Title: It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption (accepted as a poster)
Authors: Alexandros Bakas and Antonis Michalas
Venue: Proceedings of the 21st International Conference on Cryptology and Network Security (CANS’22), Abu Dhabi, UAE, November 13–16, 2022.
Alexandros Bakas
- Doctoral Researcher
- Faculty of Information Technology and Communication Sciences
- Tampere University
- +358504478482
- alexandros.bakas@tuni.fi
Field of expertise
Appled Cryptography, Operations on Encrypted Data, Functional Encryption, Searchable Encryption, Differential Privacy
Antonios Michalas
- Associate Professor
- Cyber security
- Faculty of Information Technology and Communication Sciences
- Tampere University
- +358504478399
- antonios.michalas@tuni.fi
About me
I received my PhD in Provable Security and Privacy from Aalborg University, Denmark and I currently work as an Associate Professor at the Department of Computing Sciences where I also lead the Network and Information Security group (NISEC). The group comprises PhD students, professors a nd researchers. Group members conduct research in areas spanning from the theoretical foundations of cryptography to the design and implementation of leading-edge efficient and secure communication protocols. Apart from my research work at NISEC, as an associate professor, I am actively involved in the teaching activities of the University. Finally, my role expands to student supervision and research project coordination.
You can find more information on my profile and my latest activities at www.amichalas.com
Field of expertise
- Applied Cryptography;
- Operations on Encrypted Data;
- Privacy Enhancing Technologies;
- Privacy-Preserving Machine Learning;
- and...anything that looks interesting!
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning
Khan, T., Nguyen, K. & Michalas, A., 2024, Secure IT Systems: 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings. Fritsch, L., Hassan, I. & Paintsil, E. (toim.). Cham: Springer, s. 307-329 23 Sivumäärä (Lecture Notes in Computer Science; Vuosikerta 14324).Tutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption
Nuoskala, C., Rabbaninejad, R., Dimitriou, T. & Michalas, A., kesäk. 2024, Proceedings of the 29th ACM Symposium on Access Control Models and Technologies (SACMAT 2024). ACM, s. 183-191 9 SivumääräTutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu
GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption
Frimpong, E., Nguyen, K., Budzys, M., Khan, T. & Michalas, A., 2024, Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing (SAC '24). ACM, s. 953-962 10 SivumääräTutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu
Learning in the Dark: Privacy-Preserving Machine Learning using Function Approximation
Khan, T. & Michalas, A., 2024, Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom/BigDataSE/CSE/EUC/iSCI 2023. Hu, J., Min, G. & Wang, G. (toim.). IEEE, s. 62-71 10 Sivumäärä (IEEE International Conference on Trust, Security and Privacy in Computing and Communications).Tutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning
Khan, T., Budzys, M. & Michalas, A., 24 kesäk. 2024, Proceedings of the 29th ACM Symposium on Access Control Models and Technologies (SACMAT 2024). ACM, s. 19-30 12 SivumääräTutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu
Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices
Frimpong, E., Bakas, A., Foucault, C. & Michalas, A., 2024, Proceedings of the 9th International Conference on Internet of Things, Big Data and Security, IoTBDS 2024. Kobusinska, A., Jacobsson, A. & Chang, V. (toim.). Science and Technology Publications (SciTePress), s. 62-74 13 Sivumäärä (International Conference on Internet of Things, Big Data and Security, IoTBDS - Proceedings).Tutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training
Khan, T., Budzys, M., Nguyen, K. & Michalas, A., heinäk. 2024, Proceedings on Privacy Enhancing Technologies. 3 toim. Vuosikerta 2024. s. 144-164 21 SivumääräTutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu
Split Without a Leak: Reducing Privacy Leakage in Split Learning
Nguyen, K., Khan, T. & Michalas, A., 2024, Security and Privacy in Communication Networks - 19th EAI International Conference, SecureComm 2023, Proceedings. Duan, H., Debbabi, M., de Carné de Carnavalet, X., Luo, X., Au, M. H. A. & Du, X. (toim.). Springer, s. 321-344 24 Sivumäärä (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Vuosikerta 568 LNICST).Tutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu
stoRNA: Stateless Transparent Proofs of Storage-time
Rabaninejad, R., Abdolmaleki, B., Malavolta, G., Michalas, A. & Nabizadeh, A., 2024, Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, 2023, Proceedings. Tsudik, G., Conti, M., Liang, K. & Smaragdakis, G. (toim.). Springer, s. 389-410 22 Sivumäärä (Lecture Notes in Computer Science; Vuosikerta 14346 LNCS).Tutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu
Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum
Kiss, T., Ullah, A., Terstyanszky, G., Kao, O., Becker, S., Verginadis, Y., Michalas, A., Stankovski, V., Kertesz, A., Ricci, E., Altmann, J., Egger, B., Tusa, F., Kovacs, J. & Lovas, R., 2024, Advanced Information Networking and Applications: Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 5. Springer, Vuosikerta 5. s. 89-100 12 Sivumäärä (Lecture Notes on Data Engineering and Communications Technologies; Vuosikerta 203).Tutkimustuotos: Konferenssiartikkeli › Tieteellinen › vertaisarvioitu