Elsa: Secure aggregation for federated learning with malicious actors

M Rathee, C Shen, S Wagh… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is an increasingly popular approach for machine learning (ML) in
cases where the training dataset is highly distributed. Clients perform local training on their …

Wolverine: fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits

C Weng, K Yang, J Katz, X Wang - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Efficient zero-knowledge (ZK) proofs for arbitrary boolean or arithmetic circuits have recently
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …

Ferret: Fast extension for correlated OT with small communication

K Yang, C Weng, X Lan, J Zhang, X Wang - Proceedings of the 2020 …, 2020 - dl.acm.org
Correlated oblivious transfer (COT) is a crucial building block for secure multi-party
computation (MPC) and can be generated efficiently via OT extension. Recent works based …

Quicksilver: Efficient and affordable zero-knowledge proofs for circuits and polynomials over any field

K Yang, P Sarkar, C Weng, X Wang - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Zero-knowledge (ZK) proofs with an optimal memory footprint have attracted a lot of
attention, because such protocols can easily prove very large computation with a small …

Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes

G Couteau, P Rindal, S Raghuraman - Annual International Cryptology …, 2021 - Springer
We put forth new protocols for oblivious transfer extension and vector OLE, called Silver, for
SILent Vole and oblivious transfER. Silver offers extremely high performances: generating …

Efficient two-round OT extension and silent non-interactive secure computation

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Proceedings of the …, 2019 - dl.acm.org
We consider the problem of securely generating useful instances of two-party correlations,
such as many independent copies of a random oblivious transfer (OT) correlation, using a …

Oblivious key-value stores and amplification for private set intersection

G Garimella, B Pinkas, M Rosulek, N Trieu… - Advances in Cryptology …, 2021 - Springer
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We
consider the more general notion of an oblivious key-value store (OKVS), which is a data …

Piranha: A {GPU} platform for secure computation

JL Watson, S Wagh, RA Popa - 31st USENIX Security Symposium …, 2022 - usenix.org
Secure multi-party computation (MPC) is an essential tool for privacy-preserving machine
learning (ML). However, secure training of large-scale ML models currently requires a …

: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions

C Baum, AJ Malozemoff, MB Rosen… - Advances in Cryptology …, 2021 - Springer
Zero knowledge proofs are an important building block in many cryptographic applications.
Unfortunately, when the proof statements become very large, existing zero-knowledge proof …

Improved primitives for MPC over mixed arithmetic-binary circuits

D Escudero, S Ghosh, M Keller, R Rachuri… - Advances in Cryptology …, 2020 - Springer
This work introduces novel techniques to improve the translation between arithmetic and
binary data types in secure multi-party computation. We introduce a new approach to …