Towards practical secure neural network inference: the journey so far and the road ahead

ZÁ Mann, C Weinert, D Chabal, JW Bos - ACM Computing Surveys, 2023 - dl.acm.org
Neural networks (NNs) have become one of the most important tools for artificial
intelligence. Well-designed and trained NNs can perform inference (eg, make decisions or …

: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions

C Baum, AJ Malozemoff, MB Rosen… - Advances in Cryptology …, 2021 - Springer
Zero knowledge proofs are an important building block in many cryptographic applications.
Unfortunately, when the proof statements become very large, existing zero-knowledge proof …

Experimenting with collaborative {zk-SNARKs}:{Zero-Knowledge} proofs for distributed secrets

A Ozdemir, D Boneh - … USENIX Security Symposium (USENIX Security 22 …, 2022 - usenix.org
A zk-SNARK is a powerful cryptographic primitive that provides a succinct and efficiently
checkable argument that the prover has a witness to a public NP statement, without …

Stacking Sigmas: A Framework to Compose -Protocols for Disjunctions

A Goel, M Green, M Hall-Andersen… - … Conference on the Theory …, 2022 - Springer
Abstract Zero-Knowledge (ZK) Proofs for disjunctive statements have been a focus of a long
line of research. Classical results such as Cramer et al.[CRYPTO'94] and Abe et al.[AC'02] …

Speed-stacking: Fast sublinear zero-knowledge proofs for disjunctions

A Goel, M Hall-Andersen, G Kaptchuk… - … Conference on the Theory …, 2023 - Springer
Building on recent compilers for efficient disjunctive composition (eg an OR of multiple
clauses) of zero-knowledge proofs (eg Goel et al.[EUROCRYPT'22]) we propose a new …

One hot garbling

D Heath, V Kolesnikov - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Garbled Circuit (GC) is the main practical 2PC technique, yet despite great interest in its
performance, GC notoriously resists improvement. Essentially, we only know how to …

Garbled circuit lookup tables with logarithmic number of ciphertexts

D Heath, V Kolesnikov, LKL Ng - … on the Theory and Applications of …, 2024 - Springer
Garbled Circuit (GC) is a basic technique for practical secure computation. GC handles
Boolean circuits; it consumes significant network bandwidth to transmit encoded gate truth …

Towards generic MPC compilers via variable instruction set architectures (VISAs)

Y Yang, S Peceny, D Heath, V Kolesnikov - Proceedings of the 2023 …, 2023 - dl.acm.org
In MPC, we usually represent programs as circuits. This is a poor fit for programs that use
complex control flow, as it is costly to compile control flow to circuits. This motivated prior …

An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things against Perpetual Leakage

C Jiang, C Xu, X Dong, K Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Password-based authentication is widely applied in Internet of Things (IoT). It allows IoT
devices to identify users with passwords to resist unauthorized access. However, choices of …

Vasa: Vector aes instructions for security applications

JP Münch, T Schneider, H Yalame - Proceedings of the 37th Annual …, 2021 - dl.acm.org
Due to standardization, AES is today's most widely used block cipher. Its security is well-
studied and hardware acceleration is available on a variety of platforms. Following the …