Elsa: Secure aggregation for federated learning with malicious actors

M Rathee, C Shen, S Wagh… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is an increasingly popular approach for machine learning (ML) in
cases where the training dataset is highly distributed. Clients perform local training on their …

Sirnn: A math library for secure rnn inference

D Rathee, M Rathee, RKK Goli, D Gupta… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Complex machine learning (ML) inference algorithms like recurrent neural networks (RNNs)
use standard functions from math libraries like exponentiation, sigmoid, tanh, and reciprocal …

Orca: Fss-based secure training and inference with gpus

N Jawalkar, K Gupta, A Basu… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Secure Two-party Computation (2PC) allows two parties to compute any function on their
private inputs without revealing their inputs to each other. In the offline/on-line model for …

Waldo: A private time-series database from function secret sharing

E Dauterman, M Rathee, RA Popa… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Applications today rely on cloud databases for storing and querying time-series data. While
outsourcing storage is convenient, this data is often sensitive, making data breaches a …

Authenticated private information retrieval

S Colombo, K Nikitin, H Corrigan-Gibbs… - 32nd USENIX security …, 2023 - usenix.org
This paper introduces protocols for authenticated private information retrieval. These
schemes enable a client to fetch a record from a remote database server such that (a) the …

Correlated pseudorandomness from expand-accumulate codes

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Annual International …, 2022 - Springer
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful
sources of correlated randomness, such as random oblivious transfers (OT) and vector …

Concretely efficient secure multi-party computation protocols: survey and more

D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …

Ariann: Low-interaction privacy-preserving deep learning via function secret sharing

T Ryffel, P Tholoniat, D Pointcheval, F Bach - arXiv preprint arXiv …, 2020 - arxiv.org
We propose AriaNN, a low-interaction privacy-preserving framework for private neural
network training and inference on sensitive data. Our semi-honest 2-party computation …

Sigma: Secure gpt inference with function secret sharing

K Gupta, N Jawalkar, A Mukherjee… - Cryptology ePrint …, 2023 - eprint.iacr.org
Abstract Secure 2-party computation (2PC) enables secure inference that offers protection
for both proprietary machine learning (ML) models and sensitive inputs to them. However …

Llama: A low latency math library for secure inference

K Gupta, D Kumaraswamy, N Chandran… - Cryptology ePrint …, 2022 - eprint.iacr.org
Secure machine learning (ML) inference can provide meaningful privacy guarantees to both
the client (holding sensitive input) and the server (holding sensitive weights of the ML …