Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation
暂无分享,去创建一个
[1] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[2] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[3] Deian Stefan,et al. A Domain-Specific Language for Computing on Encrypted Data , 2011, IACR Cryptol. ePrint Arch..
[4] Dragos Rotaru,et al. MPC-Friendly Symmetric Key Primitives , 2016, CCS.
[5] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[6] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[7] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[8] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[9] Nicolas Gama,et al. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.
[10] Chris Peikert,et al. Faster Bootstrapping with Polynomial Error , 2014, CRYPTO.
[11] Jung Hee Cheon,et al. A Full RNS Variant of Approximate Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..
[12] Marcel Keller,et al. An architecture for practical actively secure MPC with dishonest majority , 2013, IACR Cryptol. ePrint Arch..
[13] Ian T. Foster,et al. Jetstream: a self-provisioned, scalable science and engineering cloud environment , 2015, XSEDE.
[14] Emmanuela Orsini,et al. Between a Rock and a Hard Place: Interpolating Between MPC and FHE , 2013, IACR Cryptol. ePrint Arch..
[15] Jonathan Katz,et al. Global-Scale Secure Multiparty Computation , 2017, CCS.
[16] Yongsoo Song,et al. Multi-Key Homomorphic Encryption from TFHE , 2019, ASIACRYPT.
[17] Dan Boneh,et al. Threshold Cryptosystems From Threshold Fully Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..
[18] Jung Hee Cheon,et al. Bootstrapping for Approximate Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..
[19] Amit Sahai,et al. Secure MPC: Laziness Leads to GOD , 2018, IACR Cryptol. ePrint Arch..
[20] Elaine Shi,et al. Constant-Round MPC with Fairness and Guarantee of Output Delivery , 2015, CRYPTO.
[21] Shai Halevi,et al. Four Round Secure Computation Without Setup , 2017, TCC.
[22] Yuval Ishai,et al. Efficient Pseudorandom Correlation Generators: Silent OT Extension and More , 2019, IACR Cryptol. ePrint Arch..
[23] Nicolas Gama,et al. TFHE: Fast Fully Homomorphic Encryption Over the Torus , 2019, Journal of Cryptology.
[24] Nicolas Gama,et al. Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE , 2017, ASIACRYPT.
[25] Steven Myers,et al. Threshold Fully Homomorphic Encryption and Secure Computation , 2011, IACR Cryptol. ePrint Arch..
[26] Craig Gentry,et al. Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.
[27] Ron Rothblum,et al. Homomorphic Encryption: from Private-Key to Public-Key , 2011, Electron. Colloquium Comput. Complex..
[28] Yehuda Lindell,et al. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority , 2016, IACR Cryptol. ePrint Arch..
[29] Léo Ducas,et al. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.
[30] Yehuda Lindell,et al. An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants , 2018, IACR Cryptol. ePrint Arch..
[31] Yiliang Han,et al. Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol , 2019, IEEE Access.
[32] Yehuda Lindell,et al. Generalizing the SPDZ Compiler For Other Protocols , 2018, IACR Cryptol. ePrint Arch..
[33] Daniele Micciancio,et al. Semi-Parallel logistic regression for GWAS on encrypted data , 2020, BMC Medical Genomics.
[34] Deian Stefan,et al. A Domain-Specific Language for Computing on Encrypted Data (Invited Talk) , 2011, FSTTCS.
[35] Yongsoo Song,et al. Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference , 2019, IACR Cryptol. ePrint Arch..
[36] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[37] Kartik Nayak,et al. ObliVM: A Programming Framework for Secure Computation , 2015, 2015 IEEE Symposium on Security and Privacy.
[38] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[39] Ueli Maurer,et al. Secure multi-party computation made simple , 2002, Discret. Appl. Math..
[40] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[41] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[42] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[43] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[44] Divesh Aggarwal,et al. A Note on Discrete Gaussian Combinations of Lattice Vectors , 2016, Chic. J. Theor. Comput. Sci..
[45] Yuval Ishai,et al. Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation , 2019, IACR Cryptol. ePrint Arch..
[46] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[47] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[48] Michael Hicks,et al. Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations , 2014, 2014 IEEE Symposium on Security and Privacy.
[49] Vinod Vaikuntanathan,et al. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE , 2012, EUROCRYPT.
[50] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[51] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[52] Hassan Takabi,et al. Privacy-preserving Machine Learning as a Service , 2018, Proc. Priv. Enhancing Technol..
[53] Daniel Wichs,et al. Two Round Multiparty Computation via Multi-key FHE , 2016, EUROCRYPT.
[54] Yehuda Lindell,et al. Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ , 2015, IACR Cryptol. ePrint Arch..
[55] Jingwei Zhang,et al. Enhanced Vector Math Support on the Intel®AVX-512 Architecture , 2018, 2018 IEEE 25th Symposium on Computer Arithmetic (ARITH).
[56] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[57] Jonathan Ullman,et al. Securely Sampling Biased Coins with Applications to Differential Privacy , 2019, IACR Cryptol. ePrint Arch..
[58] Craig Gentry,et al. Discrete Gaussian Leftover Hash Lemma over Infinite Domains , 2013, ASIACRYPT.
[59] Chris Peikert,et al. Multi-key FHE from LWE, Revisited , 2016, TCC.
[60] Peter Rindal,et al. ABY3: A Mixed Protocol Framework for Machine Learning , 2018, IACR Cryptol. ePrint Arch..
[61] Yehuda Lindell,et al. High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority , 2017, IACR Cryptol. ePrint Arch..
[62] Amit Sahai,et al. Threshold Fully Homomorphic Encryption , 2017, IACR Cryptol. ePrint Arch..
[63] Nancy Wilkins-Diehr,et al. XSEDE: Accelerating Scientific Discovery , 2014, Computing in Science & Engineering.
[64] Zvika Brakerski,et al. Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts , 2016, CRYPTO.
[65] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[66] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[67] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[68] Michael Clear,et al. Multi-identity and Multi-key Leveled FHE from Learning with Errors , 2015, CRYPTO.
[69] Vladimir Kolesnikov,et al. Improved OT Extension for Transferring Short Secrets , 2013, CRYPTO.
[70] Peter Scholl,et al. Low Cost Constant Round MPC Combining BMR and Oblivious Transfer , 2017, Journal of Cryptology.
[71] Ahmad-Reza Sadeghi,et al. Automated Synthesis of Optimized Circuits for Secure Computation , 2015, CCS.
[72] Michael Zohner,et al. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.
[73] Masahiro Yagisawa,et al. Fully Homomorphic Encryption without bootstrapping , 2015, IACR Cryptol. ePrint Arch..
[74] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[75] Satyanarayana V. Lokam,et al. SECURITY OF HOMOMORPHIC ENCRYPTION , 2017 .
[76] Jean-Pierre Hubaux,et al. Computing across Trust Boundaries using Distributed Homomorphic Cryptography , 2019, IACR Cryptol. ePrint Arch..