Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and …
We present CrypTFlow2, a cryptographic framework for secure inference over realistic Deep Neural Networks (DNNs) using secure 2-party computation. CrypTFlow2 protocols are both …
Important decisions about people are increasingly made by algorithms: Votes are counted; voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
We consider the problem of extending oblivious transfers: Given a small number of oblivious transfers “for free,” can one implement a large number of oblivious transfers? Beaver has …
G Brassard, D Chaum, C Crépeau - Journal of computer and system …, 1988 - Elsevier
Protocols are given for allowing a “prover” to convince a “verifier” that the prover knows some verifiable secret information, without allowing the verifier to learn anything about the …
CA Melchor, J Barrier, L Fousse… - Proceedings on Privacy …, 2016 - hal.science
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators. PIR can be achieved …
M Naor, B Pinkas - Proceedings of the thirty-first annual ACM symposium …, 1999 - dl.acm.org
We describe efficient constructions for two oblivious twoparty computation problems: l-out-of- N Oblivious Transfer &d 'Oblivious Poly&nial Evaluation. The oblivious polynomial …
B Aiello, Y Ishai, O Reingold - International Conference on the Theory and …, 2001 - Springer
We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a vendor without …
This handbook provides an up-to-date compendium of fundamental computer science topics, techniques, and applications. Along with updating and revising many of the existing …