Ciphergpt: Secure two-party gpt inference
ChatGPT is recognized as a significant revolution in the field of artificial intelligence, but it
raises serious concerns regarding user privacy, as the data submitted by users may contain …
raises serious concerns regarding user privacy, as the data submitted by users may contain …
Verifiable distributed aggregation functions
The modern Internet is built on systems that incentivize collection of information about users.
In order to minimize privacy loss, it is desirable to prevent these systems from collecting …
In order to minimize privacy loss, it is desirable to prevent these systems from collecting …
FOLEAGE: OLE-Based Multi-party Computation for Boolean Circuits
Abstract Secure Multi-party Computation (MPC) allows two or more parties to compute any
public function over their privately-held inputs, without revealing any information beyond the …
public function over their privately-held inputs, without revealing any information beyond the …
More Efficient Zero-Knowledge Protocols over via Galois Rings
A recent line of works on zero-knowledge (ZK) protocols with a vector oblivious linear
function evaluation (VOLE)-based offline phase provides a new paradigm for scalable ZK …
function evaluation (VOLE)-based offline phase provides a new paradigm for scalable ZK …
Faster Signatures from MPC-in-the-Head
Faster Signatures from MPC-in-the-Head | SpringerLink Skip to main content Advertisement
Springer Nature Link Account Menu Find a journal Publish with us Track your research Search …
Springer Nature Link Account Menu Find a journal Publish with us Track your research Search …
MPC in the head using the subfield bilinear collision problem
J Huth, A Joux - Annual International Cryptology Conference, 2024 - Springer
MPC in the Head Using the Subfield Bilinear Collision Problem | SpringerLink Skip to main
content Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …
content Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …
Efficient arithmetic in garbled circuits
D Heath - Annual International Conference on the Theory and …, 2024 - Springer
Garbled Circuit (GC) techniques usually work with Boolean circuits. Despite intense interest,
efficient arithmetic generalizations of GC were only known from strong assumptions, such as …
efficient arithmetic generalizations of GC were only known from strong assumptions, such as …
Leakage-Resilient Circuit Garbling
Due to the ubiquitous requirements and performance leap in the past decade, it has become
feasible to execute garbling and secure computations in settings sensitive to side-channel …
feasible to execute garbling and secure computations in settings sensitive to side-channel …
Ramen: Souper fast three-party computation for ram programs
Secure RAM computation allows a number of parties to evaluate a function represented as a
random-access machine (RAM) program in a way that reveals nothing about the private …
random-access machine (RAM) program in a way that reveals nothing about the private …
: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head
We present ReSolveD, a new candidate post-quantum signature scheme under the regular
syndrome decoding (RSD) assumption for random linear codes, which is a well-established …
syndrome decoding (RSD) assumption for random linear codes, which is a well-established …