2019
DOI: 10.1007/s10207-018-0424-2
|View full text |Cite
|
Sign up to set email alerts
|

Breaking MPC implementations through compression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 18 publications
0
4
0
1
Order By: Relevance
“…Kolmogorov Complexity focus on the absence of need for in-depth knowledge of the domain data, but this can induce users on trying to use it as a quick fix. However, from our perspective, many times it is necessary to perform preprocessing data such as the authors that analyze the security of MPC [ 43 ]. To perform validations, it was necessary to remove the entire network layer from wireshark captures, because compression should not detect significant differences in non-MPC data.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Kolmogorov Complexity focus on the absence of need for in-depth knowledge of the domain data, but this can induce users on trying to use it as a quick fix. However, from our perspective, many times it is necessary to perform preprocessing data such as the authors that analyze the security of MPC [ 43 ]. To perform validations, it was necessary to remove the entire network layer from wireshark captures, because compression should not detect significant differences in non-MPC data.…”
Section: Discussionmentioning
confidence: 99%
“… Theory to practice: There are some protocols that enforce privacy and security in communications between users. With the emergence of new cyberattacks and with the recent developments in academia regarding privacy policies imposed by rules to protect user privacy, such as GDPR, it is of utmost important to validate existing implementations to ensure user privacy [ 43 ]. …”
Section: Kolmogorov Complexity Application Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…Penelitian ini dilakukan untuk meningkatkan kapasitas informasi pada kode QR dengan memanfaatkan metode kompresi. Kompresi berarti pengkodean informasi menggunakan bit lebih sedikit daripada representasi asli untuk mengurangi konsumsi sumber daya, seperti penyimpanan dan bandwidth atau bahkan untuk alasan keamanan [16]- [18]. Kompresi dapat berupa lossy atau lossless.…”
Section: Pendahuluanunclassified
“…Moreover, in computer science [ 12 , 13 ], the authors showed that cataloging network traffic and a computer virus is possible. It also has applications in computer security since, for example, one can break multi-party computations based on [ 14 ]. In biology, NCD was used to classify mitochondrial genome phylogeny [ 15 ].…”
Section: Introductionmentioning
confidence: 99%