Privacy-preserving machine learning: Methods, challenges and directions

R Xu, N Baracaldo, J Joshi - arXiv preprint arXiv:2108.04417, 2021 - arxiv.org
Machine learning (ML) is increasingly being adopted in a wide variety of application
domains. Usually, a well-performing ML model relies on a large volume of training data and …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Oblivious {Multi-Party} machine learning on trusted processors

O Ohrimenko, F Schuster, C Fournet, A Mehta… - 25th USENIX Security …, 2016 - usenix.org
Privacy-preserving multi-party machine learning allows multiple organizations to perform
collaborative data analytics while guaranteeing the privacy of their individual datasets …

New constructions for forward and backward private symmetric searchable encryption

J Ghareh Chamani, D Papadopoulos… - Proceedings of the …, 2018 - dl.acm.org
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …

Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Oblivm: A programming framework for secure computation

C Liu, XS Wang, K Nayak, Y Huang… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
We design and develop ObliVM, a programming framework for secure computation. ObliVM
offers a domain specific language designed for compilation of programs into efficient …

ZeroTrace: Oblivious memory primitives from Intel SGX

S Sasy, S Gorbunov, CW Fletcher - Cryptology ePrint Archive, 2017 - eprint.iacr.org
We are witnessing a confluence between applied cryptography and secure hardware
systems in enabling secure cloud computing. On one hand, work in applied cryptography …

Oblix: An efficient oblivious search index

P Mishra, R Poddar, J Chen, A Chiesa… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …

Searchable symmetric encryption with forward search privacy

J Li, Y Huang, Y Wei, S Lv, Z Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …