Access the full text.
Sign up today, get DeepDyve free for 14 days.
Benjamin Kuykendall, H. Krawczyk, T. Rabin (2019)
Cryptography for #MeTooProceedings on Privacy Enhancing Technologies, 2019
Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, R. Govind, Rahul Mahadev, Aniket Kate, Andrew Miller (2019)
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous CommunicationProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Ágnes Kiss, M. Naderpour, Jian Liu, N. Asokan, T. Schneider (2019)
SoK: Modular and Efficient Private Decision Tree EvaluationProceedings on Privacy Enhancing Technologies, 2019
R. Cramer, I. Damgård (2001)
Secure Distributed Linear Algebra in a Constant Number of Rounds
Octavian Catrina, S. Hoogh (2010)
Improved Primitives for Secure Multiparty Integer Computation
C. Cachin, K. Kursawe, Anna Lysyanskaya, Reto Strobl (2002)
Asynchronous verifiable secret sharing and proactive cryptosystemsIACR Cryptol. ePrint Arch., 2002
R. Cramer, I. Damgård, U. Maurer (2000)
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
J. Bar-Ilan, Donald Beaver (1989)
Non-cryptographic fault-tolerant computing in constant number of rounds of interaction
Justin Brickell, Donald Porter, Vitaly Shmatikov, E. Witchel (2007)
Privacy-preserving remote diagnostics
T. Nishide, K. Ohta (2007)
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
Rahul Rachuri, Ajith Suresh (2019)
Trident: Efficient 4PC Framework for Privacy Preserving Machine LearningIACR Cryptol. ePrint Arch., 2019
Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth (2017)
Practical Secure Aggregation for Privacy-Preserving Machine LearningProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Amazon ec2 instance network bandwidth
Dana Dachman-Soled, T. Malkin, Mariana Raykova, M. Yung (2011)
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications
A. Shamir (1979)
How to share a secretCommun. ACM, 22
David Wu, Tony Feng, M. Naehrig, K. Lauter (2016)
Privately Evaluating Decision Trees and Random ForestsProceedings on Privacy Enhancing Technologies, 2016
Eike Kiltz (2006)
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation
A. Barak, M. Hirt, Lior Koskas, Yehuda Lindell (2018)
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak ParticipantsProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Marcel Keller (2020)
MP-SPDZ: A Versatile Framework for Multi-Party ComputationProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
Donald Beaver (1991)
Efficient Multiparty Protocols Using Circuit Randomization
Muliaman Hadad, Wimboh Santoso, B. Santoso, D. Besar, Ita Rulina (2009)
Rating migration matrices: empirical evicence in IndonesiaIFC Bulletins chapters, 31
J. Cartlidge, N. Smart, Y. Alaoui (2019)
MPC Joins The Dark SideProceedings of the 2019 ACM Asia Conference on Computer and Communications Security
Răzvan Viorescu (2017)
2018 REFORM OF EU DATA PROTECTION RULES, 4
Sandro Coretti, J. Garay, M. Hirt, Vassilis Zikas (2016)
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions
Hao Chen, Miran Kim, Ilya Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh (2020)
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
(2017)
UCI machine learning repository
Adi Akavia, Max Leibovich, Yehezkel Resheff, Roey Ron, Shimon Shahar, Margarita Vald (2019)
Privacy-Preserving Decision Tree Training and Prediction against Malicious ServerIACR Cryptol. ePrint Arch., 2019
(2003)
Secure digital escrow account transactions system and method
I. Damgård, Valerio Pastro, N. Smart, S. Zakariás (2012)
Multiparty Computation from Somewhat Homomorphic Encryption
Octavian Catrina, A. Saxena (2010)
Secure Computation with Fixed-Point Numbers
Y. Ishai, E. Kushilevitz (2000)
Randomizing polynomials: A new representation with applications to round-efficient secure computationProceedings 41st Annual Symposium on Foundations of Computer Science
Anselme Tueno, F. Kerschbaum, S. Katzenbeisser (2019)
Private Evaluation of Decision Trees using Sublinear CostProceedings on Privacy Enhancing Technologies, 2019
M. Ben-Or, S. Goldwasser, A. Wigderson (1988)
Completeness theorems for non-cryptographic fault-tolerant distributed computation
E. Goldman (2020)
An Introduction to the California Consumer Privacy Act (CCPA)
Matthew Jones (2005)
Estimating Markov Transition Matrices Using Proportions Data: An Application to Credit RiskInternational Monetary Fund (IMF) Research Paper Series
Jack Ma, R. Tai, Yongjun Zhao, Sherman Chow (2021)
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation
F. Massacci, C. Ngo, Jing Nie, D. Venturi, Julian Williams (2018)
FuturesMEX: Secure, Distributed Futures Market Exchange2018 IEEE Symposium on Security and Privacy (SP)
Sameer Wagh, Divya Gupta, Nishanth Chandran (2019)
SecureNN: 3-Party Secure Computation for Neural Network TrainingProceedings on Privacy Enhancing Technologies, 2019
R. Cleve (1986)
Limits on the security of coin flips when half the processors are faulty
Payman Mohassel, Peter Rindal (2018)
ABY3: A Mixed Protocol Framework for Machine LearningProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Payman Mohassel, M. Franklin (2006)
Efficient Polynomial Operations in the Shared-Coefficients Setting
Taeho Jung, Junze Han, Xiangyang Li (2013)
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User GroupsIEEE Transactions on Dependable and Secure Computing, 15
Payman Mohassel, Yupeng Zhang (2017)
SecureML: A System for Scalable Privacy-Preserving Machine Learning2017 IEEE Symposium on Security and Privacy (SP)
Irene Giacomelli, S. Jha, Ross Kleiman, David Page, Kyonghwan Yoon (2018)
Privacy-Preserving Collaborative Prediction using Random ForestsAMIA Joint Summits on Translational Science proceedings. AMIA Joint Summits on Translational Science, 2019
I. Damgård, Daniel Escudero, T. Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev (2019)
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning2019 IEEE Symposium on Security and Privacy (SP)
M. Joye, Fariborz Salehi (2018)
Private yet Efficient Decision Tree Evaluation
Zuzana Beerliová-Trubíniová, M. Hirt (2008)
Perfectly-Secure MPC with Linear Communication Complexity
AbstractWhile the practicality of secure multi-party computation (MPC) has been extensively analyzed and improved over the past decade, we are hitting the limits of efficiency with the traditional approaches of representing the computed functionalities as generic arithmetic or Boolean circuits. This work follows the design principle of identifying and constructing fast and provably-secure MPC protocols to evaluate useful high-level algebraic abstractions; thus, improving the efficiency of all applications relying on them. We present Polymath, a constant-round secure computation protocol suite for the secure evaluation of (multi-variate) polynomials of scalars and matrices, functionalities essential to numerous data-processing applications. Using precise natural precomputation and high-degree of parallelism prevalent in the modern computing environments, Polymath can make latency of secure polynomial evaluations of scalars and matrices independent of polynomial degree and matrix dimensions.We implement our protocols over the HoneyBadgerMPC library and apply it to two prominent secure computation tasks: privacy-preserving evaluation of decision trees and privacy-preserving evaluation of Markov processes. For the decision tree evaluation problem, we demonstrate the feasibility of evaluating high-depth decision tree models in a general n-party setting. For the Markov process application, we demonstrate that Poly-math can compute large powers of transition matrices with better online time and less communication.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Jan 1, 2022
Keywords: Secure multi-party computation; polynomial evaluation; privacy-preserving decision tree evaluation
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.