{TVA}: A multi-party computation system for secure and expressive time series analytics

M Faisal, J Zhang, J Liagouris, V Kalavri… - 32nd USENIX Security …, 2023 - usenix.org
We present TVA, a multi-party computation (MPC) system for secure analytics on secret-
shared time series data. TVA achieves strong security guarantees in the semi-honest and …

Practical Two-party Computational Differential Privacy with Active Security

F Meisingseth, C Rechberger… - Proceedings on Privacy …, 2025 - petsymposium.org
In this work we revisit the problem of using general-purpose MPC schemes to emulate the
trusted dataholder in differential privacy (DP), to achieve the same accuracy but without the …

SoK: Computational and Distributed Differential Privacy for MPC

F Meisingseth, C Rechberger - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In the last fifteen years, there has been a steady stream of works combining differential
privacy with various other cryptographic disciplines, particularly that of multi-party …

Curl: Private LLMs through Wavelet-Encoded Look-Up Tables

MB Santos, D Mouris, M Ugurbil, S Jarecki… - Cryptology ePrint …, 2024 - eprint.iacr.org
Recent advancements in transformers have revolutionized machine learning, forming the
core of Large language models (LLMs). However, integrating these systems into everyday …

SecretFlow-SCQL: A Secure Collaborative Query Platform

W Fang, S Cao, G Hua, J Ma, Y Yu, Q Huang… - Proceedings of the …, 2024 - dl.acm.org
In the business scenarios at Ant Group, there is a rising demand for collaborative data
analysis among multiple institutions, which can promote health insurance, financial services …

Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation

J von der Heyden, N Schlüter, P Binfet… - … on Smart Grid, 2024 - ieeexplore.ieee.org
Smart grids feature a bidirectional flow of electricity and data, enhancing flexibility, efficiency,
and reliability in increasingly volatile energy grids. However, data from smart meters can …

Compute, but verify: Efficient multiparty computation over authenticated inputs

M Dutta, C Ganesh, S Patranabis, N Singh - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Traditional notions of secure multiparty computation (MPC) allow mutually distrusting parties
to jointly compute a function over their private inputs, but typically do not specify how these …

SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market

R Dasgupta, A Sakzad, C Rudolph… - arXiv preprint arXiv …, 2023 - arxiv.org
In this paper, we design and present a novel model called SePEnTra to ensure the security
and privacy of energy data while sharing with other entities during energy trading to …

Toward a Framework for Cost-Effective and Publicly Verifiable Confidential Computations in Blockchain

D Morales, I Agudo, J Lopez - IEEE Communications Magazine, 2024 - ieeexplore.ieee.org
Blockchain technologies have introduced a compelling paradigm for a new understanding of
security through decentralized networks and consensus mechanisms. However, they need …

Secure and efficient code-based cryptography for multi-party computation and digital signatures

A Kichna, A Farchane - Computer Sciences & Mathematics Forum, 2023 - mdpi.com
Code-based cryptography is a promising candidate for post-quantum cryptography due to its
strong security guarantees and efficient implementations. In this paper, we explore the use …