Delphi: A cryptographic inference system for neural networks

P Mishra, R Lehmkuhl, A Srinivasan, W Zheng… - Proceedings of the …, 2020 - dl.acm.org
Many companies provide neural network prediction services to users for a wide range of
applications. However, current prediction systems compromise one party's privacy: either the …

Chameleon: A hybrid secure computation framework for machine learning applications

MS Riazi, C Weinert, O Tkachenko… - Proceedings of the …, 2018 - dl.acm.org
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function
evaluation (SFE) which enables two parties to jointly compute a function without disclosing …

A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

Oblivious {Multi-Party} machine learning on trusted processors

O Ohrimenko, F Schuster, C Fournet, A Mehta… - 25th USENIX Security …, 2016 - usenix.org
Privacy-preserving multi-party machine learning allows multiple organizations to perform
collaborative data analytics while guaranteeing the privacy of their individual datasets …

Oblivious neural network predictions via minionn transformations

J Liu, M Juuti, Y Lu, N Asokan - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Machine learning models hosted in a cloud service are increasingly popular but risk privacy:
clients sending prediction requests to the service need to disclose potentially sensitive …

[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.

D Demmler, T Schneider, M Zohner - NDSS, 2015 - encrypto.de
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …

Machine learning classification over encrypted data

R Bost, RA Popa, S Tu, S Goldwasser - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Abstract Machine learning classification is used in numerous settings nowadays, such as
medical or genomics predictions, spam detection, face recognition, and financial predictions …

A training-integrity privacy-preserving federated learning scheme with trusted execution environment

Y Chen, F Luo, T Li, T **ang, Z Liu, J Li - Information Sciences, 2020 - Elsevier
Abstract Machine learning models trained on sensitive real-world data promise
improvements to everything from medical screening to disease outbreak discovery. In many …

Foundations of garbled circuits

M Bellare, VT Hoang, P Rogaway - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Garbled circuits, a classical idea rooted in the work of Yao, have long been understood as a
cryptographic technique, not a cryptographic goal. Here we cull out a primitive …

Differentially private Naive Bayes learning over multiple data sources

T Li, J Li, Z Liu, P Li, C Jia - Information Sciences, 2018 - Elsevier
For meeting diverse requirements of data analysis, the machine learning classifier has been
provided as a tool to evaluate data in many applications. Due to privacy concerns of …