{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …
their private inputs without revealing anything but the function's output. Generic secure …
Machine learning classification over encrypted data
Abstract Machine learning classification is used in numerous settings nowadays, such as
medical or genomics predictions, spam detection, face recognition, and financial predictions …
medical or genomics predictions, spam detection, face recognition, and financial predictions …
Privacy-preserving ridge regression on hundreds of millions of records
Ridge regression is an algorithm that takes as input a large number of data points and finds
the best-fit linear curve through these points. The algorithm is a building block for many …
the best-fit linear curve through these points. The algorithm is a building block for many …
More efficient oblivious transfer and extensions for faster secure computation
Protocols for secure computation enable parties to compute a joint function on their private
inputs without revealing anything but the result. A foundation for secure computation is …
inputs without revealing anything but the result. A foundation for secure computation is …
Faster secure {Two-Party} computation using garbled circuits
Secure two-party computation enables two parties to evaluate a function cooperatively
without revealing to either party anything beyond the function's output. The garbled-circuit …
without revealing to either party anything beyond the function's output. The garbled-circuit …
[PDF][PDF] Private set intersection: Are garbled circuits better than custom protocols?
Abstract Cryptographic protocols for Private Set Intersection (PSI) are the basis for many
important privacy-preserving applications. Over the past few years, intensive research has …
important privacy-preserving applications. Over the past few years, intensive research has …
Bumblebee: Secure two-party inference framework for large transformers
Large transformer-based models have realized state-of-the-art performance on lots of real-
world tasks such as natural language processing and computer vision. However, with the …
world tasks such as natural language processing and computer vision. However, with the …
Privacy-preserving matrix factorization
Recommender systems typically require users to reveal their ratings to a recommender
service, which subsequently uses them to provide relevant recommendations. Revealing …
service, which subsequently uses them to provide relevant recommendations. Revealing …