[PDF][PDF] 机器学习隐私保护研究综述

谭作文, 张连福 - 软件学报, 2020 - jos.org.cn
机器学习隐私保护研究综述隐私保护研究综述 Page 1 软件学报ISSN 1000-9825,CODEN
RUXUEW Journal of Software,[doi: 10.13328/j.cnki.jos.00 ©中国科学院软件研究所版权所有 …

Conclave: secure multi-party computation on big data

N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …

Survey on privacy preserving techniques for machine learning

谭作文, 张连福 - Journal of Software, 2020 - jos.org.cn
机器学习隐私保护研究综述 隐私保护研究综述 Page 1 软件学报 ISSN 1000-9825,CODEN
RUXUEW Journal of Software,[doi: 10.13328/j.cnki.jos.00 ©中国科学院软件研究所版权所有 …

[PDF][PDF] Optimal load-balanced scalable distributed agreement

Y Gelles, I Komargodski - Proceedings of the 56th Annual ACM …, 2024 - dl.acm.org
We consider the fundamental problem of designing classical consensus-related distributed
abstractions for large-scale networks, where the number of parties can be huge. Specifically …

Breaking the O (√ n)-bit barrier: Byzantine agreement with polylog bits per party

E Boyle, R Cohen, A Goel - Proceedings of the 2021 ACM Symposium …, 2021 - dl.acm.org
Byzantine agreement (BA), the task of n parties to agree on one of their input bits in the face
of malicious agents, is a powerful primitive that lies at the core of a vast range of distributed …

Brief announcement: Scalable agreement protocols with optimal optimistic efficiency

Y Gelles, I Komargodski - 37th International Symposium on …, 2023 - drops.dagstuhl.de
Designing efficient distributed protocols for various agreement tasks such as Byzantine
Agreement, Broadcast, and Committee Election is a fundamental problem. We are interested …

ePMLF: Efficient and Privacy‐Preserving Machine Learning Framework Based on Fog Computing

R Zhao, Y Xie, H Cheng, X Jia… - International Journal of …, 2023 - Wiley Online Library
With the continuous improvement of computation and communication capabilities, the
Internet of Things (IoT) plays a vital role in many intelligent applications. Therefore, IoT …

Privacy-Enhancing Technologies for Financial Data Sharing

P Chatzigiannis, WC Gu, S Raghuraman… - arXiv preprint arXiv …, 2023 - arxiv.org
Today, financial institutions (FIs) store and share consumers' financial data for various
reasons such as offering loans, processing payments, and protecting against fraud and …

Must the communication graph of MPC protocols be an expander?

E Boyle, R Cohen, D Data, P Hubáček - Journal of Cryptology, 2023 - Springer
Secure multiparty computation (MPC) on incomplete communication networks has been
studied within two primary models:(1) where a partial network is fixed a priori, and thus …

Multi-party computation review for secure data processing in IoT-fog computing environment

BK Mohanta, D Jena… - International Journal of …, 2020 - inderscienceonline.com
In the last decade internet of things (IoT) technology becomes useful in almost every
application fields. IoT-cloud-based architecture is insufficient to handle the requirement of …