Skip to main content

Questions tagged [data-privacy]

Data privacy refers to (cryptographic) methods to prevent the disclosure of sensitive (identifying) information of persons.

0 votes
0 answers
32 views

Consider the following problem: we have two parties: Alice and Bob Alice has some sensitive data D (for Data) that she does not want to reveal to Bob Bob has some sensitive code C (for Code) that he ...
Kaveh's user avatar
  • 189
2 votes
0 answers
37 views

I'm researching the security models for multi-signature (multisig) schemes in various blockchain contexts. Specifically, what are some of the less obvious or recently discovered practical ...
Brendan Coyle's user avatar
2 votes
0 answers
103 views

Imagine Merlin delivers Arthur a blob of data representing a virtual machine state, encrypted via fully homomorphic encryption. This means that Arthur can compute arbitrary boolean circuits on this ...
redroid's user avatar
  • 229
1 vote
2 answers
314 views

Let's assume we need to encrypt 100,000 files directly, where the file size ranges from very small to very large and encrypting needs to be performed using the AES-256, i.e. AES with a key size of 256 ...
Joseph D's user avatar
1 vote
0 answers
74 views

Suppose that we have a scenario with a data owner and a model owner (e.g., cloud computing server), it is required to ensure (1) the secrecy of the input (2) the secrecy of the model parameters. I am ...
ShokofehVS's user avatar
0 votes
0 answers
95 views

I am currently working on my thesis as a researcher specializing in zero-knowledge (zk) cryptography. My focus is on identifying and solving open research problems related to the application of zk ...
Nerses Asaturyan's user avatar
0 votes
0 answers
53 views

I am trying to solve this problem that is about being able to de-anonymize a dataset. Can someone help with this point?: The adversary wants to de-anonymize one individual in the database, and learn ...
endi__edi's user avatar
1 vote
2 answers
197 views

Assuming AES-XTS is used for encryption, the data has to be put into the algorithm first and probably processed in RAM. Which means that the unencrypted plaintext is somewhere in the dynamic memory. ...
moju22's user avatar
  • 53
0 votes
0 answers
114 views

Here is the situation: Alice sends msg1, msg2 and msg3 to Bob. Such messages are not always delivered to Bob following the same order. Bob needs to use key1 to decrypt msg1, use key2 to decrypt msg2, ...
DingoStiglitz's user avatar
1 vote
0 answers
56 views

I konw a fact that it is impossible to achieve complete fairness in 2-party protocol from Cleve's paper.But i wonder if it is possible to achieve fairness in multi-party setting when the number of ...
Rui T.'s user avatar
  • 119
0 votes
1 answer
61 views

Suppose Alcie,Bob,and Charlie each has a secret value $a,b,c$ respectively. they want to compute a value $r\cdot (a+b+c)$ together. $r$ is a random value, and all parties know nothing about it. I ...
Rui T.'s user avatar
  • 119
0 votes
1 answer
144 views

We utilize a differential privacy mechanism (Laplace noise, with scale $b$) to provide the privacy of records stored within a dataset. Each individual is associated with two, and at most $k$, records. ...
Amirhossein Adavoudi's user avatar
6 votes
2 answers
655 views

I am looking at ways to blind an ECDSA signing key (and verification key respectively). Looking at proposed solutions like the IETF KBSS draft, and the IETF ARKG draft it seems that the ECDSA key ...
Peter Altmann's user avatar
3 votes
1 answer
245 views

First time question poster so I hope the below is clear enough :). Problem summary: Can a Holder and Verifier safely use ECDH for a Challenge-Response protocol where: the Holder proves possession and ...
Peter Altmann's user avatar
1 vote
1 answer
190 views

We have a set of query answers, i.e., $A = \{A_1, A_2, \dots, A_m\}$ and then we add noise to each of $A_i$ using a mechanism ($M$) providing differential privacy, i.e., $M(A_i) = O_i$. We denote the ...
Amirhossein Adavoudi's user avatar

15 30 50 per page
1
2 3 4 5
11