Privacy-enhancing technologies in biomedical data science
The rapidly growing scale and variety of biomedical data repositories raise important privacy
concerns. Conventional frameworks for collecting and sharing human subject data offer …
concerns. Conventional frameworks for collecting and sharing human subject data offer …
Piranha: A {GPU} platform for secure computation
Secure multi-party computation (MPC) is an essential tool for privacy-preserving machine
learning (ML). However, secure training of large-scale ML models currently requires a …
learning (ML). However, secure training of large-scale ML models currently requires a …
Pika: Secure computation using function secret sharing over rings
S Wagh - Proceedings on Privacy Enhancing Technologies, 2022 - petsymposium.org
Machine learning algorithms crucially depend on non-linear mathematical functions such as
division (for normalization), exponentiation (for softmax and sigmoid), tanh (as an activation …
division (for normalization), exponentiation (for softmax and sigmoid), tanh (as an activation …
Prime Match: A {Privacy-Preserving} Inventory Matching System
A Polychroniadou, G Asharov, B Diamond… - 32nd USENIX Security …, 2023 - usenix.org
Inventory matching is a standard mechanism for trading financial stocks by which buyers
and sellers can be paired. In the financial world, banks often undertake the task of finding …
and sellers can be paired. In the financial world, banks often undertake the task of finding …
Asterisk: Super-fast MPC with a Friend
Secure multiparty computation (MPC) enables privacy-preserving collaborative computation
over sensitive data held by multiple mutually distrusting parties. Unfortunately, in the most …
over sensitive data held by multiple mutually distrusting parties. Unfortunately, in the most …
Efficient lattice-based threshold signatures with functional interchangeability
G Tang, B Pang, L Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
A threshold signature scheme distributes the ability to generate signatures through
distributed key generation and signing protocols. A threshold signature scheme should be …
distributed key generation and signing protocols. A threshold signature scheme should be …
[PDF][PDF] An efficient multi-signature scheme for blockchain
Blockchain is a newly emerging technology, however, it has proven effective in many
applications because it provides multiple advantages, mainly as it represents a trust system …
applications because it provides multiple advantages, mainly as it represents a trust system …
PLASMA: Private, lightweight aggregated statistics against malicious adversaries
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …
strings, and data-collection servers aim to identify the most popular strings without learning …
Modulonet: Neural networks meet modular arithmetic for efficient hardware masking
Intellectual Property (IP) thefts of trained machine learning (ML) models through side-
channel attacks on inference engines are becoming a major threat. Indeed, several recent …
channel attacks on inference engines are becoming a major threat. Indeed, several recent …
Artificial intelligence for cyber security: Current trends and future challenges
Artificial intelligence (AI) has helped industries and society today to become modern and
more productive. Using the Internet of Things (IoT), we can sense and transfer data through …
more productive. Using the Internet of Things (IoT), we can sense and transfer data through …