FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing
暂无分享,去创建一个
S. Yiu | Peng Yang | Z. L. Jiang | Jun-bin Fang | Hongxiao Wang | Yulin Wu | Shiqi Gao | Jiehang Zhuang
[1] Nishanth Chandran,et al. LLAMA: A Low Latency Math Library for Secure Inference , 2022, IACR Cryptol. ePrint Arch..
[2] Sameer Wagh. Pika: Secure Computation using Function Secret Sharing over Rings , 2022, IACR Cryptol. ePrint Arch..
[3] Aseem Rastogi,et al. SiRnn: A Math Library for Secure RNN Inference , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[4] F. Bach,et al. AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing , 2020, Proc. Priv. Enhancing Technol..
[5] Yuval Ishai,et al. Secure Computation with Preprocessing via Function Secret Sharing , 2019, IACR Cryptol. ePrint Arch..
[6] Matt J. Kusner,et al. QUOTIENT: Two-Party Secure Neural Network Training and Prediction , 2019, CCS.
[7] Sameer Wagh,et al. SecureNN: 3-Party Secure Computation for Neural Network Training , 2019, Proc. Priv. Enhancing Technol..
[8] Daniel Rueckert,et al. A generic framework for privacy preserving deep learning , 2018, ArXiv.
[9] Abhi Shelat,et al. Scaling ORAM for Secure Computation , 2017, IACR Cryptol. ePrint Arch..
[10] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[11] Yuval Ishai,et al. Function Secret Sharing: Improvements and Extensions , 2016, CCS.
[12] Yuval Ishai,et al. Function Secret Sharing , 2015, EUROCRYPT.
[13] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[14] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[15] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[16] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[17] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[18] Zhicong Huang,et al. Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference , 2022, IACR Cryptol. ePrint Arch..
[19] Yuval Ishai,et al. MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications , 2021, IACR Cryptol. ePrint Arch..
[20] Mariana Raykova,et al. Secure Poisson Regression , 2021, IACR Cryptol. ePrint Arch..
[21] Yuval Ishai,et al. Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation , 2020, IACR Cryptol. ePrint Arch..
[22] Arpita Patra,et al. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation , 2020, IACR Cryptol. ePrint Arch..
[23] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.