Private web search with Tiptoe

A Henzinger, E Dauterman, H Corrigan-Gibbs… - Proceedings of the 29th …, 2023 - dl.acm.org
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …

Cerebro: A platform for {Multi-Party} cryptographic collaborative learning

W Zheng, R Deng, W Chen, RA Popa… - 30th USENIX Security …, 2021 - usenix.org
Many organizations need large amounts of high quality data for their applications, and one
way to acquire such data is to combine datasets from multiple parties. Since these …

KNN classification with one-step computation

S Zhang, J Li - IEEE Transactions on Knowledge and Data …, 2021 - ieeexplore.ieee.org
KNN classification is an improvisational learning mode, in which they are carried out only
when a test data is predicted that set a suitable K value and search the K nearest neighbors …

Privacy-preserving contact tracing of COVID-19 patients

L Reichert, S Brack, B Scheuermann - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The current Covid-19 pandemic shows that our modern globalized world can be heavily
affected by a quickly spreading, highly infectious, deadly virus in a matter of weeks. It …

Efficient, private and robust federated learning

M Hao, H Li, G Xu, H Chen, T Zhang - Proceedings of the 37th Annual …, 2021 - dl.acm.org
Federated learning (FL) has demonstrated tremendous success in various mission-critical
large-scale scenarios. However, such promising distributed learning paradigm is still …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution

EM Kornaropoulos, C Papamanthou… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Recent foundational work on leakage-abuse attacks on encrypted databases has
broadened our understanding of what an adversary can accomplish with a standard leakage …

Maliciously secure matrix multiplication with applications to private deep learning

H Chen, M Kim, I Razenshteyn, D Rotaru… - Advances in Cryptology …, 2020 - Springer
Computing on data in a manner that preserve the privacy is of growing importance. Multi-
Party Computation (MPC) and Homomorphic Encryption (HE) are two cryptographic …

Learning space partitions for nearest neighbor search

Y Dong, P Indyk, I Razenshteyn, T Wagner - arxiv preprint arxiv …, 2019 - arxiv.org
Space partitions of $\mathbb {R}^ d $ underlie a vast and important class of fast nearest
neighbor search (NNS) algorithms. Inspired by recent theoretical work on NNS for general …

Saqe: practical privacy-preserving approximate query processing for data federations

J Bater, Y Park, X He, X Wang, J Rogers - Proceedings of the VLDB …, 2020 - dl.acm.org
A private data federation enables clients to query the union of data from multiple data
providers without revealing any extra private information to the client or any other data …