[HTML][HTML] Private set intersection: A systematic literature review

D Morales, I Agudo, J Lopez - Computer Science Review, 2023‏ - Elsevier
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …

Feature inference attack on model predictions in vertical federated learning

X Luo, Y Wu, X **ao, BC Ooi - 2021 IEEE 37th international …, 2021‏ - ieeexplore.ieee.org
Federated learning (FL) is an emerging paradigm for facilitating multiple organizations' data
collaboration without revealing their private data to each other. Recently, vertical FL, where …

{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation

A Patra, T Schneider, A Suresh, H Yalame - 30th USENIX Security …, 2021‏ - usenix.org
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018‏ - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Privacy preserving vertical federated learning for tree-based models

Y Wu, S Cai, X **ao, G Chen, BC Ooi - arxiv preprint arxiv:2008.06170, 2020‏ - arxiv.org
Federated learning (FL) is an emerging paradigm that enables multiple organizations to
jointly train a model without revealing their private data to each other. This paper studies {\it …

Fast private set intersection from homomorphic encryption

H Chen, K Laine, P Rindal - Proceedings of the 2017 ACM SIGSAC …, 2017‏ - dl.acm.org
Private Set Intersection (PSI) is a cryptographic technique that allows two parties to compute
the intersection of their sets without revealing anything except the intersection. We use fully …

MASCOT: faster malicious arithmetic secure computation with oblivious transfer

M Keller, E Orsini, P Scholl - Proceedings of the 2016 ACM SIGSAC …, 2016‏ - dl.acm.org
We consider the task of secure multi-party computation of arithmetic circuits over a finite
field. Unlike Boolean circuits, arithmetic circuits allow natural computations on integers to be …

Efficient batched oblivious PRF with applications to private set intersection

V Kolesnikov, R Kumaresan, M Rosulek… - Proceedings of the 2016 …, 2016‏ - dl.acm.org
We describe a lightweight protocol for oblivious evaluation of a pseudorandom function
(OPRF) in the presence of semihonest adversaries. In an OPRF protocol a receiver has an …

SpOT-light: lightweight private set intersection from sparse OT extension

B Pinkas, M Rosulek, N Trieu, A Yanai - … Barbara, CA, USA, August 18–22 …, 2019‏ - Springer
We describe a novel approach for two-party private set intersection (PSI) with semi-honest
security. Compared to existing PSI protocols, ours has a more favorable balance between …

Efficient two-round OT extension and silent non-interactive secure computation

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Proceedings of the …, 2019‏ - dl.acm.org
We consider the problem of securely generating useful instances of two-party correlations,
such as many independent copies of a random oblivious transfer (OT) correlation, using a …