Privacy-preserving machine learning: Methods, challenges and directions

R Xu, N Baracaldo, J Joshi - arXiv preprint arXiv:2108.04417, 2021 - arxiv.org
Machine learning (ML) is increasingly being adopted in a wide variety of application
domains. Usually, a well-performing ML model relies on a large volume of training data and …

Searchable symmetric encryption: Designs and challenges

GS Poh, JJ Chin, WC Yau, KKR Choo… - ACM Computing …, 2017 - dl.acm.org
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Hybridalpha: An efficient approach for privacy-preserving federated learning

R Xu, N Baracaldo, Y Zhou, A Anwar… - Proceedings of the 12th …, 2019 - dl.acm.org
Federated learning has emerged as a promising approach for collaborative and privacy-
preserving learning. Participants in a federated learning process cooperatively train a model …

Pad-net: Multi-tasks guided prediction-and-distillation network for simultaneous depth estimation and scene parsing

D Xu, W Ouyang, X Wang… - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
Depth estimation and scene parsing are two particularly important tasks in visual scene
understanding. In this paper we tackle the problem of simultaneous depth estimation and …

A privacy-preserving federated learning for multiparty data sharing in social IoTs

L Yin, J Feng, H Xun, Z Sun… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As 5G and mobile computing are growing rapidly, deep learning services in the Social
Computing and Social Internet of Things (IoT) have enriched our lives over the past few …

[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

Sok: Secure aggregation based on cryptographic schemes for federated learning

M Mansouri, M Önen, WB Jaballah… - Proceedings on Privacy …, 2023 - petsymposium.org
Secure aggregation consists of computing the sum of data collected from multiple sources
without disclosing these individual inputs. Secure aggregation has been found useful for …

Order-revealing encryption: New constructions, applications, and lower bounds

K Lewi, DJ Wu - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
In the last few years, there has been significant interest in developing methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …

Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation

D Boneh, K Lewi, M Raykova, A Sahai… - … Conference on the …, 2015 - Springer
Deciding “greater-than” relations among data items just given their encryptions is at the
heart of search algorithms on encrypted data, most notably, non-interactive binary search on …