{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation

A Patra, T Schneider, A Suresh, H Yalame - 30th USENIX Security …, 2021 - usenix.org
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Autorep: Automatic relu replacement for fast private network inference

H Peng, S Huang, T Zhou, Y Luo… - Proceedings of the …, 2023 - openaccess.thecvf.com
The growth of the Machine-Learning-As-A-Service (MLaaS) market has highlighted clients'
data privacy and security issues. Private inference (PI) techniques using cryptographic …

Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

Piranha: A {GPU} platform for secure computation

JL Watson, S Wagh, RA Popa - 31st USENIX Security Symposium …, 2022 - usenix.org
Secure multi-party computation (MPC) is an essential tool for privacy-preserving machine
learning (ML). However, secure training of large-scale ML models currently requires a …

Tinygarble: Highly compressed and scalable sequential garbled circuits

EM Songhori, SU Hussain, AR Sadeghi… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We introduce Tiny Garble, a novel automated methodology based on powerful logic
synthesis techniques for generating and optimizing compressed Boolean circuits used in …

Obliv-C: A language for extensible data-oblivious computation

S Zahur, D Evans - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Many techniques for secure or private execution depend on executing programs in a data-
oblivious way, where the same instructions execute independent of the private inputs which …

Graphsc: Parallel secure computation made easy

K Nayak, XS Wang, S Ioannidis… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
We propose introducing modern parallel programming paradigms to secure computation,
enabling their secure execution on large datasets. To address this challenge, we present …

Extended Kalman filter-based parallel dynamic state estimation

H Karimipour, V Dinavahi - IEEE transactions on smart grid, 2015 - ieeexplore.ieee.org
There is a growing need for accurate and efficient real-time state estimation with increasing
complexity, interconnection, and insertion of new devices in power systems. In this paper, a …

Sigma: Secure gpt inference with function secret sharing

K Gupta, N Jawalkar, A Mukherjee… - Cryptology ePrint …, 2023 - eprint.iacr.org
Abstract Secure 2-party computation (2PC) enables secure inference that offers protection
for both proprietary machine learning (ML) models and sensitive inputs to them. However …