Secure multi-party computation problems and their applications: a review and open problems

W Du, MJ Atallah - Proceedings of the 2001 workshop on New security …, 2001 - dl.acm.org
The growth of the Internet has triggered tremendous opportunities for cooperative
computation, where people are jointly conducting computation tasks based on the private …

[HTML][HTML] Private set intersection: A systematic literature review

D Morales, I Agudo, J Lopez - Computer Science Review, 2023 - Elsevier
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …

Cheetah: Lean and fast secure {Two-Party} deep neural network inference

Z Huang, W Lu, C Hong, J Ding - 31st USENIX Security Symposium …, 2022 - usenix.org
Secure two-party neural network inference (2PC-NN) can offer privacy protection for both the
client and the server and is a promising technique in the machine-learning-as-a-service …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Privacy-preserving classification on deep neural network

H Chabanne, A De Wargny, J Milgram… - Cryptology ePrint …, 2017 - eprint.iacr.org
Neural Networks (NN) are today increasingly used in Machine Learning where they have
become deeper and deeper to accurately model or classify high-level abstractions of data …

SpOT-light: lightweight private set intersection from sparse OT extension

B Pinkas, M Rosulek, N Trieu, A Yanai - … Barbara, CA, USA, August 18–22 …, 2019 - Springer
We describe a novel approach for two-party private set intersection (PSI) with semi-honest
security. Compared to existing PSI protocols, ours has a more favorable balance between …

Oblivious key-value stores and amplification for private set intersection

G Garimella, B Pinkas, M Rosulek, N Trieu… - Advances in Cryptology …, 2021 - Springer
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We
consider the more general notion of an oblivious key-value store (OKVS), which is a data …

Private set intersection in the internet setting from lightweight oblivious PRF

M Chase, P Miao - Advances in Cryptology–CRYPTO 2020: 40th Annual …, 2020 - Springer
We present a new protocol for two-party private set intersection (PSI) with semi-honest
security in the plain model and one-sided malicious security in the random oracle model …

Public key encryption with keyword search

D Boneh, G Di Crescenzo, R Ostrovsky… - Advances in Cryptology …, 2004 - Springer
We study the problem of searching on data that is encrypted using a public key system.
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An …

Efficient private matching and set intersection

MJ Freedman, K Nissim, B Pinkas - … on the theory and applications of …, 2004 - Springer
We consider the problem of computing the intersection of private datasets of two parties,
where the datasets contain lists of elements taken from a large domain. This problem has …