Chameleon: A hybrid secure computation framework for machine learning applications

MS Riazi, C Weinert, O Tkachenko… - Proceedings of the …, 2018 - dl.acm.org
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function
evaluation (SFE) which enables two parties to jointly compute a function without disclosing …

Secure multi-party computation: theory, practice and applications

C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li… - Information Sciences, 2019 - Elsevier
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …

Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

Tinygarble: Highly compressed and scalable sequential garbled circuits

EM Songhori, SU Hussain, AR Sadeghi… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We introduce Tiny Garble, a novel automated methodology based on powerful logic
synthesis techniques for generating and optimizing compressed Boolean circuits used in …

HyCC: Compilation of hybrid protocols for practical secure computation

N Büscher, D Demmler, S Katzenbeisser… - Proceedings of the …, 2018 - dl.acm.org
While secure multi-party computation (MPC) is a vibrant research topic and a multitude of
practical MPC applications have been presented recently, their development is still a tedious …

Frigate: A validated, extensible, and efficient compiler and interpreter for secure computation

B Mood, D Gupta, H Carter, K Butler… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
Recent developments in secure computation have led to significant improvementsin
efficiency and functionality. These efforts created compilers that form thebackbone of …

Secure outsourced garbled circuit evaluation for mobile devices

H Carter, B Mood, P Traynor… - Journal of Computer …, 2016 - content.iospress.com
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the
privacy of each user's inputs. While recent research has made the use of this primitive more …

Combining differential privacy and secure multiparty computation

M Pettai, P Laud - Proceedings of the 31st annual computer security …, 2015 - dl.acm.org
We consider how to perform privacy-preserving analyses on private data from different data
providers and containing personal information of many different individuals. We combine …

PILOT: Practical privacy-preserving indoor localization using outsourcing

K Järvinen, H Leppäkoski, ES Lohan… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
In the last decade, we observed a constantly growing number of Location-Based Services
(LBSs) used in indoor environments, such as for targeted advertising in shopping malls or …

Privacy-preserving shortest path computation

DJ Wu, J Zimmerman, J Planul, JC Mitchell - arXiv preprint arXiv …, 2016 - arxiv.org
Navigation is one of the most popular cloud computing services. But in virtually all cloud-
based navigation systems, the client must reveal her location and destination to the cloud …