Skip to main content

Showing 1–16 of 16 results for author: Abadi, A

  1. arXiv:2407.08152  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models

    Authors: Aydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar

    Abstract: Deduplication is a vital preprocessing step that enhances machine learning model performance and saves training time and energy. However, enhancing federated learning through deduplication poses challenges, especially regarding scalability and potential privacy violations if deduplication involves sharing all clients' data. In this paper, we address the problem of deduplication in a federated setu… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  2. arXiv:2406.15529  [pdf, ps, other

    cs.CR cs.DB cs.LG

    Supersonic OT: Fast Unconditionally Secure Oblivious Transfer

    Authors: Aydin Abadi, Yvo Desmedt

    Abstract: Oblivious Transfer (OT) is a fundamental cryptographic protocol with applications in secure Multi-Party Computation, Federated Learning, and Private Set Intersection. With the advent of quantum computing, it is crucial to develop unconditionally secure core primitives like OT to ensure their continued security in the post-quantum era. Despite over four decades since OT's introduction, the literatu… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: text overlap with arXiv:2406.15063

  3. arXiv:2406.15070  [pdf, other

    cs.CR cs.CE cs.LG

    Tempora-Fusion: Time-Lock Puzzle with Efficient Verifiable Homomorphic Linear Combination

    Authors: Aydin Abadi

    Abstract: To securely transmit sensitive information into the future, Time-Lock Puzzles (TLPs) have been developed. Their applications include scheduled payments, timed commitments, e-voting, and sealed-bid auctions. Homomorphic TLP is a key variant of TLP that enables computation on puzzles from different clients. This allows a solver/server to tackle only a single puzzle encoding the computation's result.… ▽ More

    Submitted 24 June, 2024; v1 submitted 21 June, 2024; originally announced June 2024.

  4. arXiv:2406.15063  [pdf, ps, other

    cs.CR

    Delegated-Query Oblivious Transfer and its Practical Applications

    Authors: Yvo Desmedt, Aydin Abadi

    Abstract: Databases play a pivotal role in the contemporary World Wide Web and the world of cloud computing. Unfortunately, numerous privacy violations have recently garnered attention in the news. To enhance database privacy, we consider Oblivious Transfer (OT), an elegant cryptographic technology. Our observation reveals that existing research in this domain primarily concentrates on theoretical cryptogra… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  5. arXiv:2401.10765  [pdf, other

    cs.LG cs.CR

    Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection

    Authors: Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller

    Abstract: Federated Learning (FL) is a data-minimization approach enabling collaborative model training across diverse clients with local data, avoiding direct data exchange. However, state-of-the-art FL solutions to identify fraudulent financial transactions exhibit a subset of the following limitations. They (1) lack a formal security definition and proof, (2) assume prior freezing of suspicious customers… ▽ More

    Submitted 22 January, 2024; v1 submitted 19 January, 2024; originally announced January 2024.

  6. arXiv:2311.12898  [pdf, other

    q-bio.QM cs.MS

    An Assessment of PC-mer's Performance in Alignment-Free Phylogenetic Tree Construction

    Authors: Saeedeh Akbari Rokn Abadi, Melika Honarmand, Ali Hajialinaghi, Somayyeh Koohi

    Abstract: Background: Sequence comparison is essential in bioinformatics, serving various purposes such as taxonomy, functional inference, and drug discovery. The traditional method of aligning sequences for comparison is time-consuming, especially with large datasets. To overcome this, alignment-free methods have emerged as an alternative approach, prioritizing comparison scores over alignment itself. Thes… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

  7. arXiv:2308.01280  [pdf, other

    cs.CR

    Delegated Time-Lock Puzzle

    Authors: Aydin Abadi, Dan Ristea, Steven J. Murdoch

    Abstract: Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a client to lock a message in such a way that a server can only unlock it after a specific time period. However, existing TLPs have certain limitations: (i) they assume that both the client and server always possess sufficient computational resources and (ii) they solely focus on the lower time bound for finding a solution, disregard… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

  8. Safeguarding Physical Sneaker Sale Through a Decentralized Medium

    Authors: Marwan Zeggari, Aydin Abadi, Renaud Lambiotte, Mohamad Kassab

    Abstract: Sneakers were designated as the most counterfeited fashion item online, with three times more risk in a trade than any other fashion purchase. As the market expands, the current sneaker scene displays several vulnerabilities and trust flaws, mostly related to the legitimacy of assets or actors. In this paper, we investigate various blockchain-based mechanisms to address these large-scale trust iss… ▽ More

    Submitted 9 June, 2023; v1 submitted 20 May, 2023; originally announced June 2023.

    Comments: 27 pages, 6 figures, 7 tables

  9. arXiv:2301.03889  [pdf, other

    cs.CR

    Earn While You Reveal: Private Set Intersection that Rewards Participants

    Authors: Aydin Abadi

    Abstract: In Private Set Intersection protocols (PSIs), a non-empty result always reveals something about the private input sets of the parties. Moreover, in various variants of PSI, not all parties necessarily receive or are interested in the result. Nevertheless, to date, the literature has assumed that those parties who do not receive or are not interested in the result still contribute their private inp… ▽ More

    Submitted 26 April, 2024; v1 submitted 10 January, 2023; originally announced January 2023.

    Comments: 54 pages

  10. arXiv:2210.08372  [pdf, other

    cs.GT cs.CR

    An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version)

    Authors: Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab

    Abstract: While online interactions and exchanges have grown exponentially over the past decade, most commercial infrastructures still operate through centralized protocols, and their success essentially depends on trust between different economic actors. Digital advances such as blockchain technology has led to a massive wave of \textit{Decentralized Ledger Technology} (\textit{DLT}) initiatives, protocols… ▽ More

    Submitted 5 November, 2022; v1 submitted 15 October, 2022; originally announced October 2022.

    Comments: 62 pages, 9 figures, 19 tables

  11. arXiv:2208.09525  [pdf, ps, other

    cs.CR cs.CY

    Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform

    Authors: Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win

    Abstract: The highly transmissible COVID-19 disease is a serious threat to people's health and life. To automate tracing those who have been in close physical contact with newly infected people and/or to analyse tracing-related data, researchers have proposed various ad-hoc programs that require being executed on users' smartphones. Nevertheless, the existing solutions have two primary limitations: (1) lack… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

  12. arXiv:2208.02877  [pdf, other

    cs.CR

    A Forward-secure Efficient Two-factor Authentication Protocol

    Authors: Steven J. Murdoch, Aydin Abadi

    Abstract: Two-factor authentication (2FA) schemes that rely on a combination of knowledge factors (e.g., PIN) and device possession have gained popularity. Some of these schemes remain secure even against strong adversaries that (a) observe the traffic between a client and server, and (b) have physical access to the client's device, or its PIN, or breach the server. However, these solutions have several sho… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  13. arXiv:2208.00283  [pdf, other

    cs.CR

    Recurring Contingent Service Payment

    Authors: Aydin Abadi, Steven J. Murdoch, Thomas Zacharias

    Abstract: Fair exchange protocols let two mutually distrustful parties exchange digital data in a way that neither party can cheat. They have various applications such as the exchange of digital items, or the exchange of digital coins and digital services between a buyer/client and seller/server. In this work, we formally define and propose a generic blockchain-based construction called "Recurring Conting… ▽ More

    Submitted 5 April, 2023; v1 submitted 30 July, 2022; originally announced August 2022.

  14. arXiv:2105.03099  [pdf

    cs.PL

    NoCFG: A Lightweight Approach for Sound Call Graph Approximation

    Authors: Aharon Abadi, Bar Makovitzki, Ron Shemer, Shmuel Tyszberowicz

    Abstract: Interprocedural analysis refers to gathering information about the entire program rather than for a single procedure only, as in intraprocedural analysis. Interprocedural analysis enables a more precise analysis; however, it is complicated due to the difficulty of constructing an accurate program call graph. Current algorithms for constructing sound and precise call graphs analyze complex program… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

  15. arXiv:2102.07718  [pdf

    cs.LG cs.AI

    TI-Capsule: Capsule Network for Stock Exchange Prediction

    Authors: Ramin Mousa, Sara Nazari, Ali Karhe Abadi, Reza Shoukhcheshm, Mohammad Niknam Pirzadeh, Leila Safari

    Abstract: Today, the use of social networking data has attracted a lot of academic and commercial attention in predicting the stock market. In most studies in this area, the sentiment analysis of the content of user posts on social networks is used to predict market fluctuations. Predicting stock marketing is challenging because of the variables involved. In the short run, the market behaves like a voting m… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

  16. arXiv:1310.1506  [pdf

    cs.SE

    Codeless Screen-Oriented Programming for Enterprise Mobile Applications

    Authors: Aharon Abadi, Yael Dubinsky, Andrei Kirshin, Yossi Mesika, Idan Ben-Harrush

    Abstract: Designing the user interface (UI) of mobile applications in the enterprise is performed in many cases by the application users who represent the business needs. This is based on existing developed enterprise services that can be accessed by these applications. Design the UI of the mobile applications require programming environments that are as much as possible codeless and easy to use. In this pa… ▽ More

    Submitted 5 October, 2013; originally announced October 2013.

    Comments: 6 pages, 16 figures, PROMOTO Workshop in SPLASH'13

    Report number: PrMoTo/2013/02 ACM Class: D.2.2; D.2.6