Marina Blanton's Publications
Pre-print
- A. Rathore, M. Blanton, M. Gaboardi, and L. Ziarek, A Formal Model for Secure Multiparty Computation, arXiv Report 2306.00303, 2023.
- A. Baccarini, M. Blanton and S. Zou, Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation, arXiv Report 2209.10457, 2022.
Books
- M. Atallah and M. Blanton (Editors), Algorithms and Theory of
Computation Handbook. Volume I: General Concepts and Techniques,
Chapman & Hall/CRC, 2009.
- M. Atallah and M. Blanton (Editors), Algorithms and Theory of
Computation Handbook. Volume II: Special Topics and Techniques,
Chapman & Hall/CRC, 2009.
In Books
- M. Blanton and P. Gasti, Secure and
Efficient Iris and Fingerprint Identification, Chapter 9 in
Biometric Security, D. Ngo, A. Teoh, and J. Hu (Editors), Cambridge
Scholars Publishing, Jan. 2015.
- E. Aguiar, Y. Zhang, and M. Blanton, An
Overview of Issues and Recent Developments in Cloud Computing and Storage
Security, Chapter in High Performance Cloud Auditing and
Applications, B.-Y. Choi, K. Han, and S. Song (Editors), Springer,
2014.
- M. Blanton, Authentication, Regular Entry in Encyclopedia of
Database Systems, L. Liu and T. Ozsu (Editors), 2009.
- M. Blanton, Hash Functions, Short Entry in Encyclopedia of
Database Systems, L. Liu and T. Ozsu (Editors), 2009.
- M. Blanton, Message Authentication Codes, Short Entry in
Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors),
2009.
In Journals
- M. Blanton, D. Murphy, and C. Yuan, Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2024, No. 1, 2024.
- M. Blanton, M. Goodrich, and C. Yuan, Secure and Accurate Summation of Many Floating-Point Numbers, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 3, 2023.
- A. Baccarini, M. Blanton, and C. Yuan, Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning, Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 1, 2023. Also ePrint Archive Report 2020/1577.
- M. Samadani, M. Berenjkoub, and M. Blanton, Secure Pattern Matching Based on Bit
Parallelism: Non-interactive Protocols for Non-deterministic String
Matching Automata Evaluation, International Journal of
Information Security (IJIS), Vol. 18, No. 3, pp. 371-391, 2019.
-
- Z. Shan, K. Ren, M. Blanton, and C. Wang, Practical
Secure Computation Outsourcing: A Survey, ACM Computing
Surveys, Vol. 51, No. 2, Article 31, 40 pages, 2018.
- Y. Zhang, M. Blanton, and G. Almashaqbeh, Implementing
Support for Pointers to Private Data in a General-Purpose Secure Multi-Party
Compiler, ACM Transactions on Privacy and Security (TOPS),
Vol. 21, No. 2, Article 6, 33 pages, 2018. Full arXiv version.
- M. Aliasgari, M. Blanton, and F. Bayatbabolghani, Secure Computation of Hidden Markov Models and Secure
Floating-Point Arithmetic in the Malicious Model, International
Journal of Information Security, Vol. 16, No. 6, pp. 577-601, 2017.
- M. Blanton and E. Aguiar, Private and Oblivious
Set and Multiset Operations, International Journal of Information
Security, Vol. 15, No. 5, pp. 493-518, Oct. 2016.
- M. Blanton and F. Bayatbabolghani, Efficient
Server-Aided Secure Two-Party Function Evaluation with Applications to
Genomic Computation, Proceedings on Privacy Enhancing
Technologies (PoPETs), No. 4, 21 pages, 2016. Also in Privacy
Enhancing Technologies Symposium (PETS), July 2016.
- Y. Zhang and M. Blanton, Efficient Dynamic
Provable Possession of Remote Data via Update Trees, ACM
Transactions on Storage (TOS), Vol. 12, No. 2, Article 9, 45 pages, Feb.
2016.
- Y. Zhang, M. Blanton, and G. Almashaqbeh, Secure Distributed Genome Analysis for GWAS and Sequence
Comparison Computation, special issue of BMC
Medical Informatics and Decision Making Journal, Vol. 15, Suppl. 5, Art.
S5, Dec. 2015.
- M. Blanton, Y. Zhang, and K. Frikken, Secure
and Verifiable Outsourcing of Large-Scale Biometric Computations,
ACM Transactions on Information and System Security (TISSEC), Vol.
16, No. 3, Nov. 2013.
- M. Blanton and M. Aliasgari, Analysis of
Reusability of Secure Sketches and Fuzzy Extractors, IEEE
Transactions on Information Forensics and Security (TIFS), Vol. 8, No.
9, pp. 1433-1445, Sep. 2013.
- T. R. Hoens, M. Blanton, A. Steele, and N. Chawla, Reliable Medical Recommendation Systems with Patient
Privacy, ACM Transactions on Intelligent Systems and Technology
(TIST), Special Issue on Intelligent Systems for Health Informatics,
Vol. 4, No. 4, 31 pages, 2013.
- M. Blanton and M. Aliasgari, Secure Outsourced
Computation of Iris Matching, Journal of Computer Security,
Vol. 20, No. 2-3, pp. 259-305, 2012.
- V. Deshpande, L. Schwarz, M. Atallah, M. Blanton, and K. Frikken,
Outsourcing Manufacturing: Secure Price-Masking Mechanisms for
Purchasing Component Parts, Production and Operations Management
(POMS), Vol. 20, No. 2, Mar. 2011.
- S. Byun, C. Ruffini, J. Mills, A. Douglas, M. Niang, S. Stepchenkova,
S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet
Addiction: Metasynthesis of 1996-2006 Quantitative Research,
CyberPsychology & Behavior, Vol. 12, No. 2, Apr. 2009.
- M. Atallah, M. Blanton, N. Fazio, and K. Frikken, Dynamic and Efficient Key Management for Access
Hierarchies, ACM Transactions on Information and System
Security (TISSEC), Vol. 12, No. 3, Jan. 2009. (supersedes AFB05 and
ABF06)
- A. Douglas, J. Mills, M. Niang, S. Stepchenkova, S. Byun, C. Ruffini,
S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet
Addiction: Meta-Synthesis of Qualitative Research for the Decade
1996-2006, Computer in Human Behavior, Vol. 24, No. 6, Sep.
2008.
- M. Blanton and M. Atallah, Succinct
Representation of Flexible and Privacy-Preserving Access Rights,
Special Issue (Privacy-Preserving Data Management) of the International
Journal on Very Large Data Bases (VLDBJ), Vol. 15, No. 4, Nov.
2006. (supersedes AB04 and BA05)
- R. Balupari, B. Tjaden, S. Ostermann, M. Bykova, and A. Mitchell,
Real-Time Network-Based Anomaly Intrusion Detection, Special Issue (Real
Time Security) of the Journal of Parallel and Distributed Computing
Practices, Vol. 4, No. 2, Jun. 2001.
In Magazines
- M. Blanton and F. Bayatbabolghani, An Approach to Improving
Security and Efficiency of Private Genomic Computation using Server
Aid, IEEE Security and Privacy, Vol. 15, No. 5, pp. 20-28,
Sep/Oct 2017.
In Conference Proceedings
- M. Blanton and C. Yuan, Binary Search in Secure Computation, Network and Distributed System Security Symposium (NDSS), 2022. Full version is available as ePrint Archive Report 2021/1049.
- M. Blanton, A. Kang, and C. Yuan, Improved
Building Blocks for Secure Multi-party Computation Based on Secret Sharing
with Honest Majority, International Conference on Applied
Cryptography and Network Security (ACNS), pp. 377-397, 2020. Full version is available as ePrint Archive Report 2019/718.
- M. Blanton and M. Jeong, Improved Signature Schemes for Secure
Multi-Party Computation with Certified Inputs, European Symposium
on Research in Computer Security (ESORICS), Sep. 2018. Full version is
available as ePrint Archive Report
2018/736.
- Y. Zhang, M. Blanton, and F. Bayatbabolghani, Enforcing Input Correctness via Certification in
Garbled Circuit Evaluation, European Symposium on Research in
Computer Security (ESORICS), pp. 552-569, Sep. 2017. ePrint version.
- A. Shahbazi, F. Bayatbabolghani, and M. Blanton, Private Computation with Genomic Data for Genome-Wide
Association and Linkage Studies, International Workshop on
Genomic Privacy and Security (GenoPri), Nov. 2016.
- M. Blanton and S. Saraph, Secure and Oblivious Maximum Bipartite
Matching Size Algorithm with Applications to Secure Fingerprint
Identification, European Symposium on Research in Computer
Security (ESORICS'15), Sep. 2015. Full ePrint version.
- Y. Zhang and M. Blanton, Efficient Secure and
Verifiable Outsourcing of Matrix Multiplications, Information
Security Conference (ISC'14), Oct. 2014. Full version is available as ePrint
Archive Report 2014/133.
- Y. Zhang, A. Steele, and M. Blanton, PICCO: A
General-Purpose Compiler for Private Distributed Computation,
ACM Conference on Computer and Communications Security (CCS'13),
Nov. 2013. Source code is available from GitHub.
- M. Aliasgari and M. Blanton, Secure
Computation of Hidden Markov Models, International Conference
on Security and Cryptography (SECRYPT'13), Jul. 2013.
- Y. Zhang and M. Blanton, Efficient Dynamic
Provable Possession of Remote Data via Balanced Update Trees,
ACM Symposium on Information, Computer and Communications Security
(ASIACCS'13), May 2013.
- M. Blanton, A. Steele, and M. Aliasgari, Data-Oblivious Graph Algorithms for Secure
Computation and Outsourcing, ACM Symposium on Information,
Computer and Communications Security (ASIACCS'13), May 2013.
- M. Aliasgari, M. Blanton, Y. Zhang, and A. Steele, Secure Computation on Floating Point Numbers,
Network and Distributed System Security Symposuim (NDSS'13), Feb.
2013.
- M. Blanton, M. Atallah, K. Frikken, and Q. Malluhi, Secure and Efficient Outsourcing of Sequence
Comparisons, European Symposium on Research in Computer
Security (ESORICS'12), Sep. 2012.
- M. Blanton and E. Aguiar, Private and
Oblivious Set and Multiset Operations, ACM Symposium on
Information, Computer and Communications Security (ASIACCS'12), May
2012.
- M. Blanton, Y. Zhang, and K. Frikken, Secure and Verifiable Outsourcing of Large-Scale
Biometric Computations, IEEE International Conference on
Information Privacy, Security, Risk and Trust (PASSAT'11), Oct.
2011.
- M. Blanton, Achieving Full Security in
Privacy-Preserving Data Mining, IEEE International Conference
on Information Privacy, Security, Risk and Trust (PASSAT'11), Oct.
2011.
- M. Blanton and P. Gasti, Secure and
Efficient Protocols for Iris and Fingerprint Identification,
European Symposium on Research in Computer Security (ESORICS'11),
Sep. 2011.
- M. Blanton and M. Aliasgari, On the
(Non-)Reusability of Fuzzy Sketches and Extractors and Security in the
Computational Setting, International Conference on Security and
Cryptography (SECRYPT'11), Jul. 2011.
- T. R. Hoens, M. Blanton, and N. Chawla, Reliable Medical Recommendation Systems with Patient
Privacy, ACM International Health Informatics Symposium
(IHI'10), Nov. 2010.
- P. Gasti, G. Ateniese, and M. Blanton, Deniable Cloud Storage: Sharing Files via Public-Key
Deniability, ACM Workshop on Privacy in the Electronic Society
(WPES'10), Oct. 2010.
- M. Blanton and K. Frikken, Efficient
Multi-Dimensional Key Management in Broadcast Services,
European Symposium on Research in Computer Security (ESORICS'10),
Sep. 2010.
- T. R. Hoens, M. Blanton, and N. Chawla, A
Private and Reliable Recommendation System for Social Networks,
IEEE International Conference on Information Privacy, Security, Risk
and Trust (PASSAT'10), Aug. 2010.
- M. Blanton and M. Aliasgari, Secure
Outsourcing of DNA Searching via Finite Automata, Annual IFIP
WG 11.3 Working Conference on Data and Applications Security
(DBSec'10), Jun. 2010.
- T. Raeder, M. Blanton, N. Chawla, and K. Frikken,
Privacy-Preserving Network Aggregation,
Pacific-Asia Conference on Knowledge Discovery and Data Mining
(PAKDD'10), Jun. 2010.
- M. Blanton and W. Hudelson, Biometric-Based
Non-Transferable Anonymous Credentials, International
Conference on Information and Communications Security (ICICS'09), Dec.
2009.
- K. Frikken, M. Blanton, and M. Atallah, Robust
Authentication Using Physically Unclonable Functions,
Information Security Conference (ISC'09), Sep. 2009.
- M. Blanton, Improved Conditional
E-Payments, Applied Cryptography and Network Security
(ACNS'08), Jun. 2008.
- M. Atallah, K. Frikken, M. Blanton, and Y. Cho, Private Combinatorial Group Testing, ACM
Symposium on Information, Computer and Communications Security
(ASIACCS'08), Mar. 2008.
- M. Blanton, Online Subscriptions with
Anonymous Access, ACM Symposium on Information, Computer and
Communications Security (ASIACCS'08), Mar. 2008.
- M. Atallah, M. Blanton, and K. Frikken, Incorporating
Temporal Capabilities in Existing Key Management Schemes,
European Symposium on Research in Computer Security (ESORICS'07),
Sep. 2007. Full version.
- M. Atallah, M. Blanton, M. Goodrich, and S. Polu,
Discrepancy-Sensitive
Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest
Neighbors in Any Minkowski Metric, Workshop
on Algorithms and Data Structures (WADS'07), Aug. 2007.
- M. Atallah, M. Blanton, and K. Frikken, Efficient
Techniques for Realizing Geo-Spatial Access Control, ACM Symposium
on Information, Computer and Communications Security (ASIACCS'07),
Mar. 2007.
- G. Ateniese, M. Blanton, and J. Kirsch, Secret
Handshakes with Dynamic and Fuzzy Matching , Network and
Distributed System Security Symposuim (NDSS'07), Feb. 2007.
- M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L.
Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment
(SCPFR), Multi-Echelon/Public Applications of Supply Chain Management
Conference, Jun. 2006.
- M. Atallah, M. Blanton, and K. Frikken, Key
Management for Non-Tree Access Hierarchies, ACM Symposium on Access
Control Models and Technologies (SACMAT'06), Jun. 2006. Superseded
by [ABFF09].
- M. Atallah, M. Blanton, K. Frikken, and J. Li, Efficient
Correlated Action Selection, Financial Cryptography and Data
Security (FC'06), Feb. 2006.
- M. Atallah, K. Frikken, and M. Blanton, Dynamic
and Efficient Key Management for Access Hierarchies, ACM Conference
on Computer and Communications Security (CCS'05), Nov. 2005.
Superseded by [ABFF09].
- M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L.
Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment
(SCPFR), Manufacturing and Service Operation Management (M&SOM),
Jun. 2005.
- M. Blanton and M. Atallah, Provable
Bounds for Portable and Flexible Privacy-Preserving Access Rights,
ACM Symposium on Access Control Models and Technologies
(SACMAT'05), Jun. 2005. Superseded by [BA06].
- K. Frikken, M. Atallah, and M. Bykova, Remote
Revocation of Smart Cards in a Private DRM System, Australasian
Information Security Workshop (AISW'05), Digital Rights Management,
Jan. 2005.
- M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, Private Collaborative Forecasting and
Benchmarking, ACM Workshop on Privacy in the Electronic Society
(WPES'04), Oct. 2004.
- M. Atallah and M. Bykova, Portable
and Flexible Document Access Control Mechanisms, European
Symposium on Research in Computer Security (ESORICS'04), Sep. 2004.
Superseded by [BA06].
- M. Bykova and M. Atallah,
Succinct Specifications of Portable Document Access Policies, ACM
Symposium on Access Control Models and Technologies (SACMAT'04),
Jun. 2004.
- M. Bykova and S. Ostermann, Statistical
Analysis of Malformed Packets and Their Origins in the Modern
Internet, ACM Internet Measurent Workshop (IMW 2002), Nov.
2002.
- M. Bykova, S. Ostermann, and B. Tjaden,
Detecting Network Intrusions via a Statistical Analysis of Network Packet
Characteristics, IEEE Southeastern Symposium on System Theory
(SSST 2001), Mar. 2001.
Theses
- M. Blanton, Key Management in
Hierarchical Access Control Systems, PhD Thesis, Purdue
University, Aug. 2007.
- M. Bykova, Statistical Analysis of
Malformed Packets and Their Origins in the Modern Internet,
Master's Thesis, Ohio University, Mar. 2002.
Selected Technical Reports
- M. Blanton, A. Kang, S. Karan, and J. Zola, Privacy Preserving Analytics on
Distributed Medical Data, arXiv Report 1806.06477, 2018.
- F. Bayatbabolghani, M. Blanton, M. Aliasgari, and M. Goodrich, Secure Fingerprint Alignment and
Matching Protocols, arXiv Report 1702.03379, 2017.
- J. DeBenedetto and M. Blanton, Optimizing Secure Statistical
Computations with PICCO, arXiv Report 1612.08678, 2016.
- M. Blanton and M. Aliasgari, Secure Computation of
Biometric Matching, CSE Technical Report TR 2009-03, University of
Notre Dame, Apr. 2009.
- N. Chawla, T. Raeder, M. Blanton, and K. Frikken, Modeling the Product Space as a
Network, NET Institute Working Paper No. 08-18, SSRN, Oct.
2008.
- M. Atallah, M. Blanton, and K. Frikken, Incorporating Temporal Capabilities
in Existing Key Management Schemes, Cryptology ePrint Archive
Report 2007/245, IACR, Jun. 2007.
- M. Blanton,
Empirical Evaluation of Secure Two-Party Computation Models, CERIAS
Technical Report TR 2005-58, Purdue University, Aug. 2005.
- M. Bykova, What
Should a Good Security Model Be? CERIAS Technical
Report TR 2004-38, Purdue University, Sep. 2004.