Filters








1,053 Hits in 3.5 sec

Ad Hoc Multi-Input Functional Encryption

Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O'Neill, Justin Thaler, Michael Wagner
2020 Innovations in Theoretical Computer Science  
At a technical level, our results are obtained by combining standard MIFE schemes and two-round secure multiparty computation (MPC) protocols in novel ways highlighting an interesting interplay between  ...  MIFE and two-round MPC.  ...  While security appears to follow intuitively from the security of MPC, FE and MIFE, the proof must contend with several technical hurdles as we are forced to deal with indistinguishability style security  ... 
doi:10.4230/lipics.itcs.2020.40 dblp:conf/innovations/AgrawalCFGOT20 fatcat:kftvkqieurgtbdftsofejm6lbe

WYS*: A DSL for Verified Secure Multi-party Computations [article]

Aseem Rastogi, Nikhil Swamy, Michael Hicks
2018 arXiv   pre-print
We have implemented several MPC protocols in Wys*, including private set intersection, joint median, and an MPC card dealing application, and have verified their correctness and security.  ...  Wys* source programs are essentially F* programs written in a custom MPC effect, meaning that the programmers can use F*'s logic to verify the correctness and security properties of their programs.  ...  The pre-and postcondition specifications on the combinators encode a program logic for MPC.  ... 
arXiv:1711.06467v2 fatcat:p7tfm4fjrbhbbgd2dpqgjbjimi

Privacy-Preserving Deep Learning on Machine Learning as a Service - A Comprehensive Survey

Harry Chandra Tanuwidjaja, Rakyong Choi, Seunggeun Baek, Kwangjo Kim
2020 IEEE Access  
The system is based on secure MPC combined with CNN.  ...  The main idea is to combine secure MPC with DP for the privacy part and leverage NN for the machine learning part.  ... 
doi:10.1109/access.2020.3023084 fatcat:inxcd6sbhfewtkm4q3krnkx4oe

$$\textsc {Wys}^\star $$ : A DSL for Verified Secure Multi-party Computations [chapter]

Aseem Rastogi, Nikhil Swamy, Michael Hicks
2019 Research Series on the Chinese Dream and China's Development Path  
We have implemented several MPC protocols in Wys , including private set intersection, joint median, and an MPC-based card dealing application, and have verified their correctness and security.  ...  Wys source programs are essentially F programs written in a custom MPC effect, meaning that the programmers can use F 's logic to verify the correctness and security properties of their programs.  ...  We would like to thank the anonymous reviewers, Catalin Hriţcu, and Matthew Hammer for helpful comments on drafts of this paper. This research was funded in part by the U.S.  ... 
doi:10.1007/978-3-030-17138-4_5 dblp:conf/post/RastogiSH19 fatcat:hog2g7n7cffddoj6wimxq4clay

Separating Two-Round Secure Computation From Oblivious Transfer

Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan, Michael Wagner
2020 Innovations in Theoretical Computer Science  
Very recently, Garg and Srinivasan (Eurocrypt 2018) and Benhamouda and Lin (Eurocrypt 2018) constructed such 2-round MPC protocols from minimal assumptions.  ...  for the difficulty of ruling out black-box constructions of 3-round MPC from 2-round OT, and separate a relaxed "non-compact" variant of 2-party homomorphic secret sharing from 2-round OT.  ...  Acknowledgements We thank Iftach Haitner, Mohammad Mahmoody, and Rotem Tsabary for helpful discussions.  ... 
doi:10.4230/lipics.itcs.2020.71 dblp:conf/innovations/ApplebaumBGIS20 fatcat:2rnasclhbnhqnlhiyytadlvqfq

Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data [chapter]

Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
2015 Lecture Notes in Computer Science  
of obfuscation -similar to how the Universal Composition framework unifies various multi-party computation tasks like commitment, coin-tossing and zero-knowledge proofs.  ...  Highlights of our framework include the following: • We use a new indistinguishability preserving (IND-PRE) definition of security that interpolates indistinguishability and simulation style definitions  ...  Note that on obtaining handles for various agents from B[Σ], S hands over dummy ciphertexts to Adv, and if Adv gives them back to S, it translates them back to the handles.  ... 
doi:10.1007/978-3-662-46803-6_17 fatcat:jzsadxqa2feznkhgfaj3kyo6ny

Multiparty computation secure against continual memory leakage

Elette Boyle, Shafi Goldwasser, Abhishek Jain, Yael Tauman Kalai
2012 Proceedings of the 44th symposium on Theory of Computing - STOC '12  
Our result relies on standard cryptographic assumptions, and our security parameter is polynomially related to the number of parties.  ...  We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, in addition to corrupting 1-fraction of all parties for an arbitrarily small constant > 0, can leak information  ...  All parties engage in an execution of the (standard) MPC protocol MPC(FE 1 ,...,Em,crs) to collectively compute the randomized functionality FE 1 ,...  ... 
doi:10.1145/2213977.2214087 dblp:conf/stoc/BoyleGJK12 fatcat:neqfq7hgvjeqxmm67sznm6vt74

Decentralized Multi-Client Functional Encryption for Inner Product

Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2018 Zenodo  
We combine technique from Private Stream Aggregation (PSA) and Functional Encryption (FE), to introduce a primitive we call Decentralized Multi-Client Functional Encryption (DMCFE), for which we give a  ...  individual data, and do not trust each other.  ...  part by the European Community's Seventh Framework Programme (FP7/2007-2013 Grant Agreement no. 339563 -CryptoCloud), the European Community's Horizon 2020 Project FENTEC (Grant Agreement no. 780108), and  ... 
doi:10.5281/zenodo.3406030 fatcat:fhufgcpa2re55ir6y2x5supncm

Increasing soil fertility as an important factor in ensuring food security of the state

Galina Pyrchenkova, Vladimir Sedikh, Elena Radchenko, D. Rudoy, A. Olshevskaya, N. Ugrekhelidze
2021 E3S Web of Conferences  
The permissible doses of manure introduced into the soil as fertilizer are determined by the combination of properties, processes and soil regimes, relief, groundwater level, and hydrothermal conditions  ...  The influence of chicken manure compost with sawdust in doses from 100 to 1000 t/ha on soil properties was studied on the sod-podzolic soils where the poultry farms of the Moscow region are located.  ...  food security of the state [1 -4] .  ... 
doi:10.1051/e3sconf/202127305010 fatcat:jmihr6moqnc7bf727ysv2msubm

MACROPRUDENTIAL POLICY, HOUSE PRICE FLUCTUATION AND HOUSEHOLD CONSUMPTION

Yang Qi, Haixiao Qin, Peide Liu, Jianxu Liu, Saulius Raslanas, Nerija Banaitienė
2022 Technological and Economic Development of Economy  
of 30 provinces and cities in China from 2004 to 2019.  ...  This finding will contribute to research on the relationship between macroprudential policies and real economics. In addition, it would be helpful in making policies to increase consumption.  ...  Acknowledgements This paper is supported by Project of cultural masters and "the four kinds of a batch" talents, the Special Funds of Taishan Scholars Project of Shandong Province.  ... 
doi:10.3846/tede.2022.16787 fatcat:lkrbdl2ygngpbdyebrbdqlkj5q

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits.  ...  This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC.  ...  Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

A study of the Type II-P supernova 2003gd in M74

M. A. Hendry, S. J. Smartt, J. R. Maund, A. Pastorello, L. Zampieri, S. Benetti, M. Turatto, E. Cappellaro, W. P. S. Meikle, R. Kotak, M. J. Irwin, P. G. Jonker (+9 others)
2005 Monthly notices of the Royal Astronomical Society  
We also calculate three new distances to M74 of 9.6+/-2.8 Mpc, 7.7+/-1.7 Mpc and 9.6+/-2.2 Mpc.  ...  When combined with existing kinematic and BSM distance estimates, we derive a mean value of 9.3+/-1.8 Mpc.  ...  A weighted average yields a value of D = 9.6 ± 2.8 Mpc. This error is statistical and comes from combining the uncertainties of each parameter in the SCM equations.  ... 
doi:10.1111/j.1365-2966.2005.08928.x fatcat:4nf35iydkzcd7p4iilm7wqjb3u

TheHubble Space TelescopeKey Project on the Extragalactic Distance Scale. XV. A Cepheid Distance to the Fornax Cluster and Its Implications

Barry F. Madore, Wendy L. Freedman, N. Silbermann, Paul Harding, John Huchra, Jeremy R. Mould, John A. Graham, Laura Ferrarese, Brad K. Gibson, Mingsheng Han, John G. Hoessel, Shaun M. Hughes (+4 others)
1999 Astrophysical Journal  
moduli ranging from Fornax to Abell 2147 gives Ho = 72 (+/-)_r [+/-6]_s km/s/Mpc.  ...  using NGC 1365 and six nearby spiral galaxies, and applying it to 15 galaxy clusters out to 100 Mpc gives Ho = 76 (+/-3)_r [+/-8]_s km/s/Mpc. (4) Using a broad-based set of differential cluster distance  ...  This research was supported by the National Aeronautics and Space Administration (NASA) and the National Science Foundation (NSF) and beneÐted from the use of the NASA/IPAC Extragalactic Database (NED)  ... 
doi:10.1086/307004 fatcat:3ks2r64y7rbzbbw6lqythlprbi

The electron-capture origin of supernova 2018zd [article]

Daichi Hiramatsu, D. Andrew Howell, Schuyler D. Van Dyk, Jared A. Goldberg, Keiichi Maeda, Takashi J. Moriya, Nozomu Tominaga, Ken'ichi Nomoto, Griffin Hosseinzadeh, Iair Arcavi, Curtis McCully, Jamison Burke (+18 others)
2020 arXiv   pre-print
Stars up to about 8 solar masses lose their outer layers and leave behind a degenerate core – a white dwarf.  ...  from evolved supernova remnants.  ...  lower limit of the Type IIn-P SN rate within 60 Mpc combined with SN 2018zd (see Methods); "ILRT" is a rough estimate from ILRTs within 30 Mpc 127 ; "NS" is an estimated rate from the bimodality in the  ... 
arXiv:2011.02176v1 fatcat:3k7pna4lgfgdnfliwfgst2ecde

Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning

Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin
2021 Proceedings on Privacy Enhancing Technologies  
Our experiments in the WAN setting show that over large networks and datasets, compute operations dominate the overall latency of MPC, as opposed to the communication.  ...  Compared to prior art for private inference, we are about 8× faster than SecureNN (PETS'19) on average and comparable to ABY3 (CCS'18).  ...  Acknowledgments We thank Vikash Sehwag for his help with the experiments, the anonymous reviews, and our Shepherd Melek Önen.  ... 
doi:10.2478/popets-2021-0011 fatcat:of622d63gzggthhd2avph3l2yi
« Previous Showing results 1 — 15 out of 1,053 results