SecureNN: 3-party secure computation for neural network training

S Wagh, D Gupta, N Chandran - Proceedings on Privacy …, 2019 - petsymposium.org
Neural Networks (NN) provide a powerful method for machine learning training and
inference. To effectively train, it is desirable for multiple parties to combine their data …

[BOK][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

Security and composition of multiparty cryptographic protocols

R Canetti - Journal of CRYPTOLOGY, 2000 - Springer
We present general definitions of security for multiparty cryptographic protocols, with focus
on the task of evaluating a probabilistic function of the parties' inputs. We show that, with …

Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems

O Goldreich, S Micali, A Wigderson - Journal of the ACM (JACM), 1991 - dl.acm.org
In this paper the generality and wide applicability of Zero-knowledge proofs, a notion
introduced by Goldwasser, Micali, and Rackoff is demonstrated. These are probabilistic and …

[PDF][PDF] Secure multi-party computation

O Goldreich - Manuscript. Preliminary version, 1998 - Citeseer
More than ten years have elapsed since the rst completeness theorems for two-party and
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …

Sharemind: A framework for fast privacy-preserving computations

D Bogdanov, S Laur, J Willemson - … Security, MáLaga, Spain, October 6-8 …, 2008 - Springer
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe
for building the necessary information systems. In this paper, we present a provably secure …

[PDF][PDF] Adaptively secure multi-party computation

R Canetti, U Feige, O Goldreich, M Naor - Proceedings of the twenty …, 1996 - dl.acm.org
A fundamental problem in designing secure multi-party protocols is how to deal with
adaptive adversaries (ie, adversaries that may choose the corrupted parties during the …

[PDF][PDF] Protecting data privacy in private information retrieval schemes

Y Gertner, Y Ishai, E Kushilevitz, T Malkin - Proceedings of the thirtieth …, 1998 - dl.acm.org
Protecting Data Privacy in Private Information Retrieval Schemes Page 1 Protecting Data
Privacy in Private Information Retrieval Schemes Yael Gertner* Yuval Ishai t Eyal Kushilevitd …

Perfectly secure message transmission

D Dolev, C Dwork, O Waarts, M Yung - Journal of the ACM (JACM), 1993 - dl.acm.org
This paper studies the problem of perfectly secure communication in general network in
which processors and communication lines may be faulty. Lower bounds are obtained on …

Securenn: Efficient and private neural network training

S Wagh, D Gupta, N Chandran - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Neural Networks (NN) provide a powerful method for machine learning training and
inference. To effectively train, it is desirable for multiple parties to combine their data …