Crypten: Secure multi-party computation meets machine learning
Secure multi-party computation (MPC) allows parties to perform computations on data while
keeping that data private. This capability has great potential for machine-learning …
keeping that data private. This capability has great potential for machine-learning …
A brief survey on encrypted control: From the first to the second generation and beyond
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
A comprehensive survey on secure outsourced computation and its applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …
for local devices (with limited sources) to implement large-scale data processing. Therefore …
[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …
their private inputs without revealing anything but the function's output. Generic secure …
Redactable blockchain–or–rewriting history in bitcoin and friends
We put forward a new framework that makes it possible to re-write or compress the content
of any number of blocks in decentralized services exploiting the blockchain technology. As …
of any number of blocks in decentralized services exploiting the blockchain technology. As …
Sok: General purpose compilers for secure multi-party computation
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …
compute a joint function on their inputs without revealing any information beyond the result …
Practical covertly secure MPC for dishonest majority–or: breaking the SPDZ limits
Abstract SPDZ (pronounced “Speedz”) is the nickname of the MPC protocol of Damgård et
al. from Crypto 2012. In this paper we both resolve a number of open problems with SPDZ; …
al. from Crypto 2012. In this paper we both resolve a number of open problems with SPDZ; …
Design of symmetric-key primitives for advanced cryptographic protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient
hardware and software implementations, a range of emerging applications using advanced …
hardware and software implementations, a range of emerging applications using advanced …
Our data, ourselves: Privacy via distributed noise generation
In this work we provide efficient distributed protocols for generating shares of random noise,
secure against malicious participants. The purpose of the noise generation is to create a …
secure against malicious participants. The purpose of the noise generation is to create a …
Improved primitives for MPC over mixed arithmetic-binary circuits
This work introduces novel techniques to improve the translation between arithmetic and
binary data types in secure multi-party computation. We introduce a new approach to …
binary data types in secure multi-party computation. We introduce a new approach to …