Prio: Private, robust, and scalable computation of aggregate statistics

H Corrigan-Gibbs, D Boneh - 14th USENIX symposium on networked …, 2017 - usenix.org
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …

Trident: Efficient 4pc framework for privacy preserving machine learning

H Chaudhari, R Rachuri, A Suresh - arXiv preprint arXiv:1912.02631, 2019 - arxiv.org
Machine learning has started to be deployed in fields such as healthcare and finance, which
propelled the need for and growth of privacy-preserving machine learning (PPML). We …

BLAZE: blazing fast privacy-preserving machine learning

A Patra, A Suresh - arXiv preprint arXiv:2005.09042, 2020 - arxiv.org
Machine learning tools have illustrated their potential in many significant sectors such as
healthcare and finance, to aide in deriving useful inferences. The sensitive and confidential …

Multiparty computation from somewhat homomorphic encryption

I Damgård, V Pastro, N Smart, S Zakarias - Annual Cryptology Conference, 2012 - Springer
We propose a general multiparty computation protocol secure against an active adversary
corrupting up to n-1 of the n players. The protocol may be used to compute securely …

Efficient circuit-based PSI with linear communication

B Pinkas, T Schneider, O Tkachenko… - Advances in Cryptology …, 2019 - Springer
We present a new protocol for computing a circuit which implements the private set
intersection functionality (PSI). Using circuits for this task is advantageous over the usage of …

[图书][B] Secure multiparty computation

R Cramer, IB Damgård - 2015 - books.google.com
In a data-driven society, individuals and companies encounter numerous situations where
private information is an important resource. How can parties handle confidential data if they …

Fast large-scale honest-majority MPC for malicious adversaries

K Chida, K Hamada, D Ikarashi, R Kikuchi… - Journal of …, 2023 - Springer
Protocols for secure multiparty computation enable a set of parties to compute a function of
their inputs without revealing anything but the output. The security properties of the protocol …

Experimenting with collaborative {zk-SNARKs}:{Zero-Knowledge} proofs for distributed secrets

A Ozdemir, D Boneh - … USENIX Security Symposium (USENIX Security 22 …, 2022 - usenix.org
A zk-SNARK is a powerful cryptographic primitive that provides a succinct and efficiently
checkable argument that the prover has a witness to a public NP statement, without …

ASTRA: high throughput 3pc over rings with application to secure prediction

H Chaudhari, A Choudhury, A Patra… - Proceedings of the 2019 …, 2019 - dl.acm.org
The concrete efficiency of secure computation has been the focus of many recent works. In
this work, we present concretely-efficient protocols for secure 3-party computation (3PC) …

Concretely efficient secure multi-party computation protocols: survey and more

D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …