Feb. 17, 2023, 2:10 a.m. | Nan Wang, Sid Chi-Kin Chau

cs.CR updates on arXiv.org arxiv.org

In this paper, we propose a practically efficient model for securely
computing rank-based statistics, e.g., median, percentiles and quartiles, over
distributed datasets in the malicious setting without leaking individual data
privacy. Based on the binary search technique of Aggarwal et al. (EUROCRYPT
\textquotesingle 04), we respectively present an interactive protocol and a
non-interactive protocol, involving at most $\log ||R||$ rounds, where $||R||$
is the range size of the dataset elements. Besides, we introduce a series of
optimisation techniques to reduce …

binary computation computing data data privacy datasets distributed eurocrypt log malicious non privacy protocol search secure computation size statistics

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Consultant

@ Auckland Council | Central Auckland, NZ, 1010

Security Engineer, Threat Detection

@ Stripe | Remote, US

DevSecOps Engineer (Remote in Europe)

@ CloudTalk | Prague, Prague, Czechia - Remote

Security Architect

@ Valeo Foods | Dublin, Ireland

Security Specialist - IoT & OT

@ Wallbox | Barcelona, Catalonia, Spain