Trusted AI in multiagent systems: An overview of privacy and security for distributed learning

C Ma, J Li, K Wei, B Liu, M Ding, L Yuan… - Proceedings of the …, 2023 - ieeexplore.ieee.org
Motivated by the advancing computational capacity of distributed end-user equipment (UE),
as well as the increasing concerns about sharing private data, there has been considerable …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Scalable private set intersection based on OT extension

B Pinkas, T Schneider, M Zohner - ACM Transactions on Privacy and …, 2018 - dl.acm.org
Private set intersection (PSI) allows two parties to compute the intersection of their sets
without revealing any information about items that are not in the intersection. It is one of the …

Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

[图书][B] Efficient secure two-party protocols: Techniques and constructions

C Hazay, Y Lindell - 2010 - books.google.com
In the setting of multiparty computation, sets of two or more parties with p-vate inputs wish to
jointly compute some (predetermined) function of their inputs. The computation should be …

Private set intersection for unequal set sizes with mobile applications

Á Kiss, J Liu, T Schneider, N Asokan… - Privacy Enhancing …, 2017 - research.aalto.fi
Private set intersection (PSI) is a cryptographic technique that is applicable to many privacy-
sensitive scenarios. For decades, researchers have been focusing on improving its …

Scaling private set intersection to billion-element sets

S Kamara, P Mohassel, M Raykova… - … Cryptography and Data …, 2014 - Springer
We examine the feasibility of private set intersection (PSI) over massive datasets. PSI, which
allows two parties to find the intersection of their sets without revealing them to each other …

Founding cryptography on tamper-proof hardware tokens

V Goyal, Y Ishai, A Sahai, R Venkatesan… - Theory of Cryptography …, 2010 - Springer
A number of works have investigated using tamper-proof hardware tokens as tools to
achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered …

Physically uncloneable functions in the universal composition framework

C Brzuska, M Fischlin, H Schröder… - Advances in Cryptology …, 2011 - Springer
Recently, there have been numerous works about hardwareassisted cryptographic
protocols, either improving previous constructions in terms of efficiency, or in terms of …

Privately computing set-union and set-intersection cardinality via bloom filters

R Egert, M Fischlin, D Gens, S Jacob, M Senker… - Information Security and …, 2015 - Springer
In this paper we propose a new approach to privately compute the set-union cardinality and
the set-intersection cardinality among multiple honest-but-curious parties. Our approach is …