Hardening Bloom Filters using Paillier Encryption

Bloom FiltersĀ is a popular technique for privacy-preserving record linkage. However, recent work by Christen et al [1] and others have shown that Bloom Filters (BF) are susceptible to different forms of frequency attack. There are many ideas on hardening BF to protect against frequency attacks, and one idea we will explore in this blog article … More Hardening Bloom Filters using Paillier Encryption

Interview Questions for a Data Science Leadership Role

It’s not always easy for a technically competent data scientist to make the transition to a data science leadership role. Here are some interview questions I use to assess whether a candidate has successfully made that transition. Can you tell us a little bit about yourself and why you applied for this role? What is … More Interview Questions for a Data Science Leadership Role

Robert Kuok’s Trading Algorithm from 1963

I am reading Robert Kuok’s autobiography and these two paragraphs from the chapter Vintage 1963 jumped out at me. “Success in futures depends on your feel for the market, your instincts and rhythm. I would talk to different brokers. Each company had bright, young English traders. One or two would be a little cunning, but, … More Robert Kuok’s Trading Algorithm from 1963

Multiplication and Comparison Operations in Paillier

As is well known, the Paillier encryption system supports addition of two encrypted numbers and the scalar multiplication of a constant and an encrypted number. I learned recently one can compare two encrypted numbers and multiply two encrypted numbers in Paillier by making a trip to the private key holder. Let’s first look at comparison. … More Multiplication and Comparison Operations in Paillier