Ciphergpt: Secure two-party gpt inference

X Hou, J Liu, J Li, Y Li, W Lu, C Hong… - Cryptology ePrint …, 2023 - eprint.iacr.org
ChatGPT is recognized as a significant revolution in the field of artificial intelligence, but it
raises serious concerns regarding user privacy, as the data submitted by users may contain …

Efficient secure three-party sorting with applications to data analysis and heavy hitters

G Asharov, K Hamada, D Ikarashi, R Kikuchi… - Proceedings of the …, 2022 - dl.acm.org
We present a three-party sorting protocol secure against passive and active adversaries in
the honest majority setting. The protocol can be easily combined with other secure protocols …

PeGraph: A system for privacy-preserving and efficient search over encrypted social graphs

S Wang, Y Zheng, X Jia, X Yi - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the widespread adoption of cloud computing, it is increasingly popular for online social
network (OSN) service providers to leverage the public cloud as a back-end to manage their …

Asterisk: Super-fast MPC with a Friend

B Karmakar, N Koti, A Patra… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Secure multiparty computation (MPC) enables privacy-preserving collaborative computation
over sensitive data held by multiple mutually distrusting parties. Unfortunately, in the most …

{TVA}: A multi-party computation system for secure and expressive time series analytics

M Faisal, J Zhang, J Liagouris, V Kalavri… - 32nd USENIX Security …, 2023 - usenix.org
We present TVA, a multi-party computation (MPC) system for secure analytics on secret-
shared time series data. TVA achieves strong security guarantees in the semi-honest and …

PLASMA: Private, lightweight aggregated statistics against malicious adversaries

D Mouris, P Sarkar, NG Tsoutsos - Proceedings on Privacy …, 2024 - petsymposium.org
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …

OblivGM: Oblivious attributed subgraph matching as a cloud service

S Wang, Y Zheng, X Jia, H Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In recent years there has been growing popularity of leveraging cloud computing for storing
and querying attributed graphs, which have been widely used to model complex structured …

Secgnn: Privacy-preserving graph neural network training and inference as a cloud service

S Wang, Y Zheng, X Jia - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
Graphs are widely used to model the complex relationships among entities. As a powerful
tool for graph analytics, graph neural networks (GNNs) have recently gained wide attention …

Secure statistical analysis on multiple datasets: Join and group-by

G Asharov, K Hamada, R Kikuchi, A Nof… - Proceedings of the …, 2023 - dl.acm.org
We implement a secure platform for statistical analysis over multiple organizations and
multiple datasets. We provide a suite of protocols for different variants of JOIN and GROUP …

Privacy-preserving analytics on decentralized social graphs: The case of eigendecomposition

S Wang, Y Zheng, X Jia, X Yi - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Analytics over social graphs allows to extract valuable knowledge and insights for many
fields like community detection, fraud detection, and interest mining. In practice …