Conclave: secure multi-party computation on big data
N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …
computations without revealing private data. Current MPC algorithms scale poorly with data …
[PDF][PDF] FLGUARD: Secure and Private Federated Learning.
Recently, a number of backdoor attacks against Federated Learning (FL) have been
proposed. In such attacks, an adversary injects poisoned model updates into the federated …
proposed. In such attacks, an adversary injects poisoned model updates into the federated …
Combining differential privacy and secure multiparty computation
M Pettai, P Laud - Proceedings of the 31st annual computer security …, 2015 - dl.acm.org
We consider how to perform privacy-preserving analyses on private data from different data
providers and containing personal information of many different individuals. We combine …
providers and containing personal information of many different individuals. We combine …
An efficient secure three-party sorting protocol with an honest majority
K Chida, K Hamada, D Ikarashi, R Kikuchi… - Cryptology ePrint …, 2019 - eprint.iacr.org
We present a novel three-party sorting protocol secure against passive adversaries in the
honest majority setting. The protocol can be easily combined with other secure protocols …
honest majority setting. The protocol can be easily combined with other secure protocols …
Graphos: Towards oblivious graph processing
We propose GraphOS, a system that allows a client that owns a graph database to
outsource it to an untrusted server for storage and querying. It relies on doubly-oblivious …
outsource it to an untrusted server for storage and querying. It relies on doubly-oblivious …
DORAM revisited: maliciously secure RAM-MPC with logarithmic overhead
Abstract Distributed Oblivious Random Access Memory (DORAM) is a secure multiparty
protocol that allows a group of participants holding a secret-shared array to read and write to …
protocol that allows a group of participants holding a secret-shared array to read and write to …
Parallel privacy-preserving shortest path algorithms
In this paper, we propose and present secure multiparty computation (SMC) protocols for
single-source shortest distance (SSSD) and all-pairs shortest distance (APSD) in sparse and …
single-source shortest distance (SSSD) and all-pairs shortest distance (APSD) in sparse and …
Secure parallel computation on privately partitioned data and applications
Parallel computation is an important aspect of multi-party computation, not only in terms of
improving efficiency, but also in terms of providing privacy for computation involving …
improving efficiency, but also in terms of providing privacy for computation involving …
Improved building blocks for secure multi-party computation based on secret sharing with honest majority
Secure multi-party computation permits evaluation of any desired functionality on private
data without disclosing the data to the participants. It is gaining its popularity due to …
data without disclosing the data to the participants. It is gaining its popularity due to …
Efficient decision tree training with new data structure for secure multi-party computation
K Hamada, D Ikarashi, R Kikuchi, K Chida - arXiv preprint arXiv …, 2021 - arxiv.org
We propose a secure multi-party computation (MPC) protocol that constructs a secret-shared
decision tree for a given secret-shared dataset. The previous MPC-based decision tree …
decision tree for a given secret-shared dataset. The previous MPC-based decision tree …