Marina Blanton's Publications
All publications listed in reverse chronological order.
- [BMY24]
- M. Blanton, D. Murphy, and C. Yuan, Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2024, No. 1, 2024.
- [RBGZ23]
- A. Rathore, M. Blanton, M. Gaboardi, and L. Ziarek, A Formal Model for Secure Multiparty Computation, arXiv Report 2306.00303, 2023.
- [BBZ22]
- A. Baccarini, M. Blanton and S. Zou, Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation, arXiv Report 2209.10457, 2022.
- [BGY23]
- M. Blanton, M. Goodrich, and C. Yuan, Secure and Accurate Summation of Many Floating-Point Numbers, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 2, 2023.
- [BBY23]
- A. Baccarini, M. Blanton, and C. Yuan, Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 1, 2023. Also ePrint Archive Report 2020/1577.
- [BY22]
- M. Blanton and C. Yuan, Binary Search in Secure
Computation, Network and Distributed System Security Symposium (NDSS), 2022. Full version is available as ePrint Archive Report 2021/1049.
- [BKY20]
- M. Blanton, A. Kang, and C. Yuan, Improved
Building Blocks for Secure Multi-party Computation Based on Secret Sharing
with Honest Majority, International Conference on Applied
Cryptography and Network Security (ACNS), pp. 377-397, 2020. Full version is available as ePrint Archive Report 2019/718.
- [SBB19]
- M. Samadani, M. Berenjkoub, and M. Blanton, Secure Pattern Matching Based on Bit
Parallelism: Non-interactive Protocols for Non-deterministic String
Matching Automata Evaluation, International Journal of
Information Security, Vol. 18, No. 3, pp. 371-391, 2019.
- [BJ18]
- M. Blanton and M. Jeong, Improved Signature Schemes for Secure
Multi-Party Computation with Certified Inputs, European Symposium
on Research in Computer Security (ESORICS), Sep. 2018. Full version is
available as ePrint Archive Report
2018/736.
- [BKKZ18]
- M. Blanton, A. Kang, S. Karan, and J. Zola, Privacy Preserving Analytics on
Distributed Medical Data, arXiv Report 1806.06477, 2018.
- [SRBW18]
- Z. Shan, K. Ren, M. Blanton, and C. Wang, Practical
Secure Computation Outsourcing: A Survey, ACM Computing
Surveys, Vol. 51, No. 2, Article 31, 40 pages, 2018.
- [ZBA18]
- Y. Zhang, M. Blanton, and G. Almashaqbeh, Implementing
Support for Pointers to Private Data in a General-Purpose Secure Multi-Party
Compiler, ACM Transactions on Privacy and Security (TOPS),
Vol. 21, No. 2, Article 6, 33 pages, 2018. Full version is available as arXiv Report 1509.01763.
- [ZBB17]
- Y. Zhang, M. Blanton, and F. Bayatbabolghani, Enforcing Input Correctness via Certification in
Garbled Circuit Evaluation, European Symposium on Research in
Computer Security (ESORICS), pp. 552-569, Sep. 2017. Also available as
ePrint Archive Report
2017/569.
- [BB17]
- M. Blanton and F. Bayatbabolghani, Improving the Security and
Efficiency of Private Genomic Computation using Server Aid, IEEE
Security and Privacy, Vol. 15, No. 5, pp. 20-28, Sep./Oct. 2017.
- [BBAG17]
- F. Bayatbabolghani, M. Blanton, M. Aliasgari, and M. Goodrich, Secure Fingerprint Alignment and
Matching Protocols, arXiv Report 1702.03379, 2017.
- [ABB17]
- M. Aliasgari, M. Blanton, and F. Bayatbabolghani, Secure Computation of Hidden Markov Models and Secure
Floating-Point Arithmetic in the Malicious Model, International
Journal of Information Security, Vol. 16, No. 6, pp. 577-601, 2017. Supersedes [AB13].
- [DB16]
- J. DeBenedetto and M. Blanton, Optimizing Secure Statistical
Computations with PICCO, arXiv Report 1612.08678, 2016.
- [SBB16]
- A. Shahbazi, F. Bayatbabolghani, and M. Blanton, Private Computation with Genomic Data for Genome-Wide
Association and Linkage Studies, International Workshop on
Genomic Privacy and Security (GenoPri), Nov. 2016.
- [BA16]
- M. Blanton and E. Aguiar, Private and Oblivious
Set and Multiset Operations, International Journal of Information
Security, Vol. 15, No. 5, pp. 493-518, Oct. 2016. Supersedes
[BA12b].
- [BB16]
- M. Blanton and F. Bayatbabolghani, Efficient
Server-Aided Secure Two-Party Function Evaluation with Applications to
Genomic Computation, Proceedings on Privacy Enhancing
Technologies (PoPETs), No. 4, 21 pages, 2016. Also in Privacy
Enhancing Technologies Symposium (PETS), Jul. 2016. Full version
is available as ePrint
Archive Report 2015/422.
- [ZB16]
- Y. Zhang and M. Blanton, Efficient Dynamic
Provable Possession of Remote Data via Update Trees, ACM
Transactions on Storage (TOS), Vol. 12, No. 2, Article 9, 45 pages, Feb.
2016. Supersedes [ZB13].
- [ZBA15]
- Y. Zhang, M. Blanton, and G. Almashaqbeh, Secure Distributed Genome Analysis for GWAS and Sequence
Comparison Computation, special issue of BMC Medical
Informatics and Decision Making Journal, Vol. 15, Suppl. 5, Art. S5,
Dec. 2015.
- [BS15]
- M. Blanton and S. Saraph, Secure and Oblivious Maximum Bipartite
Matching Size Algorithm with Applications to Secure Fingerprint
Identification, European Symposium on Research in Computer
Security (ESORICS'15), Sep. 2015. Full version is available as ePrint Archive Report
2014/596.
- [BG15]
- M. Blanton and P. Gasti, Secure and
Efficient Iris and Fingerprint Identification, Chapter 9 in
Biometric Security, D. Ngo, A. Teoh, and J. Hu (Editors), Cambridge
Scholars Publishing, Jan. 2015. Supersedes [BG11].
- [ZB14]
- Y. Zhang and M. Blanton, Efficient Secure and
Verifiable Outsourcing of Matrix Multiplications, Information
Security Conference (ISC'14), Oct. 2014. Full version is available as
ePrint Archive Report
2014/133.
- [AZB14]
- E. Aguiar, Y. Zhang, and M. Blanton, An
Overview of Issues and Recent Developments in Cloud Computing and Storage
Security, Chapter in High Performance Cloud Auditing and
Applications, B.-Y. Choi, K. Han, and S. Song (Editors), Springer,
2014.
- [BZF13]
- M. Blanton, Y. Zhang, and K. Frikken, Secure
and Verifiable Outsourcing of Large-Scale Biometric Computations,
ACM Transactions on Information and System Security (TISSEC), Vol.
16, No. 3, Nov. 2013. Supersedes [BZF11].
- [ZSB13]
- Y. Zhang, A. Steele, and M. Blanton, PICCO: A
General-Purpose Compiler for Private Distributed Computation,
ACM Conference on Computer and Communications Security (CCS'13),
Nov. 2013. Source code is available from GitHub.
- [BA13]
- M. Blanton and M. Aliasgari, Analysis of
Reusability of Secure Sketches and Fuzzy Extractors, IEEE
Transactions on Information Forensics and Security (TIFS), Vol. 8, No.
9, pp. 1433-1445, Sep. 2013. Extends [BA11]. Full version is available as ePrint Archive Report
2012/608.
- [HBSC13]
- T. R. Hoens, M. Blanton, A. Steele, and N. Chawla, Reliable Medical Recommendation Systems with Patient
Privacy, ACM Transactions on Intelligent Systems and Technology
(TIST), Special Issue on Intelligent Systems for Health Informatics,
Vol. 4, No. 4, 31 pages, Sep. 2013. Supersedes [HBC10].
- [AB13]
- M. Aliasgari and M. Blanton, Secure
Computation of Hidden Markov Models, International Conference
on Security and Cryptography (SECRYPT'13), Jul. 2013.
- [ZB13]
- Y. Zhang and M. Blanton, Efficient Dynamic
Provable Possession of Remote Data via Balanced Update Trees,
ACM Symposium on Information, Computer and Communications Security
(ASIACCS'13), May 2013. Superseded by [ZB16].
- [BSA13]
- M. Blanton, A. Steele, and M. Aliasgari, Data-Oblivious Graph Algorithms for Secure
Computation and Outsourcing, ACM Symposium on Information,
Computer and Communications Security (ASIACCS'13), May 2013.
- [ABZS13]
- M. Aliasgari, M. Blanton, Y. Zhang, and A. Steele, Secure Computation on Floating Point Numbers,
Network and Distributed System Security Symposium (NDSS'13), Feb.
2013.
- [BAFM12]
- M. Blanton, M. Atallah, K. Frikken, and Q. Malluhi, Secure and Efficient Outsourcing of Sequence
Comparisons, European Symposium on Research in Computer
Security (ESORICS'12), pp. 505-522, Sep. 2012.
- [BA12b]
- M. Blanton and E. Aguiar, Private and
Oblivious Set and Multiset Operations, ACM Symposium on
Information, Computer and Communications Security (ASIACCS'12), May
2012.
- [BA12a]
- M. Blanton and M. Aliasgari, Secure Outsourced
Computation of Iris Matching, Journal of Computer Security,
Vol. 20, No. 2-3, pp. 259-305, 2012.
- [BZF11]
- M. Blanton, Y. Zhang, and K. Frikken, Secure and Verifiable Outsourcing of Large-Scale
Biometric Computations, IEEE International Conference on
Information Privacy, Security, Risk and Trust (PASSAT'11), Oct.
2011. Superseded by [BZF13].
- [B11]
- M. Blanton, Achieving Full Security in
Privacy-Preserving Data Mining, IEEE International Conference
on Information Privacy, Security, Risk and Trust (PASSAT'11), Oct.
2011.
- [BG11]
- M. Blanton and P. Gasti, Secure and
Efficient Protocols for Iris and Fingerprint Identification,
European Symposium on Research in Computer Security (ESORICS'11),
Sep. 2011. Superseded by [BG15].
- [BA11]
- M. Blanton and M. Aliasgari, On the
(Non-)Reusability of Fuzzy Sketches and Extractors and Security in the
Computational Setting, International Conference on Security and
Cryptography (SECRYPT'11), Jul. 2011. Full version is available as
ePrint Archive Report
2012/608. Extended analysis is available in [BA13].
- [DSA+11]
- V. Deshpande, L. Schwarz, M. Atallah, M. Blanton, and K. Frikken,
Outsourcing Manufacturing: Secure Price-Masking Mechanisms for
Purchasing Component Parts, Production and Operations Management
(POMS), Vol. 20, No. 2, Mar. 2011.
- [HBC10]
- T. R. Hoens, M. Blanton, and N. Chawla, Reliable Medical Recommendation Systems with Patient
Privacy, ACM International Health Informatics Symposium
(IHI'10), Nov. 2010. Superseded by [HBSC13].
- [GAB10]
- P. Gasti, G. Ateniese, and M. Blanton, Deniable Cloud Storage: Sharing Files via Public-Key
Deniability, ACM Workshop on Privacy in the Electronic Society
(WPES'10), Oct. 2010.
- [BF10]
- M. Blanton and K. Frikken, Efficient
Multi-Dimensional Key Management in Broadcast Services,
European Symposium on Research in Computer Security (ESORICS'10),
Sep. 2010.
- [HBC10]
- T. R. Hoens, M. Blanton, and N. Chawla, A
Private and Reliable Recommendation System for Social Networks,
IEEE International Conference on Information Privacy, Security, Risk
and Trust (PASSAT'10), Aug. 2010.
- [BA10]
- M. Blanton and M. Aliasgari, Secure
Outsourcing of DNA Searching via Finite Automata, Annual IFIP
WG 11.3 Working Conference on Data and Applications Security
(DBSec'10), Jun. 2010.
- [RBCF10]
- T. Raeder, M. Blanton, N. Chawla, and K. Frikken,
Privacy-Preserving Network Aggregation,
Pacific-Asia Conference on Knowledge Discovery and Data Mining
(PAKDD'10), Jun. 2010.
- [BH09]
- M. Blanton and W. Hudelson, Biometric-Based
Non-Transferable Anonymous Credentials, International
Conference on Information and Communications Security (ICICS'09), Dec.
2009.
- [FBA09]
- K. Frikken, M. Blanton, and M. Atallah, Robust
Authentication Using Physically Unclonable Functions,
Information Security Conference (ISC'09), Sep. 2009.
- [AB09a]
- M. Atallah and M. Blanton (Editors), Algorithms and Theory of
Computation Handbook. Volume I: General Concepts and Techniques,
Chapman & Hall/CRC, 2009.
- [AB09b]
- M. Atallah and M. Blanton (Editors), Algorithms and Theory of
Computation Handbook. Volume II: Special Topics and Techniques,
Chapman & Hall/CRC, 2009.
- [B09a]
- M. Blanton, Authentication, Regular Entry in Encyclopedia of
Database Systems, L. Liu and T. Ozsu (Editors), 2009.
- [B09b]
- M. Blanton, Hash Functions, Short Entry in Encyclopedia of
Database Systems, L. Liu and T. Ozsu (Editors), 2009.
- [B09c]
- M. Blanton, Message Authentication Codes, Short Entry in
Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors),
2009.
- [BRM+09]
- S. Byun, C. Ruffini, J. Mills, A. Douglas, M. Niang, S. Stepchenkova,
S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet
Addiction: Metasynthesis of 1996-2006 Quantitative Research,
CyberPsychology & Behavior, Vol. 12, No. 2, Apr. 2009.
- [BA09]
- M. Blanton and M. Aliasgari, Secure Computation of
Biometric Matching, CSE Technical Report TR 2009-03, University of
Notre Dame, Apr. 2009. Superseded by [BA12a].
- [ABFF09]
- M. Atallah, M. Blanton, N. Fazio, and K. Frikken, Dynamic and Efficient Key Management for Access
Hierarchies, ACM Transactions on Information and System
Security (TISSEC), Vol. 12, No. 3, Jan. 2009. Supersedes [AFB05] and
[ABF06].
- [CRBF08]
- N. Chawla, T. Raeder, M. Blanton, and K. Frikken, Modeling the Product Space as a
Network, NET Institute Working Paper No. 08-18, SSRN, Oct.
2008.
- [DMN+08]
- A. Douglas, J. Mills, M. Niang, S. Stepchenkova, S. Byun, C. Ruffini,
S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet
Addiction: Meta-Synthesis of Qualitative Research for the Decade
1996-2006, Computer in Human Behavior, Vol. 24, No. 6, Sep.
2008.
- [B08a]
- M. Blanton, Improved Conditional
E-Payments, Applied Cryptography and Network Security
(ACNS'08), Jun. 2008.
- [AFBC08]
- M. Atallah, K. Frikken, M. Blanton, and Y. Cho, Private Combinatorial Group Testing, ACM
Symposium on Information, Computer and Communications Security
(ASIACCS'08), Mar. 2008.
- [B08b]
- M. Blanton, Online Subscriptions with
Anonymous Access, ACM Symposium on Information, Computer and
Communications Security (ASIACCS'08), Mar. 2008.
- [ABF07]
- M. Atallah, M. Blanton, and K. Frikken, Incorporating
Temporal Capabilities in Existing Key Management Schemes,
European Symposium on Research in Computer Security (ESORICS'07),
Sep. 2007. Full version is available as ePrint Archive Report
2007/245.
- [ABGP07]
- M. Atallah, M. Blanton, M. Goodrich, and S. Polu,
Discrepancy-Sensitive
Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest
Neighbors in Any Minkowski Metric, Workshop
on Algorithms and Data Structures (WADS'07), Aug. 2007.
- [B07]
- M. Blanton, Key Management in
Hierarchical Access Control Systems, PhD Thesis, Purdue
University, Aug. 2007.
- [ABF07]
- M. Atallah, M. Blanton, and K. Frikken, Efficient
Techniques for Realizing Geo-Spatial Access Control, ACM Symposium
on Information, Computer and Communications Security (ASIACCS'07),
Mar. 2007.
- [ABK07]
- G. Ateniese, M. Blanton, and J. Kirsch, Secret
Handshakes with Dynamic and Fuzzy Matching , Network and
Distributed System Security Symposuim (NDSS'07), Feb. 2007.
- [BA06]
- M. Blanton and M. Atallah, Succinct
Representation of Flexible and Privacy-Preserving Access Rights,
Special Issue (Privacy-Preserving Data Management) of the International
Journal on Very Large Data Bases (VLDBJ), Vol. 15, No. 4, Nov.
2006. Supersedes [AB04] and [BA05].
- [ABD+06]
- M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L.
Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment
(SCPFR), Multi-Echelon/Public Applications of Supply Chain Management
Conference, Jun. 2006.
- [ABF06]
- M. Atallah, M. Blanton, and K. Frikken, Key
Management for Non-Tree Access Hierarchies, ACM Symposium on Access
Control Models and Technologies (SACMAT'06), Jun. 2006. Superseded
by [ABFF09].
- [ABFL06]
- M. Atallah, M. Blanton, K. Frikken, and J. Li, Efficient
Correlated Action Selection, Financial Cryptography and Data
Security (FC'06), Feb. 2006.
- [AFB05]
- M. Atallah, K. Frikken, and M. Blanton, Dynamic
and Efficient Key Management for Access Hierarchies, ACM Conference
on Computer and Communications Security (CCS'05), Nov. 2005.
Superseded by [ABFF09].
- [B05]
- M. Blanton,
Empirical Evaluation of Secure Two-Party Computation Models, CERIAS
Technical Report TR 2005-58, Purdue University, Aug. 2005.
- [ABD+05]
- M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L.
Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment
(SCPFR), Manufacturing and Service Operation Management (M&SOM),
Jun. 2005.
- [BA05]
- M. Blanton and M. Atallah, Provable
Bounds for Portable and Flexible Privacy-Preserving Access Rights,
ACM Symposium on Access Control Models and Technologies
(SACMAT'05), Jun. 2005. Superseded by [BA06].
- [FAB05]
- K. Frikken, M. Atallah, and M. Bykova, Remote
Revocation of Smart Cards in a Private DRM System, Australasian
Information Security Workshop (AISW'05), Digital Rights Management,
Jan. 2005.
- [ABL+04]
- M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, Private Collaborative Forecasting and
Benchmarking, ACM Workshop on Privacy in the Electronic Society
(WPES'04), Oct. 2004.
- [B04]
- M. Bykova, What
Should a Good Security Model Be? CERIAS Technical
Report TR 2004-38, Purdue University, Sep. 2004.
- [AB04]
- M. Atallah and M. Bykova, Portable
and Flexible Document Access
Control Mechanisms, European Symposium on Research in Computer
Security (ESORICS'04), Sep. 2004. Superseded by [BA06].
- [BA04]
- M. Bykova and M. Atallah,
Succinct Specifications of Portable Document Access Policies, ACM
Symposium on Access Control Models and Technologies (SACMAT'04),
Jun. 2004.
- [BO02]
- M. Bykova and S. Ostermann, Statistical
Analysis of Malformed Packets and Their Origins in the Modern
Internet, ACM Internet Measurent Workshop (IMW 2002), Nov.
2002.
- [B02]
- M. Bykova, Statistical Analysis of
Malformed Packets and Their Origins in the Modern Internet,
Master's Thesis, Ohio University, Mar. 2002.
- [BTO+01]
- R. Balupari, B. Tjaden, S. Ostermann, M. Bykova, and A. Mitchell,
Real-Time Network-Based Anomaly Intrusion Detection, Special Issue (Real
Time Security) of the Journal of Parallel and Distributed Computing
Practices, Vol. 4, No. 2, Jun. 2001.
- [BOT01]
- M. Bykova, S. Ostermann, and B. Tjaden,
Detecting Network Intrusions via a Statistical Analysis of Network Packet
Characteristics, IEEE Southeastern Symposium on System Theory
(SSST 2001), Mar. 2001.