Computational complexity: a conceptual perspective

O Goldreich - ACM Sigact News, 2008 - dl.acm.org
This book is rooted in the thesis that complexity theory is extremely rich in conceptual
content, and that this contents should be explicitly communicated in expositions and courses …

[HTML][HTML] On the privacy-conscientious use of mobile phone data

YA De Montjoye, S Gambs, V Blondel, G Canright… - Scientific data, 2018 - nature.com
The breadcrumbs we leave behind when using our mobile phones—who somebody calls,
for how long, and from where—contain unprecedented insights about us and our societies …

MP-SPDZ: A versatile framework for multi-party computation

M Keller - Proceedings of the 2020 ACM SIGSAC conference on …, 2020 - dl.acm.org
Multi-Protocol SPDZ (MP-SPDZ) is a fork of SPDZ-2 (Keller et al., CCS'13), an
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control

X Yue, H Wang, D Jin, M Li, W Jiang - Journal of medical systems, 2016 - Springer
Healthcare data are a valuable source of healthcare intelligence. Sharing of healthcare data
is one essential step to make healthcare system smarter and improve the quality of …

Secure multiparty computation

Y Lindell - Communications of the ACM, 2020 - dl.acm.org
Secure multiparty computation Page 1 86 COMMUNICATIONS OF THE ACM | JANUARY 2021 |
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …

SecureNN: 3-party secure computation for neural network training

S Wagh, D Gupta, N Chandran - Proceedings on Privacy …, 2019 - petsymposium.org
Neural Networks (NN) provide a powerful method for machine learning training and
inference. To effectively train, it is desirable for multiple parties to combine their data …

High-throughput semi-honest secure three-party computation with an honest majority

T Araki, J Furukawa, Y Lindell, A Nof… - Proceedings of the 2016 …, 2016 - dl.acm.org
In this paper, we describe a new information-theoretic protocol (and a computationally-
secure variant) for secure three-party computation with an honest majority. The protocol has …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption

A López-Alt, E Tromer, V Vaikuntanathan - Proceedings of the forty …, 2012 - dl.acm.org
We propose a new notion of secure multiparty computation aided by a computationally-
powerful but untrusted" cloud" server. In this notion that we call on-the-fly multiparty …