
Anselme TuenoSAP Research | SAP · SAP Security Research
Anselme Tueno
Doctor of Philosophy
About
15
Publications
802
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
136
Citations
Citations since 2017
Introduction
Publications
Publications (15)
In this paper, we propose a new protocol for secure integer comparison which consists of parties having each a private integer. The goal of the computation is to compare both integers securely and reveal to the parties a single bit that tells which integer is larger. Nothing more should be revealed. To achieve a low communication overhead, this can...
Quantum computing promises to build computers capable of solving complex problems much faster than today’s computers. This will benefit to many real-world applications such AI, machine learning, optimization problems, complex financial modelling, etc. Quantum computing will also have an impact on cryptology by allowing to break many public-key encr...
We consider the problem of securely computing the \(k^{\mathrm {th}}\)-ranked element in a sequence of n private integers distributed among n parties. The \(k^{\mathrm {th}}\)-ranked element (e.g., minimum, maximum, median) is of particular interest in collaborative benchmarking and auctions. Previous secure protocols for the \(k^{\mathrm {th}}\)-r...
Cryptography is the scientific study of techniques for securing information and communication against adversaries. It is about designing and analyzing encryption schemes and protocols that protect data from unauthorized reading. However, in our modern information-driven society with highly complex and interconnected information systems, encryption...
In this paper, we address the problem of privately evaluating a decision tree on private data. This scenario consists of a server holding a private decision tree model and a client interested in classifying its private attribute vector using the server’s private model. The goal of the computation is to obtain the classification while preserving the...
Decision trees are a powerful prediction model with many applications in statistics, data mining, and machine learning. In some settings, the model and the data to be classified may contain sensitive information belonging to different parties. In this paper, we, therefore, address the problem of privately evaluating a decision tree on private data....
We consider the problem of securely computing the kth-ranked element in a sequence of n private integers distributed among n parties. The kth-ranked element (e.g., minimum, maximum, median) is of particular interest in benchmarking, which allows a company to compare its own key performance indicator to the statistics of its peer group. The individu...
At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of se...
Decision trees are widespread machine learning models used for data classification and have many applications in areas such as healthcare, remote diagnostics, spam filtering, etc. In this paper, we address the problem of privately evaluating a decision tree on private data. In this scenario, the server holds a private decision tree model and the cl...
As machines get smarter, massive amounts of condition-based data from distributed sources become available. This data can be used to enhance maintenance management in several ways, such as by improving maintenance demand forecasting and spare parts and capacity planning. Regarding the former, machine learning techniques promise substantial benefits...
Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data. Moreover, it does not require any change to the database management system, because comparison operates on ciphertexts as on plaintexts. This makes order-preserving encryption schemes very suitable for data outsourcing in cloud co...
At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of se...
Englisch: In this paper we study the paillier cryptosystem and derive form it
to new schemes. First we transform the signature of paillier in a Blind
signature. Secondly we propose a three-pass protocol wich use the homomorphic
property instead of the commutativity as the Shamir protocol does.
German: Basierend auf dem Kryptosystem von Paillier und...