Marina Blanton's Publications

All publications listed in reverse chronological order.
[BMY24]
M. Blanton, D. Murphy, and C. Yuan, Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2024, No. 1, 2024.

[RBGZ23]
A. Rathore, M. Blanton, M. Gaboardi, and L. Ziarek, A Formal Model for Secure Multiparty Computation, arXiv Report 2306.00303, 2023.
[BBZ22]
A. Baccarini, M. Blanton and S. Zou, Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation, arXiv Report 2209.10457, 2022.
[BGY23]
M. Blanton, M. Goodrich, and C. Yuan, Secure and Accurate Summation of Many Floating-Point Numbers, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 2, 2023.
[BBY23]
A. Baccarini, M. Blanton, and C. Yuan, Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 1, 2023. Also ePrint Archive Report 2020/1577.

[BY22]
M. Blanton and C. Yuan, Binary Search in Secure Computation, Network and Distributed System Security Symposium (NDSS), 2022. Full version is available as ePrint Archive Report 2021/1049.

[BKY20]
M. Blanton, A. Kang, and C. Yuan, Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority, International Conference on Applied Cryptography and Network Security (ACNS), pp. 377-397, 2020. Full version is available as ePrint Archive Report 2019/718.

[SBB19]
M. Samadani, M. Berenjkoub, and M. Blanton, Secure Pattern Matching Based on Bit Parallelism: Non-interactive Protocols for Non-deterministic String Matching Automata Evaluation, International Journal of Information Security, Vol. 18, No. 3, pp. 371-391, 2019.

[BJ18]
M. Blanton and M. Jeong, Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs, European Symposium on Research in Computer Security (ESORICS), Sep. 2018. Full version is available as ePrint Archive Report 2018/736.
[BKKZ18]
M. Blanton, A. Kang, S. Karan, and J. Zola, Privacy Preserving Analytics on Distributed Medical Data, arXiv Report 1806.06477, 2018.
[SRBW18]
Z. Shan, K. Ren, M. Blanton, and C. Wang, Practical Secure Computation Outsourcing: A Survey, ACM Computing Surveys, Vol. 51, No. 2, Article 31, 40 pages, 2018.
[ZBA18]
Y. Zhang, M. Blanton, and G. Almashaqbeh, Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler, ACM Transactions on Privacy and Security (TOPS), Vol. 21, No. 2, Article 6, 33 pages, 2018. Full version is available as arXiv Report 1509.01763.

[ZBB17]
Y. Zhang, M. Blanton, and F. Bayatbabolghani, Enforcing Input Correctness via Certification in Garbled Circuit Evaluation, European Symposium on Research in Computer Security (ESORICS), pp. 552-569, Sep. 2017. Also available as ePrint Archive Report 2017/569.
[BB17]
M. Blanton and F. Bayatbabolghani, Improving the Security and Efficiency of Private Genomic Computation using Server Aid, IEEE Security and Privacy, Vol. 15, No. 5, pp. 20-28, Sep./Oct. 2017.
[BBAG17]
F. Bayatbabolghani, M. Blanton, M. Aliasgari, and M. Goodrich, Secure Fingerprint Alignment and Matching Protocols, arXiv Report 1702.03379, 2017.
[ABB17]
M. Aliasgari, M. Blanton, and F. Bayatbabolghani, Secure Computation of Hidden Markov Models and Secure Floating-Point Arithmetic in the Malicious Model, International Journal of Information Security, Vol. 16, No. 6, pp. 577-601, 2017. Supersedes [AB13].

[DB16]
J. DeBenedetto and M. Blanton, Optimizing Secure Statistical Computations with PICCO, arXiv Report 1612.08678, 2016.
[SBB16]
A. Shahbazi, F. Bayatbabolghani, and M. Blanton, Private Computation with Genomic Data for Genome-Wide Association and Linkage Studies, International Workshop on Genomic Privacy and Security (GenoPri), Nov. 2016.
[BA16]
M. Blanton and E. Aguiar, Private and Oblivious Set and Multiset Operations, International Journal of Information Security, Vol. 15, No. 5, pp. 493-518, Oct. 2016. Supersedes [BA12b].
[BB16]
M. Blanton and F. Bayatbabolghani, Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation, Proceedings on Privacy Enhancing Technologies (PoPETs), No. 4, 21 pages, 2016. Also in Privacy Enhancing Technologies Symposium (PETS), Jul. 2016. Full version is available as ePrint Archive Report 2015/422.
[ZB16]
Y. Zhang and M. Blanton, Efficient Dynamic Provable Possession of Remote Data via Update Trees, ACM Transactions on Storage (TOS), Vol. 12, No. 2, Article 9, 45 pages, Feb. 2016. Supersedes [ZB13].

[ZBA15]
Y. Zhang, M. Blanton, and G. Almashaqbeh, Secure Distributed Genome Analysis for GWAS and Sequence Comparison Computation, special issue of BMC Medical Informatics and Decision Making Journal, Vol. 15, Suppl. 5, Art. S5, Dec. 2015.
[BS15]
M. Blanton and S. Saraph, Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification, European Symposium on Research in Computer Security (ESORICS'15), Sep. 2015. Full version is available as ePrint Archive Report 2014/596.
[BG15]
M. Blanton and P. Gasti, Secure and Efficient Iris and Fingerprint Identification, Chapter 9 in Biometric Security, D. Ngo, A. Teoh, and J. Hu (Editors), Cambridge Scholars Publishing, Jan. 2015. Supersedes [BG11].

[ZB14]
Y. Zhang and M. Blanton, Efficient Secure and Verifiable Outsourcing of Matrix Multiplications, Information Security Conference (ISC'14), Oct. 2014. Full version is available as ePrint Archive Report 2014/133.
[AZB14]
E. Aguiar, Y. Zhang, and M. Blanton, An Overview of Issues and Recent Developments in Cloud Computing and Storage Security, Chapter in High Performance Cloud Auditing and Applications, B.-Y. Choi, K. Han, and S. Song (Editors), Springer, 2014.

[BZF13]
M. Blanton, Y. Zhang, and K. Frikken, Secure and Verifiable Outsourcing of Large-Scale Biometric Computations, ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Nov. 2013. Supersedes [BZF11].
[ZSB13]
Y. Zhang, A. Steele, and M. Blanton, PICCO: A General-Purpose Compiler for Private Distributed Computation, ACM Conference on Computer and Communications Security (CCS'13), Nov. 2013. Source code is available from GitHub.
[BA13]
M. Blanton and M. Aliasgari, Analysis of Reusability of Secure Sketches and Fuzzy Extractors, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 8, No. 9, pp. 1433-1445, Sep. 2013. Extends [BA11]. Full version is available as ePrint Archive Report 2012/608.
[HBSC13]
T. R. Hoens, M. Blanton, A. Steele, and N. Chawla, Reliable Medical Recommendation Systems with Patient Privacy, ACM Transactions on Intelligent Systems and Technology (TIST), Special Issue on Intelligent Systems for Health Informatics, Vol. 4, No. 4, 31 pages, Sep. 2013. Supersedes [HBC10].
[AB13]
M. Aliasgari and M. Blanton, Secure Computation of Hidden Markov Models, International Conference on Security and Cryptography (SECRYPT'13), Jul. 2013.
[ZB13]
Y. Zhang and M. Blanton, Efficient Dynamic Provable Possession of Remote Data via Balanced Update Trees, ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), May 2013. Superseded by [ZB16].
[BSA13]
M. Blanton, A. Steele, and M. Aliasgari, Data-Oblivious Graph Algorithms for Secure Computation and Outsourcing, ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), May 2013.
[ABZS13]
M. Aliasgari, M. Blanton, Y. Zhang, and A. Steele, Secure Computation on Floating Point Numbers, Network and Distributed System Security Symposium (NDSS'13), Feb. 2013.

[BAFM12]
M. Blanton, M. Atallah, K. Frikken, and Q. Malluhi, Secure and Efficient Outsourcing of Sequence Comparisons, European Symposium on Research in Computer Security (ESORICS'12), pp. 505-522, Sep. 2012.
[BA12b]
M. Blanton and E. Aguiar, Private and Oblivious Set and Multiset Operations, ACM Symposium on Information, Computer and Communications Security (ASIACCS'12), May 2012.
[BA12a]
M. Blanton and M. Aliasgari, Secure Outsourced Computation of Iris Matching, Journal of Computer Security, Vol. 20, No. 2-3, pp. 259-305, 2012.

[BZF11]
M. Blanton, Y. Zhang, and K. Frikken, Secure and Verifiable Outsourcing of Large-Scale Biometric Computations, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'11), Oct. 2011. Superseded by [BZF13].
[B11]
M. Blanton, Achieving Full Security in Privacy-Preserving Data Mining, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'11), Oct. 2011.
[BG11]
M. Blanton and P. Gasti, Secure and Efficient Protocols for Iris and Fingerprint Identification, European Symposium on Research in Computer Security (ESORICS'11), Sep. 2011. Superseded by [BG15].
[BA11]
M. Blanton and M. Aliasgari, On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting, International Conference on Security and Cryptography (SECRYPT'11), Jul. 2011. Full version is available as ePrint Archive Report 2012/608. Extended analysis is available in [BA13].
[DSA+11]
V. Deshpande, L. Schwarz, M. Atallah, M. Blanton, and K. Frikken, Outsourcing Manufacturing: Secure Price-Masking Mechanisms for Purchasing Component Parts, Production and Operations Management (POMS), Vol. 20, No. 2, Mar. 2011.

[HBC10]
T. R. Hoens, M. Blanton, and N. Chawla, Reliable Medical Recommendation Systems with Patient Privacy, ACM International Health Informatics Symposium (IHI'10), Nov. 2010. Superseded by [HBSC13].
[GAB10]
P. Gasti, G. Ateniese, and M. Blanton, Deniable Cloud Storage: Sharing Files via Public-Key Deniability, ACM Workshop on Privacy in the Electronic Society (WPES'10), Oct. 2010.
[BF10]
M. Blanton and K. Frikken, Efficient Multi-Dimensional Key Management in Broadcast Services, European Symposium on Research in Computer Security (ESORICS'10), Sep. 2010.
[HBC10]
T. R. Hoens, M. Blanton, and N. Chawla, A Private and Reliable Recommendation System for Social Networks, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'10), Aug. 2010.
[BA10]
M. Blanton and M. Aliasgari, Secure Outsourcing of DNA Searching via Finite Automata, Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'10), Jun. 2010.
[RBCF10]
T. Raeder, M. Blanton, N. Chawla, and K. Frikken, Privacy-Preserving Network Aggregation, Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD'10), Jun. 2010.

[BH09]
M. Blanton and W. Hudelson, Biometric-Based Non-Transferable Anonymous Credentials, International Conference on Information and Communications Security (ICICS'09), Dec. 2009.
[FBA09]
K. Frikken, M. Blanton, and M. Atallah, Robust Authentication Using Physically Unclonable Functions, Information Security Conference (ISC'09), Sep. 2009.
[AB09a]
M. Atallah and M. Blanton (Editors), Algorithms and Theory of Computation Handbook. Volume I: General Concepts and Techniques, Chapman & Hall/CRC, 2009.
[AB09b]
M. Atallah and M. Blanton (Editors), Algorithms and Theory of Computation Handbook. Volume II: Special Topics and Techniques, Chapman & Hall/CRC, 2009.
[B09a]
M. Blanton, Authentication, Regular Entry in Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors), 2009.
[B09b]
M. Blanton, Hash Functions, Short Entry in Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors), 2009.
[B09c]
M. Blanton, Message Authentication Codes, Short Entry in Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors), 2009.
[BRM+09]
S. Byun, C. Ruffini, J. Mills, A. Douglas, M. Niang, S. Stepchenkova, S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research, CyberPsychology & Behavior, Vol. 12, No. 2, Apr. 2009.
[BA09]
M. Blanton and M. Aliasgari, Secure Computation of Biometric Matching, CSE Technical Report TR 2009-03, University of Notre Dame, Apr. 2009. Superseded by [BA12a].
[ABFF09]
M. Atallah, M. Blanton, N. Fazio, and K. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, ACM Transactions on Information and System Security (TISSEC), Vol. 12, No. 3, Jan. 2009. Supersedes [AFB05] and [ABF06].

[CRBF08]
N. Chawla, T. Raeder, M. Blanton, and K. Frikken, Modeling the Product Space as a Network, NET Institute Working Paper No. 08-18, SSRN, Oct. 2008.
[DMN+08]
A. Douglas, J. Mills, M. Niang, S. Stepchenkova, S. Byun, C. Ruffini, S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet Addiction: Meta-Synthesis of Qualitative Research for the Decade 1996-2006, Computer in Human Behavior, Vol. 24, No. 6, Sep. 2008.
[B08a]
M. Blanton, Improved Conditional E-Payments, Applied Cryptography and Network Security (ACNS'08), Jun. 2008.
[AFBC08]
M. Atallah, K. Frikken, M. Blanton, and Y. Cho, Private Combinatorial Group Testing, ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), Mar. 2008.
[B08b]
M. Blanton, Online Subscriptions with Anonymous Access, ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), Mar. 2008.

[ABF07]
M. Atallah, M. Blanton, and K. Frikken, Incorporating Temporal Capabilities in Existing Key Management Schemes, European Symposium on Research in Computer Security (ESORICS'07), Sep. 2007. Full version is available as ePrint Archive Report 2007/245.
[ABGP07]
M. Atallah, M. Blanton, M. Goodrich, and S. Polu, Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric, Workshop on Algorithms and Data Structures (WADS'07), Aug. 2007.
[B07]
M. Blanton, Key Management in Hierarchical Access Control Systems, PhD Thesis, Purdue University, Aug. 2007.
[ABF07]
M. Atallah, M. Blanton, and K. Frikken, Efficient Techniques for Realizing Geo-Spatial Access Control, ACM Symposium on Information, Computer and Communications Security (ASIACCS'07), Mar. 2007.
[ABK07]
G. Ateniese, M. Blanton, and J. Kirsch, Secret Handshakes with Dynamic and Fuzzy Matching , Network and Distributed System Security Symposuim (NDSS'07), Feb. 2007.

[BA06]
M. Blanton and M. Atallah, Succinct Representation of Flexible and Privacy-Preserving Access Rights, Special Issue (Privacy-Preserving Data Management) of the International Journal on Very Large Data Bases (VLDBJ), Vol. 15, No. 4, Nov. 2006. Supersedes [AB04] and [BA05].
[ABD+06]
M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L. Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR), Multi-Echelon/Public Applications of Supply Chain Management Conference, Jun. 2006.
[ABF06]
M. Atallah, M. Blanton, and K. Frikken, Key Management for Non-Tree Access Hierarchies, ACM Symposium on Access Control Models and Technologies (SACMAT'06), Jun. 2006. Superseded by [ABFF09].
[ABFL06]
M. Atallah, M. Blanton, K. Frikken, and J. Li, Efficient Correlated Action Selection, Financial Cryptography and Data Security (FC'06), Feb. 2006.

[AFB05]
M. Atallah, K. Frikken, and M. Blanton, Dynamic and Efficient Key Management for Access Hierarchies, ACM Conference on Computer and Communications Security (CCS'05), Nov. 2005. Superseded by [ABFF09].
[B05]
M. Blanton, Empirical Evaluation of Secure Two-Party Computation Models, CERIAS Technical Report TR 2005-58, Purdue University, Aug. 2005.
[ABD+05]
M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L. Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR), Manufacturing and Service Operation Management (M&SOM), Jun. 2005.
[BA05]
M. Blanton and M. Atallah, Provable Bounds for Portable and Flexible Privacy-Preserving Access Rights, ACM Symposium on Access Control Models and Technologies (SACMAT'05), Jun. 2005. Superseded by [BA06].
[FAB05]
K. Frikken, M. Atallah, and M. Bykova, Remote Revocation of Smart Cards in a Private DRM System, Australasian Information Security Workshop (AISW'05), Digital Rights Management, Jan. 2005.

[ABL+04]
M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, Private Collaborative Forecasting and Benchmarking, ACM Workshop on Privacy in the Electronic Society (WPES'04), Oct. 2004.
[B04]
M. Bykova, What Should a Good Security Model Be? CERIAS Technical Report TR 2004-38, Purdue University, Sep. 2004.
[AB04]
M. Atallah and M. Bykova, Portable and Flexible Document Access Control Mechanisms, European Symposium on Research in Computer Security (ESORICS'04), Sep. 2004. Superseded by [BA06].
[BA04]
M. Bykova and M. Atallah, Succinct Specifications of Portable Document Access Policies, ACM Symposium on Access Control Models and Technologies (SACMAT'04), Jun. 2004.

[BO02]
M. Bykova and S. Ostermann, Statistical Analysis of Malformed Packets and Their Origins in the Modern Internet, ACM Internet Measurent Workshop (IMW 2002), Nov. 2002.
[B02]
M. Bykova, Statistical Analysis of Malformed Packets and Their Origins in the Modern Internet, Master's Thesis, Ohio University, Mar. 2002.

[BTO+01]
R. Balupari, B. Tjaden, S. Ostermann, M. Bykova, and A. Mitchell, Real-Time Network-Based Anomaly Intrusion Detection, Special Issue (Real Time Security) of the Journal of Parallel and Distributed Computing Practices, Vol. 4, No. 2, Jun. 2001.
[BOT01]
M. Bykova, S. Ostermann, and B. Tjaden, Detecting Network Intrusions via a Statistical Analysis of Network Packet Characteristics, IEEE Southeastern Symposium on System Theory (SSST 2001), Mar. 2001.