Secure multi-party computation problems and their applications: a review and open problems
The growth of the Internet has triggered tremendous opportunities for cooperative
computation, where people are jointly conducting computation tasks based on the private …
computation, where people are jointly conducting computation tasks based on the private …
[HTML][HTML] Private set intersection: A systematic literature review
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …
parties to compute a function on their private inputs, obtaining the output at the end and …
Cheetah: Lean and fast secure {Two-Party} deep neural network inference
Secure two-party neural network inference (2PC-NN) can offer privacy protection for both the
client and the server and is a promising technique in the machine-learning-as-a-service …
client and the server and is a promising technique in the machine-learning-as-a-service …
Accountable algorithms
JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
Privacy-preserving classification on deep neural network
H Chabanne, A De Wargny, J Milgram… - Cryptology ePrint …, 2017 - eprint.iacr.org
Neural Networks (NN) are today increasingly used in Machine Learning where they have
become deeper and deeper to accurately model or classify high-level abstractions of data …
become deeper and deeper to accurately model or classify high-level abstractions of data …
SpOT-light: lightweight private set intersection from sparse OT extension
We describe a novel approach for two-party private set intersection (PSI) with semi-honest
security. Compared to existing PSI protocols, ours has a more favorable balance between …
security. Compared to existing PSI protocols, ours has a more favorable balance between …
Oblivious key-value stores and amplification for private set intersection
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
Private set intersection in the internet setting from lightweight oblivious PRF
We present a new protocol for two-party private set intersection (PSI) with semi-honest
security in the plain model and one-sided malicious security in the random oracle model …
security in the plain model and one-sided malicious security in the random oracle model …
Public key encryption with keyword search
We study the problem of searching on data that is encrypted using a public key system.
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An …
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An …
Efficient private matching and set intersection
We consider the problem of computing the intersection of private datasets of two parties,
where the datasets contain lists of elements taken from a large domain. This problem has …
where the datasets contain lists of elements taken from a large domain. This problem has …