3-party adversarial cryptography

I Meraouche, S Dutta, K Sakurai - Advances in Internet, Data and Web …, 2020 - Springer
… Networks capable of operating different cryptographic tasks. In this paper, … In this paper we
will focus on a 3-Party case. … We presented our method to make a 3-party adversarial network …

3-party adversarial steganography

I Meraouche, S Dutta, K Sakurai - International Conference on Information …, 2020 - Springer
Adversarial steganography was also derived from adversarial cryptography. It aims to hide
information inside an image. The setup is the same but the goal is to hide a plaintext inside …

Secure multi-party multi-key adversarial cryptography using gan

JJ Justus - 2024 3rd International Conference on Artificial …, 2024 - ieeexplore.ieee.org
… [16] propose a 3-party adversarial encryption scheme akin to Abadi and Andersen [5],
establishing encrypted communication with neural networks involving Alice, Bob, and Charlie. The …

SecureNN: 3-party secure computation for neural network training

S Wagh, D Gupta, N Chandran - Proceedings on Privacy …, 2019 - petsymposium.org
adversary in the protocol is indistinguishable. For our protocols, we prove that they satisfy
privacy against a malicious adversary … Our protocol relies on standard cryptographic technique …

Revisiting fairness in MPC: polynomial number of parties and general adversarial structures

D Dachman-Soled - … of Cryptography: 18th International Conference, TCC …, 2020 - Springer
… Gordon and Katz [21] present fair protocols for 3-party majority and for the OR function (and
by symmetry for the AND function) for any polynomial n number of parties and \(n-1\) or fewer …

3-party secure computation for rams: optimal and concretely efficient

A Ichikawa, I Komargodski, K Hamada… - Theory of Cryptography …, 2023 - Springer
… Optimal 3-Party DORAM: We present an asymptotically optimal and concretely efficient 3-party
give our optimal 3-party DORAM that is secure against a passive adversary who colludes …

Learning multi-party adversarial encryption and its application to secret sharing

I Meraouche, S Dutta, SK Mohanty, I Agudo… - IEEE …, 2022 - ieeexplore.ieee.org
… Based on the perfectly secure adversarial encryption model proposed by Li et al. [4], we
extend the 3-party adversarial cryptography model [6] to an information theoretic secure multi-…

An efficient 3-party framework for privacy-preserving neural network inference

L Shen, X Chen, J Shi, Y Dong, B Fang - European Symposium on …, 2020 - Springer
… to neural networks and cryptographic building blocks. An … 4 we propose our efficient 3-party
protocol constructions. Then… In our protocols, we consider an adversary who can corrupt …

Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs

E Boyle, N Gilboa, Y Ishai, A Nof - … of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
… with stronger security against a malicious adversary. … within the applied cryptography
and security community in … Let R be a finite ring and let f be a 3-party functionality computed …

Meteor: improved secure 3-party neural network inference with reducing online communication costs

Y Dong, C Xiaojun, W Jing, L Kaiyun… - Proceedings of the ACM …, 2023 - dl.acm.org
adversary in honest-majority. The main contributions of Meteor are two-fold: i) We propose
a new and improved 3-party … protocols for the basic cryptographic primitives, including linear …