Haac: A hardware-software co-design to accelerate garbled circuits

J Mo, J Gopinath, B Reagen - Proceedings of the 50th Annual …, 2023 - dl.acm.org
Privacy and security have rapidly emerged as priorities in system design. One powerful
solution for providing both is privacy-preserving computation, where functions are computed …

Interoperable private attribution: A distributed attribution and aggregation protocol

B Case, R Jain, A Koshelev, A Leiserson… - Cryptology ePrint …, 2023 - eprint.iacr.org
Measuring people's interactions that span multiple websites can provide unique insight that
enables better products and improves people's experiences, but directly observing people's …

Delegated Private Matching for Compute

D Mouris, D Masny, N Trieu, S Sengupta… - Proceedings on …, 2024 - petsymposium.org
Private matching for compute (PMC) establishes a match between two datasets owned by
mutually distrusted parties (C and P) and allows the parties to input more data for the …

Privacy aware experimentation over sensitive groups: A general chi square approach

R Friedberg, R Rogers - … through the Lens of Causality and …, 2023 - proceedings.mlr.press
As companies work to provide the best possible experience for members, users, and
customers, it is crucial to understand how different people–particularly individuals from …

Not Just Summing: The Identifier Leakage of Private-Join-and-Compute and Its Improvement

S Lu, H Dong, Z Li, LT Yang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this work, we focus on the Private Intersection-Sum (PIS) with cardinality problem: two
parties hold datasets containing user identifiers, and the second party additionally has an …

Kalos: Hierarchical-auditable and Human-binding Authentication Scheme for Clinical Trial

C Chen, Z Wu, G Yang, Q Chen, W Wang… - Cryptology ePrint …, 2024 - eprint.iacr.org
Clinical trials are crucial in the development of new medical treatment methods. To ensure
the correctness of clinical trial results, medical institutes need to collect and process large …

Multi-key private matching for compute

P Buddhavarapu, BM Case, L Gore, A Knox… - Cryptology ePrint …, 2021 - eprint.iacr.org
We extend two-party private set union for secure computation, by considering matching
between records having multiple identifiers (or keys), for example email and phone. In the …

The privacy-preserving padding problem: non-negative mechanisms for conservative answers with differential privacy

BM Case, J Honaker, M Movahedi - arXiv preprint arXiv:2110.08177, 2021 - arxiv.org
Differentially private noise mechanisms commonly use symmetric noise distributions. This is
attractive both for achieving the differential privacy definition, and for unbiased expectations …

Privacy-Preserving Inference on the Ratio of Two Gaussians Using Sums

J Miao, YP Li - arXiv preprint arXiv:2110.15449, 2021 - arxiv.org
The ratio of two Gaussians is useful in many contexts of statistical inference. We discuss
statistically valid inference of the ratio under Differential Privacy (DP). We use the delta …

[引用][C] Privacy Preserving Inference on the Ratio of Two Gaussians Using (Weighted) Sums.

J Miao, YP Li - CoRR, 2021