Privacy-enhancing technologies in biomedical data science

H Cho, D Froelicher, N Dokmai, A Nandi… - Annual review of …, 2024 - annualreviews.org
The rapidly growing scale and variety of biomedical data repositories raise important privacy
concerns. Conventional frameworks for collecting and sharing human subject data offer …

Piranha: A {GPU} platform for secure computation

JL Watson, S Wagh, RA Popa - 31st USENIX Security Symposium …, 2022 - usenix.org
Secure multi-party computation (MPC) is an essential tool for privacy-preserving machine
learning (ML). However, secure training of large-scale ML models currently requires a …

Pika: Secure computation using function secret sharing over rings

S Wagh - Proceedings on Privacy Enhancing Technologies, 2022 - petsymposium.org
Machine learning algorithms crucially depend on non-linear mathematical functions such as
division (for normalization), exponentiation (for softmax and sigmoid), tanh (as an activation …

Prime Match: A {Privacy-Preserving} Inventory Matching System

A Polychroniadou, G Asharov, B Diamond… - 32nd USENIX Security …, 2023 - usenix.org
Inventory matching is a standard mechanism for trading financial stocks by which buyers
and sellers can be paired. In the financial world, banks often undertake the task of finding …

Asterisk: Super-fast MPC with a Friend

B Karmakar, N Koti, A Patra… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Secure multiparty computation (MPC) enables privacy-preserving collaborative computation
over sensitive data held by multiple mutually distrusting parties. Unfortunately, in the most …

Efficient lattice-based threshold signatures with functional interchangeability

G Tang, B Pang, L Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
A threshold signature scheme distributes the ability to generate signatures through
distributed key generation and signing protocols. A threshold signature scheme should be …

[PDF][PDF] An efficient multi-signature scheme for blockchain

M Kara, A Laouid, M Hammoudeh - Cryptology ePrint Archive, 2023 - iacr.steepath.eu
Blockchain is a newly emerging technology, however, it has proven effective in many
applications because it provides multiple advantages, mainly as it represents a trust system …

PLASMA: Private, lightweight aggregated statistics against malicious adversaries

D Mouris, P Sarkar, NG Tsoutsos - Proceedings on Privacy …, 2024 - petsymposium.org
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …

Modulonet: Neural networks meet modular arithmetic for efficient hardware masking

A Dubey, A Ahmad, MA Pasha… - IACR Transactions on …, 2022 - tches.iacr.org
Intellectual Property (IP) thefts of trained machine learning (ML) models through side-
channel attacks on inference engines are becoming a major threat. Indeed, several recent …

Artificial intelligence for cyber security: Current trends and future challenges

MM Nair, A Deshmukh, AK Tyagi - … Secure Computing for Next …, 2024 - Wiley Online Library
Artificial intelligence (AI) has helped industries and society today to become modern and
more productive. Using the Internet of Things (IoT), we can sense and transfer data through …