Questions tagged [data-privacy]
Data privacy refers to (cryptographic) methods to prevent the disclosure of sensitive (identifying) information of persons.
154 questions
0 votes
0 answers
32 views
Safe Secret Data Exfiltration [closed]
Consider the following problem: we have two parties: Alice and Bob Alice has some sensitive data D (for Data) that she does not want to reveal to Bob Bob has some sensitive code C (for Code) that he ...
2 votes
0 answers
37 views
Understanding the Practical Implications of Multisignature Scheme Vulnerabilities
I'm researching the security models for multi-signature (multisig) schemes in various blockchain contexts. Specifically, what are some of the less obvious or recently discovered practical ...
2 votes
0 answers
103 views
Is it possible to have a homomorphically encrypted Von Neumann machine?
Imagine Merlin delivers Arthur a blob of data representing a virtual machine state, encrypted via fully homomorphic encryption. This means that Arthur can compute arbitrary boolean circuits on this ...
1 vote
2 answers
314 views
If encrypting a large number of files, would a unique AES key per file be beneficial?
Let's assume we need to encrypt 100,000 files directly, where the file size ranges from very small to very large and encrypting needs to be performed using the AES-256, i.e. AES with a key size of 256 ...
1 vote
0 answers
74 views
How a model in a data analysis task is protected against a data owner?
Suppose that we have a scenario with a data owner and a model owner (e.g., cloud computing server), it is required to ensure (1) the secrecy of the input (2) the secrecy of the model parameters. I am ...
0 votes
0 answers
95 views
Seeking Open Research Problems in zk Cryptography for Military Applications
I am currently working on my thesis as a researcher specializing in zero-knowledge (zk) cryptography. My focus is on identifying and solving open research problems related to the application of zk ...
0 votes
0 answers
53 views
Probability and privacy problem - De-anonymization
I am trying to solve this problem that is about being able to de-anonymize a dataset. Can someone help with this point?: The adversary wants to de-anonymize one individual in the database, and learn ...
1 vote
2 answers
197 views
Flaws in modern file encryption
Assuming AES-XTS is used for encryption, the data has to be put into the algorithm first and probably processed in RAM. Which means that the unencrypted plaintext is somewhere in the dynamic memory. ...
0 votes
0 answers
114 views
How to hide a sequence number in the messages that exposed to the public?
Here is the situation: Alice sends msg1, msg2 and msg3 to Bob. Such messages are not always delivered to Bob following the same order. Bob needs to use key1 to decrypt msg1, use key2 to decrypt msg2, ...
1 vote
0 answers
56 views
Is there any possible way to make each party obtain the output in a MPC protocol?
I konw a fact that it is impossible to achieve complete fairness in 2-party protocol from Cleve's paper.But i wonder if it is possible to achieve fairness in multi-party setting when the number of ...
0 votes
1 answer
61 views
How to compute $r \cdot (a+b+c)$ for random $r$ and secret value$a,b,c$ in MPC?
Suppose Alcie,Bob,and Charlie each has a secret value $a,b,c$ respectively. they want to compute a value $r\cdot (a+b+c)$ together. $r$ is a random value, and all parties know nothing about it. I ...
0 votes
1 answer
144 views
Privacy-loss of an individual due their associated records
We utilize a differential privacy mechanism (Laplace noise, with scale $b$) to provide the privacy of records stored within a dataset. Each individual is associated with two, and at most $k$, records. ...
6 votes
2 answers
655 views
Blinding an ECDSA private key without learning the private key
I am looking at ways to blind an ECDSA signing key (and verification key respectively). Looking at proposed solutions like the IETF KBSS draft, and the IETF ARKG draft it seems that the ECDSA key ...
3 votes
1 answer
245 views
Can DH be used for privacy-preserving proof of possession?
First time question poster so I hope the below is clear enough :). Problem summary: Can a Holder and Verifier safely use ECDH for a Challenge-Response protocol where: the Holder proves possession and ...
1 vote
1 answer
190 views
Relating the noisy data to it's associated original/actual one
We have a set of query answers, i.e., $A = \{A_1, A_2, \dots, A_m\}$ and then we add noise to each of $A_i$ using a mechanism ($M$) providing differential privacy, i.e., $M(A_i) = O_i$. We denote the ...