Crypten: Secure multi-party computation meets machine learning

B Knott, S Venkataraman, A Hannun… - Advances in …, 2021 - proceedings.neurips.cc
Secure multi-party computation (MPC) allows parties to perform computations on data while
keeping that data private. This capability has great potential for machine-learning …

A brief survey on encrypted control: From the first to the second generation and beyond

N Schlüter, P Binfet, MS Darup - Annual Reviews in Control, 2023 - Elsevier
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …

A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.

D Demmler, T Schneider, M Zohner - NDSS, 2015 - encrypto.de
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …

Redactable blockchain–or–rewriting history in bitcoin and friends

G Ateniese, B Magri, D Venturi… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
We put forward a new framework that makes it possible to re-write or compress the content
of any number of blocks in decentralized services exploiting the blockchain technology. As …

Sok: General purpose compilers for secure multi-party computation

M Hastings, B Hemenway, D Noble… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …

Practical covertly secure MPC for dishonest majority–or: breaking the SPDZ limits

I Damgård, M Keller, E Larraia, V Pastro… - … –ESORICS 2013: 18th …, 2013 - Springer
Abstract SPDZ (pronounced “Speedz”) is the nickname of the MPC protocol of Damgård et
al. from Crypto 2012. In this paper we both resolve a number of open problems with SPDZ; …

Design of symmetric-key primitives for advanced cryptographic protocols

A Aly, T Ashur, E Ben-Sasson, S Dhooghe… - IACR Transactions on …, 2020 - tosc.iacr.org
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient
hardware and software implementations, a range of emerging applications using advanced …

Our data, ourselves: Privacy via distributed noise generation

C Dwork, K Kenthapadi, F McSherry, I Mironov… - Advances in Cryptology …, 2006 - Springer
In this work we provide efficient distributed protocols for generating shares of random noise,
secure against malicious participants. The purpose of the noise generation is to create a …

Improved primitives for MPC over mixed arithmetic-binary circuits

D Escudero, S Ghosh, M Keller, R Rachuri… - Advances in Cryptology …, 2020 - Springer
This work introduces novel techniques to improve the translation between arithmetic and
binary data types in secure multi-party computation. We introduce a new approach to …