Tommaso Pignata

Learn More
Biometric-based access control is receiving increasing attention due to its security and ease-of-use. However, concerns are often raised regarding the protection of the privacy of enrolled users. Signal processing in the encrypted domain has been proposed as a viable solution to protect biometric templates and the privacy of the users. In particular,(More)
While in theory any computable functions can be evaluated in a Secure Two Party Computation (STPC) framework, practical applications are often limited for complexity reasons and by the kind of operations that the available cryptographic tools permit. In this paper we propose an algorithm that, given a function f() and an interval belonging to its domain,(More)
While Secure Multy-Party Computation is a well known solution for cooperative function evaluation on private inputs, few solutions exist that also permit to protect the to-be-evaluated function. In this paper, we propose a solution, based on Garbled Circuit (GC) theory, to provide Secure Function Evaluation of semi-Private Functions through Piecewise Linear(More)
The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. Of equal importance are the privacy and efficiency of techniques to first, identify those individuals for(More)
In cloud computing, computation is demanded to several cloud computing servers and each of them can have access to different data sets. Such data and also the derived computation results could not be publicly shared among the clouds involved for privacy reasons. Secure Multi-Party Computation (SMPC) protocols could be used to protect private data during(More)
We present two secure two party computation (STPC) protocols for piecewise function approximation on private data. The protocols rely on a piecewise approximation of the to-be-computed function easing the implementation in an STPC setting. The first protocol relies entirely on garbled circuits (GCs), while the second one exploits a hybrid construction where(More)
  • 1