Elsa: Secure aggregation for federated learning with malicious actors
Federated learning (FL) is an increasingly popular approach for machine learning (ML) in
cases where the training dataset is highly distributed. Clients perform local training on their …
cases where the training dataset is highly distributed. Clients perform local training on their …
Wolverine: fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits
Efficient zero-knowledge (ZK) proofs for arbitrary boolean or arithmetic circuits have recently
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …
Ferret: Fast extension for correlated OT with small communication
Correlated oblivious transfer (COT) is a crucial building block for secure multi-party
computation (MPC) and can be generated efficiently via OT extension. Recent works based …
computation (MPC) and can be generated efficiently via OT extension. Recent works based …
Quicksilver: Efficient and affordable zero-knowledge proofs for circuits and polynomials over any field
Zero-knowledge (ZK) proofs with an optimal memory footprint have attracted a lot of
attention, because such protocols can easily prove very large computation with a small …
attention, because such protocols can easily prove very large computation with a small …
Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
We put forth new protocols for oblivious transfer extension and vector OLE, called Silver, for
SILent Vole and oblivious transfER. Silver offers extremely high performances: generating …
SILent Vole and oblivious transfER. Silver offers extremely high performances: generating …
Efficient two-round OT extension and silent non-interactive secure computation
We consider the problem of securely generating useful instances of two-party correlations,
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
Oblivious key-value stores and amplification for private set intersection
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
Piranha: A {GPU} platform for secure computation
Secure multi-party computation (MPC) is an essential tool for privacy-preserving machine
learning (ML). However, secure training of large-scale ML models currently requires a …
learning (ML). However, secure training of large-scale ML models currently requires a …
: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
C Baum, AJ Malozemoff, MB Rosen… - Advances in Cryptology …, 2021 - Springer
Zero knowledge proofs are an important building block in many cryptographic applications.
Unfortunately, when the proof statements become very large, existing zero-knowledge proof …
Unfortunately, when the proof statements become very large, existing zero-knowledge proof …
Improved primitives for MPC over mixed arithmetic-binary circuits
This work introduces novel techniques to improve the translation between arithmetic and
binary data types in secure multi-party computation. We introduce a new approach to …
binary data types in secure multi-party computation. We introduce a new approach to …