and secure development. With an increase in the number of outsourced computations, due to the adoption of web services, artificial intelligence and research-based innovation, privacy became one o ...

A Comparative Study of Privacy-Preserving Computation Techniques

Contrasting ORAM, MPC, TEEs, Structured Encryption, and Homomorphic Encryption

Outsourcing data to the cloud can pose serious security threats due to an attacker observing the data access patterns, even though data is encrypted. Ideally, confidentiality should not depend on the server being a trusted party. Oblivious Random Access Machines are tackling t ...

An analysis of Structured Encryption compared to other secure computation technologies

A review of Structured Encryption schemes compared to Oblivious RAM, Multi-party Computation, Homomorphic Encryption and Trusted Execution Environments in the context of computing on encrypted data

With the ever-growing cloud capacity in our society, being able to harness that immense computational power while keeping our data private has become a strong point of interest. This can be achieved with Structured Encryption, which allows a data structure to be encrypted and sto ...

Scalability of Graph Neural Networks in Traffic Forecasting

Assessing Accuracy and Computational Efficiency in Varying Road Network Sizes and Complexities

This paper explores the scalability of Graph Neural Networks (GNNs) in the context of traffic forecasting, a critical area for improving urban mobility and reducing congestion. Despite GNNs’ demonstrated effectiveness in handling complex spatiotemporal dependencies in traffic dat ...