Signature and Re-Encryption
Flexible Signatures: Making Authentication Suitable for Real-Time EnvironmentsDuc Le, Mahimna Kelkar and Aniket Kate A Dynamic & Revocable Group Merkle SignatureMaxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad and ShiFeng Sun Puncturable Proxy Re-Encryption supporting to Group Messaging ServiceTran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim and Dongxi Liu Generic Traceable Proxy … Continued
Machine Learning
Privacy-Enhanced Machine Learning with Functional EncryptionMiha Stopar, Tilen Marc, Jan Hartman, Manca Bizjak and Jolanda Modic Towards Secure and Efficient Outsourcing of Machine Learning ClassificationYifeng Zheng, Huayi Duan and Cong Wang Confidential Boosting with Random Linear Classifiers for Outsourced User-generated DataSagar Sharma and Keke Chen BDPL: A Boundary Differentially Private Layer Against Machine Learning Model … Continued
Keynote – The Insecurity of Machine Learning: Problems and Solutions
Session Chair: Steve Schneider The development of deep neural networks in the last decade had revolutionized machine learning and led to major improvements in the precision with which we can perform many computational tasks. However, the discovery five years ago of adversarial examples in which tiny changes in the input can fool well trained neural … Continued