{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation

A Patra, T Schneider, A Suresh, H Yalame - 30th USENIX Security …, 2021 - usenix.org
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.

D Demmler, T Schneider, M Zohner - NDSS, 2015 - encrypto.de
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …

Machine learning classification over encrypted data

R Bost, RA Popa, S Tu, S Goldwasser - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Abstract Machine learning classification is used in numerous settings nowadays, such as
medical or genomics predictions, spam detection, face recognition, and financial predictions …

Privacy-preserving ridge regression on hundreds of millions of records

V Nikolaenko, U Weinsberg, S Ioannidis… - … IEEE symposium on …, 2013 - ieeexplore.ieee.org
Ridge regression is an algorithm that takes as input a large number of data points and finds
the best-fit linear curve through these points. The algorithm is a building block for many …

More efficient oblivious transfer and extensions for faster secure computation

G Asharov, Y Lindell, T Schneider… - Proceedings of the 2013 …, 2013 - dl.acm.org
Protocols for secure computation enable parties to compute a joint function on their private
inputs without revealing anything but the result. A foundation for secure computation is …

Faster secure {Two-Party} computation using garbled circuits

Y Huang, D Evans, J Katz, L Malka - 20th USENIX Security Symposium …, 2011 - usenix.org
Secure two-party computation enables two parties to evaluate a function cooperatively
without revealing to either party anything beyond the function's output. The garbled-circuit …

[PDF][PDF] Private set intersection: Are garbled circuits better than custom protocols?

Y Huang, D Evans, J Katz - NDSS, 2012 - homes.luddy.indiana.edu
Abstract Cryptographic protocols for Private Set Intersection (PSI) are the basis for many
important privacy-preserving applications. Over the past few years, intensive research has …

Bumblebee: Secure two-party inference framework for large transformers

W Lu, Z Huang, Z Gu, J Li, J Liu, C Hong… - Cryptology ePrint …, 2023 - eprint.iacr.org
Large transformer-based models have realized state-of-the-art performance on lots of real-
world tasks such as natural language processing and computer vision. However, with the …

Privacy-preserving matrix factorization

V Nikolaenko, S Ioannidis, U Weinsberg… - Proceedings of the …, 2013 - dl.acm.org
Recommender systems typically require users to reveal their ratings to a recommender
service, which subsequently uses them to provide relevant recommendations. Revealing …