Efficient pseudorandom correlation generators: Silent OT extension and more

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Advances in Cryptology …, 2019 - Springer
Secure multiparty computation (MPC) often relies on correlated randomness for better
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …

Efficient pseudorandom correlation generators from ring-LPN

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Advances in Cryptology …, 2020 - Springer
Secure multiparty computation can often utilize a trusted source of correlated randomness to
achieve better efficiency. A recent line of work, initiated by Boyle et al.(CCS 2018, Crypto …

Trapdoor hash functions and their applications

N Döttling, S Garg, Y Ishai, G Malavolta, T Mour… - Annual International …, 2019 - Springer
We introduce a new primitive, called trapdoor hash functions (TDH), which are hash
functions H:{0, 1\}^ n → {0, 1\}^ λ with additional trapdoor function-like properties …

Function secret sharing for mixed-mode and fixed-point secure computation

E Boyle, N Chandran, N Gilboa, D Gupta… - … Conference on the …, 2021 - Springer
Abstract Boyle et al.(TCC 2019) proposed a new approach for secure computation in the
preprocessing model building on function secret sharing (FSS), where a gate g is evaluated …

Secure computation with preprocessing via function secret sharing

E Boyle, N Gilboa, Y Ishai - … TCC 2019, Nuremberg, Germany, December 1 …, 2019 - Springer
We propose a simple and powerful new approach for secure computation with input-
independent preprocessing, building on the general tool of function secret sharing (FSS) …

Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation

M De Cock, R Dowsley, C Horst, R Katti… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Many data-driven personalized services require that private data of users is scored against a
trained machine learning model. In this paper we propose a novel protocol for privacy …

FLUTE: fast and secure lookup table evaluations

A Brüggemann, R Hundt, T Schneider… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The concept of using Lookup Tables (LUTs) instead of Boolean circuits is well-known and
been widely applied in a variety of applications, including FPGAs, image processing, and …

Sigma: Secure gpt inference with function secret sharing

K Gupta, N Jawalkar, A Mukherjee… - Cryptology ePrint …, 2023 - eprint.iacr.org
Abstract Secure 2-party computation (2PC) enables secure inference that offers protection
for both proprietary machine learning (ML) models and sensitive inputs to them. However …

High performance logistic regression for privacy-preserving genome analysis

M De Cock, R Dowsley, ACA Nascimento… - BMC Medical …, 2021 - Springer
Background In biomedical applications, valuable data is often split between owners who
cannot openly share the data because of privacy regulations and concerns. Training …

Circuits resilient to additive attacks with applications to secure computation

D Genkin, Y Ishai, MM Prabhakaran, A Sahai… - Proceedings of the forty …, 2014 - dl.acm.org
We study the question of protecting arithmetic circuits against additive attacks, which can
add an arbitrary fixed value to each wire in the circuit. This extends the notion of algebraic …