When federated learning meets privacy-preserving computation

J Chen, H Yan, Z Liu, M Zhang, H Xiong… - ACM Computing Surveys, 2024 - dl.acm.org
Nowadays, with the development of artificial intelligence (AI), privacy issues attract wide
attention from society and individuals. It is desirable to make the data available but invisible …

[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications

H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …

{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation

A Patra, T Schneider, A Suresh, H Yalame - 30th USENIX Security …, 2021 - usenix.org
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Chameleon: A hybrid secure computation framework for machine learning applications

MS Riazi, C Weinert, O Tkachenko… - Proceedings of the …, 2018 - dl.acm.org
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function
evaluation (SFE) which enables two parties to jointly compute a function without disclosing …

Wolverine: fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits

C Weng, K Yang, J Katz, X Wang - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Efficient zero-knowledge (ZK) proofs for arbitrary boolean or arithmetic circuits have recently
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …

Trident: Efficient 4pc framework for privacy preserving machine learning

H Chaudhari, R Rachuri, A Suresh - arXiv preprint arXiv:1912.02631, 2019 - arxiv.org
Machine learning has started to be deployed in fields such as healthcare and finance, which
propelled the need for and growth of privacy-preserving machine learning (PPML). We …

BLAZE: blazing fast privacy-preserving machine learning

A Patra, A Suresh - arXiv preprint arXiv:2005.09042, 2020 - arxiv.org
Machine learning tools have illustrated their potential in many significant sectors such as
healthcare and finance, to aide in deriving useful inferences. The sensitive and confidential …

Fantastic four:{Honest-Majority}{Four-Party} secure computation with malicious security

A Dalskov, D Escudero, M Keller - 30th USENIX Security Symposium …, 2021 - usenix.org
This work introduces a novel four-party honest-majority MPC protocol with active security
that achieves comparable efficiency to equivalent protocols in the same setting, while having …

Mystique: Efficient conversions for {Zero-Knowledge} proofs with applications to machine learning

C Weng, K Yang, X Xie, J Katz, X Wang - 30th USENIX Security …, 2021 - usenix.org
Recent progress in interactive zero-knowledge (ZK) proofs has improved the efficiency of
proving large-scale computations significantly. Nevertheless, real-life applications (eg, in the …