A Decentralized Information Marketplace Preserving Input and Output Privacy
暂无分享,去创建一个
Martine De Cock | B. David | Rafael Dowsley | A. Nascimento | Sikha Pentyala | Mario Larangeira | Steven Golob | A. Decentralized
[1] S. Murdoch,et al. Earn While You Reveal: Private Set Intersection that Rewards Participants , 2023, IACR Cryptol. ePrint Arch..
[2] Sebastian Ramacher,et al. KRAKEN: a privacy-preserving data market for authentic data , 2022, DE@CoNEXT.
[3] R. Jia,et al. Private Data Valuation and Fair Payment in Data Marketplaces , 2022, ArXiv.
[4] Martine De Cock,et al. Secure Multiparty Computation for Synthetic Data Generation from Distributed Data , 2022, ArXiv.
[5] Stefan More,et al. YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC , 2022, ARES.
[6] Anderson C. A. Nascimento,et al. Training Differentially Private Models with Secure Multiparty Computation , 2022, IACR Cryptol. ePrint Arch..
[7] J. Xu,et al. TeeSwap: Private Data Exchange using Smart Contract and Trusted Execution Environment , 2021, 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys).
[8] Xiaolan Gu,et al. PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy , 2021, ArXiv.
[9] Marios D. Dikaiakos,et al. PDS2: A user-centered decentralized marketplace for privacy preserving data processing , 2021, 2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW).
[10] Cong Wang,et al. Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS , 2020, IEEE Transactions on Dependable and Secure Computing.
[11] Sasu Tarkoma,et al. Agora: A Privacy-aware Data Marketplace , 2020, 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).
[12] Emmanuel Stapf,et al. Trusted Execution Environments: Properties, Applications, and Challenges , 2020, IEEE Security & Privacy.
[13] Rafael Dowsley,et al. Insured MPC: Efficient Secure Computation with Financial Penalties , 2020, Financial Cryptography.
[14] Rafael Dowsley,et al. ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement , 2019, IACR Cryptol. ePrint Arch..
[15] Rui Zhang,et al. A Hybrid Approach to Privacy-Preserving Federated Learning , 2018, Informatik Spektrum.
[16] Sushmita Ruj,et al. Blockchain Enabled Data Marketplace - Design and Challenges , 2018, ArXiv.
[17] Dawn Xiaodong Song,et al. A Demonstration of Sterling: A Privacy-Preserving Data Marketplace , 2018, Proc. VLDB Endow..
[18] Rafael Dowsley,et al. Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement , 2018, IACR Cryptol. ePrint Arch..
[19] Úlfar Erlingsson,et al. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks , 2018, USENIX Security Symposium.
[20] Vitaly Shmatikov,et al. Machine Learning Models that Remember Too Much , 2017, CCS.
[21] Andrew Miller,et al. Instantaneous Decentralized Poker , 2017, ASIACRYPT.
[22] Yehuda Lindell,et al. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority , 2016, IACR Cryptol. ePrint Arch..
[23] Iddo Bentov,et al. Amortizing Secure Computation with Penalties , 2016, CCS.
[24] Vinod Vaikuntanathan,et al. Improvements to Secure Computation with Penalties , 2016, CCS.
[25] A. Juels,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[26] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[27] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .
[28] Iddo Bentov,et al. How to Use Bitcoin to Incentivize Correct Computations , 2014, CCS.
[29] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[30] Marcin Andrychowicz,et al. Fair Two-Party Computations via Bitcoin Deposits , 2014, Financial Cryptography Workshops.
[31] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[32] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[33] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[34] B. David,et al. CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time , 2023, Public Key Cryptography.
[35] B. David,et al. Eagle: Efficient Privacy Preserving Smart Contracts , 2022, IACR Cryptol. ePrint Arch..
[36] S. Olariu,et al. A Framework for a Blockchain-Based Decentralized Data Marketplace , 2022, WiCON.
[37] Carsten Baum,et al. P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange , 2021, IACR Cryptol. ePrint Arch..
[38] Rafael Dowsley,et al. TARDIS: A Foundation of Time-Lock Puzzles in UC , 2021, EUROCRYPT.
[39] Anderson C. A. Nascimento,et al. Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy , 2021, IACR Cryptol. ePrint Arch..
[40] Daniel Davis Wood. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .