Preserving privacy in speaker and speech characterisation
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Chameleon: A hybrid secure computation framework for machine learning applications
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function
evaluation (SFE) which enables two parties to jointly compute a function without disclosing …
evaluation (SFE) which enables two parties to jointly compute a function without disclosing …
Secure multi-party computation: theory, practice and applications
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
Oblivious {Multi-Party} machine learning on trusted processors
Privacy-preserving multi-party machine learning allows multiple organizations to perform
collaborative data analytics while guaranteeing the privacy of their individual datasets …
collaborative data analytics while guaranteeing the privacy of their individual datasets …
[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …
their private inputs without revealing anything but the function's output. Generic secure …
Accountable algorithms
JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
Prio: Private, robust, and scalable computation of aggregate statistics
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
Cryptflow: Secure tensorflow inference
We present CrypTFlow, a first of its kind system that converts TensorFlow inference code into
Secure Multi-party Computation (MPC) protocols at the push of a button. To do this, we build …
Secure Multi-party Computation (MPC) protocols at the push of a button. To do this, we build …