Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Julien Freudiger is active.

Publication


Featured researches published by Julien Freudiger.


international workshop on information forensics and security | 2015

Privacy, efficiency & fault tolerance in aggregate computations on massive star networks

Shantanu Rane; Julien Freudiger; Alejandro E. Brito; Ersin Uzun

We consider the challenge of performing efficient, fault-tolerant, privacy-preserving aggregate computations in a star topology, i.e., a massive number of participants connected to a single untrusted aggregator. The privacy constraints are that the participants do not discover each others data, and the aggregator obtains the final results while remaining oblivious to each participants individual contribution to the aggregate. In achieving these goals, previous approaches have either assumed a trusted dealer that distributes keys to the participants and the aggregator, or introduced additional parties that withhold the decryption key from the aggregator, or applied secret sharing with either pairwise communication amongst the participants or O(N2) ciphertext overhead at the aggregator. In contrast, we describe a protocol based on Shamir secret sharing and homomorphic encryption without assuming any additional parties. We also eliminate all pairwise communication amongst the participants and still require only O(N1+ε) overhead at the aggregator, where ε ≪ 1 can be achieved for massively multiparty computation. Our protocol arranges the star-connected participants into a logical hierarchy that facilitates parallelization, while allowing for user churn, i.e., a specified number of participants can go offline after providing their data, and new participants can join at a later stage of the computation.


arXiv: Cryptography and Security | 2014

A Comparative Usability Study of Two-Factor Authentication

Emiliano De Cristofaro; Honglu Du; Julien Freudiger; Gregory Norcie


Archive | 2014

Computer-Implemented System And Method For Establishing Distributed Secret Shares In A Private Data Aggregation Scheme

Igor Bilogrevic; Julien Freudiger; Ersin Uzun


Archive | 2013

METHOD AND APPARATUS FOR PRIVACY AND TRUST ENHANCING SHARING OF DATA FOR COLLABORATIVE ANALYTICS

Emiliano De Cristofaro; Julien Freudiger; Ersin Uzun; Alejandro E. Brito; Marshall W. Bern


Archive | 2013

Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication

Emiliano De Cristofaro; Honglu Du; Julien Freudiger; Gregory Norcie


Archive | 2014

Portable proxy for security management and privacy protection and method of use

Julien Freudiger; Ersin Uzun; Emiliano De Cristofaro; Golam Sarwar


Archive | 2014

Computer-Implemented System And Method For Multi-Party Data Function Computing Using Discriminative Dimensionality-Reducing Mappings

Shantanu Rane; Julien Freudiger; Alejandro E. Brito; Ersin Uzun


Archive | 2016

System And Method For Data Quality Analysis Between Untrusted Parties

Julien Freudiger; Shantanu Rane; Alejandro E. Brito; Ersin Uzun


Archive | 2014

METHODS FOR CENTRALIZED PRIVACY-PRESERVING COLLABORATIVE THREAT MITIGATION

Julien Freudiger; Emiliano De Cristofaro; Alejandro E. Brito; Marshall W. Bern; Ersin Uzun


Archive | 2015

PRIVACY-SENSITIVE RANKING OF USER DATA

Igor Bilogrevic; Julien Freudiger; Emiliano De Cristofaro; Ersin Uzun

Researchain Logo
Decentralizing Knowledge