Privacy-Preserving Reputation Management in Fully Decentralized Systems: Challenges and Opportunities

Author(s):  
Ngoc Hong Tran ◽  
Leila Bahri ◽  
Binh Quoc Nguyen
2019 ◽  
Vol 2019 ◽  
pp. 1-28 ◽  
Author(s):  
Joseph I. Choi ◽  
Kevin R. B. Butler

When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations. Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable. This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC. This paper also addresses three open challenges: (1) defeating malicious adversaries, (2) mobile-friendly TEE-supported SMC, and (3) a more general coupling of trusted hardware and privacy-preserving computation.


2015 ◽  
Vol 49 ◽  
pp. 220-238 ◽  
Author(s):  
Ginés Dólera Tormo ◽  
Félix Gómez Mármol ◽  
Gregorio Martínez Pérez

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 74694-74710 ◽  
Author(s):  
Ke Zhao ◽  
Shaohua Tang ◽  
Bowen Zhao ◽  
Yiming Wu

Author(s):  
Bernardo Pulido-Gaytan ◽  
Andrei Tchernykh ◽  
Jorge M. Cortés-Mendoza ◽  
Mikhail Babenko ◽  
Gleb Radchenko ◽  
...  

AbstractClassical machine learning modeling demands considerable computing power for internal calculations and training with big data in a reasonable amount of time. In recent years, clouds provide services to facilitate this process, but it introduces new security threats of data breaches. Modern encryption techniques ensure security and are considered as the best option to protect stored data and data in transit from an unauthorized third-party. However, a decryption process is necessary when the data must be processed or analyzed, falling into the initial problem of data vulnerability. Fully Homomorphic Encryption (FHE) is considered the holy grail of cryptography. It allows a non-trustworthy third-party resource to process encrypted information without disclosing confidential data. In this paper, we analyze the fundamental concepts of FHE, practical implementations, state-of-the-art approaches, limitations, advantages, disadvantages, potential applications, and development tools focusing on neural networks. In recent years, FHE development demonstrates remarkable progress. However, current literature in the homomorphic neural networks is almost exclusively addressed by practitioners looking for suitable implementations. It still lacks comprehensive and more thorough reviews. We focus on the privacy-preserving homomorphic encryption cryptosystems targeted at neural networks identifying current solutions, open issues, challenges, opportunities, and potential research directions.


Sign in / Sign up

Export Citation Format

Share Document