Marina Blanton's Publications

Pre-print

A. Rathore, M. Blanton, M. Gaboardi, and L. Ziarek, A Formal Model for Secure Multiparty Computation, arXiv Report 2306.00303, 2023.

A. Baccarini, M. Blanton and S. Zou, Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation, arXiv Report 2209.10457, 2022.

Books

M. Atallah and M. Blanton (Editors), Algorithms and Theory of Computation Handbook. Volume I: General Concepts and Techniques, Chapman & Hall/CRC, 2009.

M. Atallah and M. Blanton (Editors), Algorithms and Theory of Computation Handbook. Volume II: Special Topics and Techniques, Chapman & Hall/CRC, 2009.

In Books

M. Blanton and P. Gasti, Secure and Efficient Iris and Fingerprint Identification, Chapter 9 in Biometric Security, D. Ngo, A. Teoh, and J. Hu (Editors), Cambridge Scholars Publishing, Jan. 2015.

E. Aguiar, Y. Zhang, and M. Blanton, An Overview of Issues and Recent Developments in Cloud Computing and Storage Security, Chapter in High Performance Cloud Auditing and Applications, B.-Y. Choi, K. Han, and S. Song (Editors), Springer, 2014.

M. Blanton, Authentication, Regular Entry in Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors), 2009.

M. Blanton, Hash Functions, Short Entry in Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors), 2009.

M. Blanton, Message Authentication Codes, Short Entry in Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors), 2009.

In Journals

M. Blanton, D. Murphy, and C. Yuan, Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2024, No. 1, 2024.

M. Blanton, M. Goodrich, and C. Yuan, Secure and Accurate Summation of Many Floating-Point Numbers, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 3, 2023.

A. Baccarini, M. Blanton, and C. Yuan, Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 1, 2023. Also ePrint Archive Report 2020/1577.

M. Samadani, M. Berenjkoub, and M. Blanton, Secure Pattern Matching Based on Bit Parallelism: Non-interactive Protocols for Non-deterministic String Matching Automata Evaluation, International Journal of Information Security (IJIS), Vol. 18, No. 3, pp. 371-391, 2019.

Z. Shan, K. Ren, M. Blanton, and C. Wang, Practical Secure Computation Outsourcing: A Survey, ACM Computing Surveys, Vol. 51, No. 2, Article 31, 40 pages, 2018.

Y. Zhang, M. Blanton, and G. Almashaqbeh, Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler, ACM Transactions on Privacy and Security (TOPS), Vol. 21, No. 2, Article 6, 33 pages, 2018. Full arXiv version.

M. Aliasgari, M. Blanton, and F. Bayatbabolghani, Secure Computation of Hidden Markov Models and Secure Floating-Point Arithmetic in the Malicious Model, International Journal of Information Security, Vol. 16, No. 6, pp. 577-601, 2017.

M. Blanton and E. Aguiar, Private and Oblivious Set and Multiset Operations, International Journal of Information Security, Vol. 15, No. 5, pp. 493-518, Oct. 2016.

M. Blanton and F. Bayatbabolghani, Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation, Proceedings on Privacy Enhancing Technologies (PoPETs), No. 4, 21 pages, 2016. Also in Privacy Enhancing Technologies Symposium (PETS), July 2016.

Y. Zhang and M. Blanton, Efficient Dynamic Provable Possession of Remote Data via Update Trees, ACM Transactions on Storage (TOS), Vol. 12, No. 2, Article 9, 45 pages, Feb. 2016.

Y. Zhang, M. Blanton, and G. Almashaqbeh, Secure Distributed Genome Analysis for GWAS and Sequence Comparison Computation, special issue of BMC Medical Informatics and Decision Making Journal, Vol. 15, Suppl. 5, Art. S5, Dec. 2015.

M. Blanton, Y. Zhang, and K. Frikken, Secure and Verifiable Outsourcing of Large-Scale Biometric Computations, ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Nov. 2013.

M. Blanton and M. Aliasgari, Analysis of Reusability of Secure Sketches and Fuzzy Extractors, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 8, No. 9, pp. 1433-1445, Sep. 2013.

T. R. Hoens, M. Blanton, A. Steele, and N. Chawla, Reliable Medical Recommendation Systems with Patient Privacy, ACM Transactions on Intelligent Systems and Technology (TIST), Special Issue on Intelligent Systems for Health Informatics, Vol. 4, No. 4, 31 pages, 2013.

M. Blanton and M. Aliasgari, Secure Outsourced Computation of Iris Matching, Journal of Computer Security, Vol. 20, No. 2-3, pp. 259-305, 2012.

V. Deshpande, L. Schwarz, M. Atallah, M. Blanton, and K. Frikken, Outsourcing Manufacturing: Secure Price-Masking Mechanisms for Purchasing Component Parts, Production and Operations Management (POMS), Vol. 20, No. 2, Mar. 2011.

S. Byun, C. Ruffini, J. Mills, A. Douglas, M. Niang, S. Stepchenkova, S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research, CyberPsychology & Behavior, Vol. 12, No. 2, Apr. 2009.

M. Atallah, M. Blanton, N. Fazio, and K. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, ACM Transactions on Information and System Security (TISSEC), Vol. 12, No. 3, Jan. 2009. (supersedes AFB05 and ABF06)

A. Douglas, J. Mills, M. Niang, S. Stepchenkova, S. Byun, C. Ruffini, S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet Addiction: Meta-Synthesis of Qualitative Research for the Decade 1996-2006, Computer in Human Behavior, Vol. 24, No. 6, Sep. 2008.

M. Blanton and M. Atallah, Succinct Representation of Flexible and Privacy-Preserving Access Rights, Special Issue (Privacy-Preserving Data Management) of the International Journal on Very Large Data Bases (VLDBJ), Vol. 15, No. 4, Nov. 2006. (supersedes AB04 and BA05)

R. Balupari, B. Tjaden, S. Ostermann, M. Bykova, and A. Mitchell, Real-Time Network-Based Anomaly Intrusion Detection, Special Issue (Real Time Security) of the Journal of Parallel and Distributed Computing Practices, Vol. 4, No. 2, Jun. 2001.

In Magazines

M. Blanton and F. Bayatbabolghani, An Approach to Improving Security and Efficiency of Private Genomic Computation using Server Aid, IEEE Security and Privacy, Vol. 15, No. 5, pp. 20-28, Sep/Oct 2017.

In Conference Proceedings

M. Blanton and C. Yuan, Binary Search in Secure Computation, Network and Distributed System Security Symposium (NDSS), 2022. Full version is available as ePrint Archive Report 2021/1049.

M. Blanton, A. Kang, and C. Yuan, Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority, International Conference on Applied Cryptography and Network Security (ACNS), pp. 377-397, 2020. Full version is available as ePrint Archive Report 2019/718.

M. Blanton and M. Jeong, Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs, European Symposium on Research in Computer Security (ESORICS), Sep. 2018. Full version is available as ePrint Archive Report 2018/736.

Y. Zhang, M. Blanton, and F. Bayatbabolghani, Enforcing Input Correctness via Certification in Garbled Circuit Evaluation, European Symposium on Research in Computer Security (ESORICS), pp. 552-569, Sep. 2017. ePrint version.

A. Shahbazi, F. Bayatbabolghani, and M. Blanton, Private Computation with Genomic Data for Genome-Wide Association and Linkage Studies, International Workshop on Genomic Privacy and Security (GenoPri), Nov. 2016.

M. Blanton and S. Saraph, Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification, European Symposium on Research in Computer Security (ESORICS'15), Sep. 2015. Full ePrint version.

Y. Zhang and M. Blanton, Efficient Secure and Verifiable Outsourcing of Matrix Multiplications, Information Security Conference (ISC'14), Oct. 2014. Full version is available as ePrint Archive Report 2014/133.

Y. Zhang, A. Steele, and M. Blanton, PICCO: A General-Purpose Compiler for Private Distributed Computation, ACM Conference on Computer and Communications Security (CCS'13), Nov. 2013. Source code is available from GitHub.

M. Aliasgari and M. Blanton, Secure Computation of Hidden Markov Models, International Conference on Security and Cryptography (SECRYPT'13), Jul. 2013.

Y. Zhang and M. Blanton, Efficient Dynamic Provable Possession of Remote Data via Balanced Update Trees, ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), May 2013.

M. Blanton, A. Steele, and M. Aliasgari, Data-Oblivious Graph Algorithms for Secure Computation and Outsourcing, ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), May 2013.

M. Aliasgari, M. Blanton, Y. Zhang, and A. Steele, Secure Computation on Floating Point Numbers, Network and Distributed System Security Symposuim (NDSS'13), Feb. 2013.

M. Blanton, M. Atallah, K. Frikken, and Q. Malluhi, Secure and Efficient Outsourcing of Sequence Comparisons, European Symposium on Research in Computer Security (ESORICS'12), Sep. 2012.

M. Blanton and E. Aguiar, Private and Oblivious Set and Multiset Operations, ACM Symposium on Information, Computer and Communications Security (ASIACCS'12), May 2012.

M. Blanton, Y. Zhang, and K. Frikken, Secure and Verifiable Outsourcing of Large-Scale Biometric Computations, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'11), Oct. 2011.

M. Blanton, Achieving Full Security in Privacy-Preserving Data Mining, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'11), Oct. 2011.

M. Blanton and P. Gasti, Secure and Efficient Protocols for Iris and Fingerprint Identification, European Symposium on Research in Computer Security (ESORICS'11), Sep. 2011.

M. Blanton and M. Aliasgari, On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting, International Conference on Security and Cryptography (SECRYPT'11), Jul. 2011.

T. R. Hoens, M. Blanton, and N. Chawla, Reliable Medical Recommendation Systems with Patient Privacy, ACM International Health Informatics Symposium (IHI'10), Nov. 2010.

P. Gasti, G. Ateniese, and M. Blanton, Deniable Cloud Storage: Sharing Files via Public-Key Deniability, ACM Workshop on Privacy in the Electronic Society (WPES'10), Oct. 2010.

M. Blanton and K. Frikken, Efficient Multi-Dimensional Key Management in Broadcast Services, European Symposium on Research in Computer Security (ESORICS'10), Sep. 2010.

T. R. Hoens, M. Blanton, and N. Chawla, A Private and Reliable Recommendation System for Social Networks, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'10), Aug. 2010.

M. Blanton and M. Aliasgari, Secure Outsourcing of DNA Searching via Finite Automata, Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'10), Jun. 2010.

T. Raeder, M. Blanton, N. Chawla, and K. Frikken, Privacy-Preserving Network Aggregation, Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD'10), Jun. 2010.

M. Blanton and W. Hudelson, Biometric-Based Non-Transferable Anonymous Credentials, International Conference on Information and Communications Security (ICICS'09), Dec. 2009.

K. Frikken, M. Blanton, and M. Atallah, Robust Authentication Using Physically Unclonable Functions, Information Security Conference (ISC'09), Sep. 2009.

M. Blanton, Improved Conditional E-Payments, Applied Cryptography and Network Security (ACNS'08), Jun. 2008.

M. Atallah, K. Frikken, M. Blanton, and Y. Cho, Private Combinatorial Group Testing, ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), Mar. 2008.

M. Blanton, Online Subscriptions with Anonymous Access, ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), Mar. 2008.

M. Atallah, M. Blanton, and K. Frikken, Incorporating Temporal Capabilities in Existing Key Management Schemes, European Symposium on Research in Computer Security (ESORICS'07), Sep. 2007. Full version.

M. Atallah, M. Blanton, M. Goodrich, and S. Polu, Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric, Workshop on Algorithms and Data Structures (WADS'07), Aug. 2007.

M. Atallah, M. Blanton, and K. Frikken, Efficient Techniques for Realizing Geo-Spatial Access Control, ACM Symposium on Information, Computer and Communications Security (ASIACCS'07), Mar. 2007.

G. Ateniese, M. Blanton, and J. Kirsch, Secret Handshakes with Dynamic and Fuzzy Matching , Network and Distributed System Security Symposuim (NDSS'07), Feb. 2007.

M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L. Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR), Multi-Echelon/Public Applications of Supply Chain Management Conference, Jun. 2006.

M. Atallah, M. Blanton, and K. Frikken, Key Management for Non-Tree Access Hierarchies, ACM Symposium on Access Control Models and Technologies (SACMAT'06), Jun. 2006. Superseded by [ABFF09].

M. Atallah, M. Blanton, K. Frikken, and J. Li, Efficient Correlated Action Selection, Financial Cryptography and Data Security (FC'06), Feb. 2006.

M. Atallah, K. Frikken, and M. Blanton, Dynamic and Efficient Key Management for Access Hierarchies, ACM Conference on Computer and Communications Security (CCS'05), Nov. 2005. Superseded by [ABFF09].

M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L. Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR), Manufacturing and Service Operation Management (M&SOM), Jun. 2005.

M. Blanton and M. Atallah, Provable Bounds for Portable and Flexible Privacy-Preserving Access Rights, ACM Symposium on Access Control Models and Technologies (SACMAT'05), Jun. 2005. Superseded by [BA06].

K. Frikken, M. Atallah, and M. Bykova, Remote Revocation of Smart Cards in a Private DRM System, Australasian Information Security Workshop (AISW'05), Digital Rights Management, Jan. 2005.

M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, Private Collaborative Forecasting and Benchmarking, ACM Workshop on Privacy in the Electronic Society (WPES'04), Oct. 2004.

M. Atallah and M. Bykova, Portable and Flexible Document Access Control Mechanisms, European Symposium on Research in Computer Security (ESORICS'04), Sep. 2004. Superseded by [BA06].

M. Bykova and M. Atallah, Succinct Specifications of Portable Document Access Policies, ACM Symposium on Access Control Models and Technologies (SACMAT'04), Jun. 2004.

M. Bykova and S. Ostermann, Statistical Analysis of Malformed Packets and Their Origins in the Modern Internet, ACM Internet Measurent Workshop (IMW 2002), Nov. 2002.

M. Bykova, S. Ostermann, and B. Tjaden, Detecting Network Intrusions via a Statistical Analysis of Network Packet Characteristics, IEEE Southeastern Symposium on System Theory (SSST 2001), Mar. 2001.

Theses

M. Blanton, Key Management in Hierarchical Access Control Systems, PhD Thesis, Purdue University, Aug. 2007.

M. Bykova, Statistical Analysis of Malformed Packets and Their Origins in the Modern Internet, Master's Thesis, Ohio University, Mar. 2002.

Selected Technical Reports

M. Blanton, A. Kang, S. Karan, and J. Zola, Privacy Preserving Analytics on Distributed Medical Data, arXiv Report 1806.06477, 2018.

F. Bayatbabolghani, M. Blanton, M. Aliasgari, and M. Goodrich, Secure Fingerprint Alignment and Matching Protocols, arXiv Report 1702.03379, 2017.

J. DeBenedetto and M. Blanton, Optimizing Secure Statistical Computations with PICCO, arXiv Report 1612.08678, 2016.

M. Blanton and M. Aliasgari, Secure Computation of Biometric Matching, CSE Technical Report TR 2009-03, University of Notre Dame, Apr. 2009.

N. Chawla, T. Raeder, M. Blanton, and K. Frikken, Modeling the Product Space as a Network, NET Institute Working Paper No. 08-18, SSRN, Oct. 2008.

M. Atallah, M. Blanton, and K. Frikken, Incorporating Temporal Capabilities in Existing Key Management Schemes, Cryptology ePrint Archive Report 2007/245, IACR, Jun. 2007.

M. Blanton, Empirical Evaluation of Secure Two-Party Computation Models, CERIAS Technical Report TR 2005-58, Purdue University, Aug. 2005.

M. Bykova, What Should a Good Security Model Be? CERIAS Technical Report TR 2004-38, Purdue University, Sep. 2004.