A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Privacy preserving vertical federated learning for tree-based models

Y Wu, S Cai, X Xiao, G Chen, BC Ooi - arXiv preprint arXiv:2008.06170, 2020 - arxiv.org
Federated learning (FL) is an emerging paradigm that enables multiple organizations to
jointly train a model without revealing their private data to each other. This paper studies {\it …

Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

SpOT-light: lightweight private set intersection from sparse OT extension

B Pinkas, M Rosulek, N Trieu, A Yanai - … Barbara, CA, USA, August 18–22 …, 2019 - Springer
We describe a novel approach for two-party private set intersection (PSI) with semi-honest
security. Compared to existing PSI protocols, ours has a more favorable balance between …

Scenario-based Adaptations of Differential Privacy: A Technical Survey

Y Zhao, JT Du, J Chen - ACM Computing Surveys, 2024 - dl.acm.org
Differential privacy has been a de facto privacy standard in defining privacy and handling
privacy preservation. It has had great success in scenarios of local data privacy and …

Sok: differential privacies

D Desfontaines, B Pejó - arXiv preprint arXiv:1906.01337, 2019 - arxiv.org
Shortly after it was first introduced in 2006, differential privacy became the flagship data
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …

Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …

Cryptϵ: Crypto-assisted differential privacy on untrusted servers

A Roy Chowdhury, C Wang, X He… - Proceedings of the …, 2020 - dl.acm.org
Differential privacy (DP) is currently the de-facto standard for achieving privacy in data
analysis, which is typically implemented either in the" central" or" local" model. The local …

Practical volume-hiding encrypted multi-maps with optimal overhead and beyond

J Wang, SF Sun, T Li, S Qi, X Chen - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted
extensive attention recently. However, most of EMM constructions reveal the real volumes of …

Saqe: practical privacy-preserving approximate query processing for data federations

J Bater, Y Park, X He, X Wang, J Rogers - Proceedings of the VLDB …, 2020 - dl.acm.org
A private data federation enables clients to query the union of data from multiple data
providers without revealing any extra private information to the client or any other data …