Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Secureml: A system for scalable privacy-preserving machine learning

P Mohassel, Y Zhang - 2017 IEEE symposium on security and …, 2017 - ieeexplore.ieee.org
Machine learning is widely used in practice to produce predictive models for applications
such as image processing, speech and text recognition. These models are more accurate …

CryptGPU: Fast privacy-preserving machine learning on the GPU

S Tan, B Knott, Y Tian, DJ Wu - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
We introduce CryptGPU, a system for privacy-preserving machine learning that implements
all operations on the GPU (graphics processing unit). Just as GPUs played a pivotal role in …

Autorep: Automatic relu replacement for fast private network inference

H Peng, S Huang, T Zhou, Y Luo… - Proceedings of the …, 2023 - openaccess.thecvf.com
The growth of the Machine-Learning-As-A-Service (MLaaS) market has highlighted clients'
data privacy and security issues. Private inference (PI) techniques using cryptographic …

On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption

A López-Alt, E Tromer, V Vaikuntanathan - Proceedings of the forty …, 2012 - dl.acm.org
We propose a new notion of secure multiparty computation aided by a computationally-
powerful but untrusted" cloud" server. In this notion that we call on-the-fly multiparty …

Foundations of garbled circuits

M Bellare, VT Hoang, P Rogaway - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Garbled circuits, a classical idea rooted in the work of Yao, have long been understood as a
cryptographic technique, not a cryptographic goal. Here we cull out a primitive …

Multiparty computation with low communication, computation and interaction via threshold FHE

G Asharov, A Jain, A López-Alt, E Tromer… - Advances in Cryptology …, 2012 - Springer
Fully homomorphic encryption (FHE) enables secure computation over the encrypted data of
a single party. We explore how to extend this to multiple parties, using threshold fully …

An efficient privacy-preserving outsourced calculation toolkit with multiple keys

X Liu, RH Deng, KKR Choo… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation
under multiple encrypted keys (EPOM). Using EPOM, a large scale of users can securely …

Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation

RL Lagendijk, Z Erkin, M Barni - IEEE Signal Processing …, 2012 - ieeexplore.ieee.org
In recent years, signal processing applications that deal with user-related data have aroused
privacy concerns. For instance, face recognition and personalized recommendations rely on …

Conclave: secure multi-party computation on big data

N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …