MP-SPDZ: A versatile framework for multi-party computation
M Keller - Proceedings of the 2020 ACM SIGSAC conference on …, 2020 - dl.acm.org
Multi-Protocol SPDZ (MP-SPDZ) is a fork of SPDZ-2 (Keller et al., CCS'13), an
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
Fantastic four:{Honest-Majority}{Four-Party} secure computation with malicious security
This work introduces a novel four-party honest-majority MPC protocol with active security
that achieves comparable efficiency to equivalent protocols in the same setting, while having …
that achieves comparable efficiency to equivalent protocols in the same setting, while having …
FLASH: Fast and robust framework for privacy-preserving machine learning
Privacy-preserving machine learning (PPML) via Secure Multi-party Computation (MPC) has
gained momentum in the recent past. Assuming a minimal network of pair-wise private …
gained momentum in the recent past. Assuming a minimal network of pair-wise private …
{SWIFT}: Super-fast and robust {Privacy-Preserving} machine learning
Performing machine learning (ML) computation on private data while maintaining data
privacy, aka Privacy-preserving Machine Learning (PPML), is an emergent field of research …
privacy, aka Privacy-preserving Machine Learning (PPML), is an emergent field of research …
Waldo: A private time-series database from function secret sharing
Applications today rely on cloud databases for storing and querying time-series data. While
outsourcing storage is convenient, this data is often sensitive, making data breaches a …
outsourcing storage is convenient, this data is often sensitive, making data breaches a …
Zero-knowledge proofs on secret-shared data via fully linear PCPs
We introduce and study the notion of fully linear probabilistically checkable proof systems. In
such a proof system, the verifier can make a small number of linear queries that apply jointly …
such a proof system, the verifier can make a small number of linear queries that apply jointly …
ASTRA: high throughput 3pc over rings with application to secure prediction
The concrete efficiency of secure computation has been the focus of many recent works. In
this work, we present concretely-efficient protocols for secure 3-party computation (3PC) …
this work, we present concretely-efficient protocols for secure 3-party computation (3PC) …
Secure quantized training for deep learning
We implement training of neural networks in secure multi-party computation (MPC) using
quantization commonly used in said setting. We are the first to present an MNIST classifier …
quantization commonly used in said setting. We are the first to present an MNIST classifier …
Secure evaluation of quantized neural networks
We investigate two questions in this paper: First, we ask to what extent" MPC friendly"
models are already supported by major Machine Learning frameworks such as TensorFlow …
models are already supported by major Machine Learning frameworks such as TensorFlow …
SafeFL: MPC-friendly framework for private and robust federated learning
T Gehlhar, F Marx, T Schneider… - 2023 IEEE Security …, 2023 - ieeexplore.ieee.org
Federated learning (FL) has gained widespread popularity in a variety of industries due to its
ability to locally train models on devices while preserving privacy. However, FL systems are …
ability to locally train models on devices while preserving privacy. However, FL systems are …