Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations
In the era of Big Data and the advancement of the Internet of Things, there is an increasing
amount of valuable information. It is important to emphasize that this data is usually sensitive …
amount of valuable information. It is important to emphasize that this data is usually sensitive …
Combine: compilation and backend-independent vectorization for multi-party computation
B Levy, M Ishaq, B Sherman, L Kennard… - Proceedings of the …, 2023 - dl.acm.org
Recent years have witnessed significant advances in programming technology for multi-
party computation (MPC), bringing MPC closer to practice and wider applicability. Typical …
party computation (MPC), bringing MPC closer to practice and wider applicability. Typical …
CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction
S Bian, Z Zhao, R Shen, Z Zhang, R Mao, D Li… - Cryptology ePrint …, 2024 - eprint.iacr.org
This work proposes a multi-level compiler framework to transform programs with loop
structures to efficient algorithms over fully homomorphic encryption (FHE). We observe that …
structures to efficient algorithms over fully homomorphic encryption (FHE). We observe that …
Smaug: Modular Augmentation of LLVM for MPC
Secure multi-party computation (MPC) is a crucial tool for privacy-preserving computation,
but it is getting increasingly complicated due to recent advancements and optimizations …
but it is getting increasingly complicated due to recent advancements and optimizations …
Privacy Attacks and Defenses in Machine Learning: A Survey
W Liu, X Han, M He - … Conference on Computer Engineering and Networks, 2023 - Springer
As machine learning has gradually become an important technology in the field of artificial
intelligence, its development is also facing challenges in terms of privacy. This article aims to …
intelligence, its development is also facing challenges in terms of privacy. This article aims to …
[PDF][PDF] POSTER: SEEC–Memory Safety Meets Efficiency in Secure Two-Party Computation
RW Hundt, N Khayata, T Schneider - encrypto.de
ABSTRACT Secure Multi-Party Computation (MPC) allows multiple parties to perform
privacy-preserving computation on their private data. MPC protocols based on secret …
privacy-preserving computation on their private data. MPC protocols based on secret …