Abstract: With the rapid advancement of cloud technology, ciphertext-policy attribute-based encryption (CP-ABE) schemes are highly suited to cloud storage environments. In order to protect sensitive ...
Abstract: Shielding neural networks (NNs) from untrusted hosts with Trusted Execution Environments (TEEs) has been increasingly adopted. Nevertheless, this paper shows that the confidentiality of NNs ...