Anselme Tueno

Anselme Tueno
SAP Research | SAP · SAP Security Research

Doctor of Philosophy

About

15
Publications
802
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
136
Citations
Citations since 2017
14 Research Items
136 Citations
20172018201920202021202220230102030
20172018201920202021202220230102030
20172018201920202021202220230102030
20172018201920202021202220230102030

Publications

Publications (15)
Article
Full-text available
In this paper, we propose a new protocol for secure integer comparison which consists of parties having each a private integer. The goal of the computation is to compare both integers securely and reveal to the parties a single bit that tells which integer is larger. Nothing more should be revealed. To achieve a low communication overhead, this can...
Chapter
Quantum computing promises to build computers capable of solving complex problems much faster than today’s computers. This will benefit to many real-world applications such AI, machine learning, optimization problems, complex financial modelling, etc. Quantum computing will also have an impact on cryptology by allowing to break many public-key encr...
Chapter
We consider the problem of securely computing the \(k^{\mathrm {th}}\)-ranked element in a sequence of n private integers distributed among n parties. The \(k^{\mathrm {th}}\)-ranked element (e.g., minimum, maximum, median) is of particular interest in collaborative benchmarking and auctions. Previous secure protocols for the \(k^{\mathrm {th}}\)-r...
Thesis
Cryptography is the scientific study of techniques for securing information and communication against adversaries. It is about designing and analyzing encryption schemes and protocols that protect data from unauthorized reading. However, in our modern information-driven society with highly complex and interconnected information systems, encryption...
Chapter
In this paper, we address the problem of privately evaluating a decision tree on private data. This scenario consists of a server holding a private decision tree model and a client interested in classifying its private attribute vector using the server’s private model. The goal of the computation is to obtain the classification while preserving the...
Preprint
Decision trees are a powerful prediction model with many applications in statistics, data mining, and machine learning. In some settings, the model and the data to be classified may contain sensitive information belonging to different parties. In this paper, we, therefore, address the problem of privately evaluating a decision tree on private data....
Preprint
We consider the problem of securely computing the kth-ranked element in a sequence of n private integers distributed among n parties. The kth-ranked element (e.g., minimum, maximum, median) is of particular interest in benchmarking, which allows a company to compare its own key performance indicator to the statistics of its peer group. The individu...
Chapter
At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of se...
Article
Full-text available
Decision trees are widespread machine learning models used for data classification and have many applications in areas such as healthcare, remote diagnostics, spam filtering, etc. In this paper, we address the problem of privately evaluating a decision tree on private data. In this scenario, the server holds a private decision tree model and the cl...
Article
Full-text available
As machines get smarter, massive amounts of condition-based data from distributed sources become available. This data can be used to enhance maintenance management in several ways, such as by improving maintenance demand forecasting and spare parts and capacity planning. Regarding the former, machine learning techniques promise substantial benefits...
Article
Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data. Moreover, it does not require any change to the database management system, because comparison operates on ciphertexts as on plaintexts. This makes order-preserving encryption schemes very suitable for data outsourcing in cloud co...
Article
At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of se...
Article
Englisch: In this paper we study the paillier cryptosystem and derive form it to new schemes. First we transform the signature of paillier in a Blind signature. Secondly we propose a three-pass protocol wich use the homomorphic property instead of the commutativity as the Shamir protocol does. German: Basierend auf dem Kryptosystem von Paillier und...

Network

Cited By