ACM Conference on Computer and Communications Security

CCS 2017 - Papers on Privacy-preserving systems

Topics · Papers

Privacy-preserving systems

Practical Secure Aggregation for Privacy-Preserving Machine Learning
Keith Bonawitz (Google), Vladimir Ivanov (Google), Ben Kreuter (Google), Antonio Marcedone (Cornell University), H. Brendan McMahan (Google), Sarvar Patel (Google), Daniel Ramage (Google), Aaron Segal (Google), Karn Seth (Google)
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR
Syed Mahbub Hafiz (Indiana University), Ryan Henry (Indiana University)
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain
Jan Camenisch (IBM Research - Zürich), Manu Drijvers (IBM Research - Zürich / ETH Zürich), Maria Dubovitskaya (IBM Research - Zürich)
[PDF]
Session: 5C
Distributed Measurement with Private Set-Union Cardinality
Ellis Fenske (Tulane University), Akshaya Mani (Georgetown University), Aaron Johnson (U.S. Naval Research Lab), Micah Sherr (Georgetown University)
[PDF]
Session: 1K
Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries
Ruiyu Zhu (Indiana University), Yan Huang (Indiana University), Darion Cassel (Carnegie Mellon University)
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
Gunnar Hartung (Karlsruhe Institute of Technology), Max Hoffmann (Ruhr-Universität Bochum), Matthias Nagel (Karlsruhe Institute of Technology), Andy Rupp (Karlsruhe Institute of Technology)
[PDF]
Session: 3I
Synthesis of Probabilistic Privacy Enforcement
Martin Kucera (ETH Zürich), Petar Tsankov (ETH Zürich), Timon Gehr (ETH Zürich), Marco Guarnieri (ETH Zürich), Martin Vechev (ETH Zürich)
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
Thang Hoang (Oregon State University), Ceyhun D. Ozkaptan (Oregon State University), Attila A. Yavuz (Oregon State University), Jorge Guajardo (Robert Bosch Research and Technology Center), Tam Nguyen (Oregon State University)
walk2friends: Inferring Social Links from Mobility Profiles
Michael Backes (CISPA, Saarland University), Mathias Humbert (Swiss Data Science Center, ETH/EPFL), Jun Pang (University of Luxembourg), Yang Zhang (CISPA, Saarland University)
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Raphael Bost (Direction Générale de l’Armement - Maitrise de l’Information / Université de Rennes 1), Brice Minaud (Royal Holloway, University of London), Olga Ohrimenko (Microsoft Research, Cambridge)
Solidus: Confidential Distributed Ledger Transactions via PVORM
Ethan Cecchetti (Cornell University), Fan Zhang (Cornell University), Yan Ji (Cornell University), Ahmed Kosba (University of Maryland), Ari Juels (Cornell Tech, Jacobs Institute), Elaine Shi (Cornell University)
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Briland Hitaj (Stevens Institute of Technology), Giuseppe Ateniese (Stevens Institute of Technology), Fernando Perez-Cruz (Stevens Institute of Technology)
Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche (United States Naval Academy), Adam J. Aviv (United States Naval Academy), Seung Geol Choi (United States Naval Academy), Travis Mayberry (United States Naval Academy)
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
Milad Nasr (University of Massachusetts Amherst), Hadi Zolfaghari (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)
Concurrency and Privacy with Payment-Channel Networks
Giulio Malavolta (Friedrich-Alexander University Erlangen Nuernberg), Pedro Moreno-Sanchez (Purdue University), Aniket Kate (Purdue University), Matteo Maffei (TU Wien), Srivatsan Ravi (University of Southern California)
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs
Anupam Datta (Carnegie Mellon University), Matthew Fredrikson (Carnegie Mellon University), Gihyuk Ko (Carnegie Mellon University), Piotr Mardziel (Carnegie Mellon University), Shayak Sen (Carnegie Mellon University)
Practical Quantum-Safe Voting from Lattices
Rafael del Pino (IBM Research - Zürich), Vadim Lyubashevsky (IBM Research - Zürich), Gregory Neven (IBM Research - Zürich), Gregor Seiler (IBM Research - Zürich)
[PDF]
Session: 4G
PeGaSus: Data-Adaptive Differentially Private Stream Processing
Yan Chen (Duke University), Ashwin Machanavajjhala (Duke University), Michael Hay (Colgate University), Gerome Miklau (University of Massachusetts Amherst)
[PDF]
Session: 4F
Scaling ORAM for Secure Computation
Jack Doerner (Northeastern University), abhi shelat (Northeastern University)
(Award Finalist)
[PDF]
[Paper]
[Artifact]
Session: 1C
Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms
Simon Oya (University of Vigo), Carmela Troncoso (IMDEA Software Institute), Fernando Pérez-González (University of Vigo)
Oblivious Neural Network Predictions via MiniONN transformations
Jian Liu (Aalto University), Mika Juuti (Aalto University), Yao Lu (Aalto University), N. Asokan (Aalto University)
Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis
Milad Nasr (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst), Arya Mazumdar (University of Massachusetts Amherst)
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy
Zhan Qin (State University of New York at Buffalo), Yin Yang (College of Science and Engineering, Hamad Bin Khalifa University), Ting Yu (Qatar Computing Research Institute, Hamad Bin Khalifa University), Xiaokui Xiao (Nanyang Technological University), Issa Khalil (Qatar Computing Research Institute, Hamad Bin Khalifa University), Kui Ren (State University of New York at Buffalo)
[PDF]
Session: 4B
Bolt: Anonymous Payment Channels for Decentralized Currencies
Matthew Green (Johns Hopkins University), Ian Miers (Johns Hopkins University)
[PDF]
Session: 5B