A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Ad Hoc Multi-Input Functional Encryption
2020
Innovations in Theoretical Computer Science
At a technical level, our results are obtained by combining standard MIFE schemes and two-round secure multiparty computation (MPC) protocols in novel ways highlighting an interesting interplay between ...
MIFE and two-round MPC. ...
While security appears to follow intuitively from the security of MPC, FE and MIFE, the proof must contend with several technical hurdles as we are forced to deal with indistinguishability style security ...
doi:10.4230/lipics.itcs.2020.40
dblp:conf/innovations/AgrawalCFGOT20
fatcat:kftvkqieurgtbdftsofejm6lbe
WYS*: A DSL for Verified Secure Multi-party Computations
[article]
2018
arXiv
pre-print
We have implemented several MPC protocols in Wys*, including private set intersection, joint median, and an MPC card dealing application, and have verified their correctness and security. ...
Wys* source programs are essentially F* programs written in a custom MPC effect, meaning that the programmers can use F*'s logic to verify the correctness and security properties of their programs. ...
The pre-and postcondition specifications on the combinators encode a program logic for MPC. ...
arXiv:1711.06467v2
fatcat:p7tfm4fjrbhbbgd2dpqgjbjimi
Privacy-Preserving Deep Learning on Machine Learning as a Service - A Comprehensive Survey
2020
IEEE Access
The system is based on secure MPC combined with CNN. ...
The main idea is to combine secure MPC with DP for the privacy part and leverage NN for the machine learning part. ...
doi:10.1109/access.2020.3023084
fatcat:inxcd6sbhfewtkm4q3krnkx4oe
$$\textsc {Wys}^\star $$ : A DSL for Verified Secure Multi-party Computations
[chapter]
2019
Research Series on the Chinese Dream and China's Development Path
We have implemented several MPC protocols in Wys , including private set intersection, joint median, and an MPC-based card dealing application, and have verified their correctness and security. ...
Wys source programs are essentially F programs written in a custom MPC effect, meaning that the programmers can use F 's logic to verify the correctness and security properties of their programs. ...
We would like to thank the anonymous reviewers, Catalin Hriţcu, and Matthew Hammer for helpful comments on drafts of this paper. This research was funded in part by the U.S. ...
doi:10.1007/978-3-030-17138-4_5
dblp:conf/post/RastogiSH19
fatcat:hog2g7n7cffddoj6wimxq4clay
Separating Two-Round Secure Computation From Oblivious Transfer
2020
Innovations in Theoretical Computer Science
Very recently, Garg and Srinivasan (Eurocrypt 2018) and Benhamouda and Lin (Eurocrypt 2018) constructed such 2-round MPC protocols from minimal assumptions. ...
for the difficulty of ruling out black-box constructions of 3-round MPC from 2-round OT, and separate a relaxed "non-compact" variant of 2-party homomorphic secret sharing from 2-round OT. ...
Acknowledgements We thank Iftach Haitner, Mohammad Mahmoody, and Rotem Tsabary for helpful discussions. ...
doi:10.4230/lipics.itcs.2020.71
dblp:conf/innovations/ApplebaumBGIS20
fatcat:2rnasclhbnhqnlhiyytadlvqfq
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
[chapter]
2015
Lecture Notes in Computer Science
of obfuscation -similar to how the Universal Composition framework unifies various multi-party computation tasks like commitment, coin-tossing and zero-knowledge proofs. ...
Highlights of our framework include the following: • We use a new indistinguishability preserving (IND-PRE) definition of security that interpolates indistinguishability and simulation style definitions ...
Note that on obtaining handles for various agents from B[Σ], S hands over dummy ciphertexts to Adv, and if Adv gives them back to S, it translates them back to the handles. ...
doi:10.1007/978-3-662-46803-6_17
fatcat:jzsadxqa2feznkhgfaj3kyo6ny
Multiparty computation secure against continual memory leakage
2012
Proceedings of the 44th symposium on Theory of Computing - STOC '12
Our result relies on standard cryptographic assumptions, and our security parameter is polynomially related to the number of parties. ...
We construct a multiparty computation (MPC) protocol that is secure even if a malicious adversary, in addition to corrupting 1-fraction of all parties for an arbitrarily small constant > 0, can leak information ...
All parties engage in an execution of the (standard) MPC protocol MPC(FE 1 ,...,Em,crs) to collectively compute the randomized functionality FE 1 ,... ...
doi:10.1145/2213977.2214087
dblp:conf/stoc/BoyleGJK12
fatcat:neqfq7hgvjeqxmm67sznm6vt74
Decentralized Multi-Client Functional Encryption for Inner Product
2018
Zenodo
We combine technique from Private Stream Aggregation (PSA) and Functional Encryption (FE), to introduce a primitive we call Decentralized Multi-Client Functional Encryption (DMCFE), for which we give a ...
individual data, and do not trust each other. ...
part by the European Community's Seventh Framework Programme (FP7/2007-2013 Grant Agreement no. 339563 -CryptoCloud), the European Community's Horizon 2020 Project FENTEC (Grant Agreement no. 780108), and ...
doi:10.5281/zenodo.3406030
fatcat:fhufgcpa2re55ir6y2x5supncm
Increasing soil fertility as an important factor in ensuring food security of the state
2021
E3S Web of Conferences
The permissible doses of manure introduced into the soil as fertilizer are determined by the combination of properties, processes and soil regimes, relief, groundwater level, and hydrothermal conditions ...
The influence of chicken manure compost with sawdust in doses from 100 to 1000 t/ha on soil properties was studied on the sod-podzolic soils where the poultry farms of the Moscow region are located. ...
food security of the state [1 -4] . ...
doi:10.1051/e3sconf/202127305010
fatcat:jmihr6moqnc7bf727ysv2msubm
MACROPRUDENTIAL POLICY, HOUSE PRICE FLUCTUATION AND HOUSEHOLD CONSUMPTION
2022
Technological and Economic Development of Economy
of 30 provinces and cities in China from 2004 to 2019. ...
This finding will contribute to research on the relationship between macroprudential policies and real economics. In addition, it would be helpful in making policies to increase consumption. ...
Acknowledgements This paper is supported by Project of cultural masters and "the four kinds of a batch" talents, the Special Funds of Taishan Scholars Project of Shandong Province. ...
doi:10.3846/tede.2022.16787
fatcat:lkrbdl2ygngpbdyebrbdqlkj5q
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
2019
Security and Communication Networks
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. ...
This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC. ...
Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work. ...
doi:10.1155/2019/1368905
fatcat:izynm6msrvehfa3ghkw7tykk34
A study of the Type II-P supernova 2003gd in M74
2005
Monthly notices of the Royal Astronomical Society
We also calculate three new distances to M74 of 9.6+/-2.8 Mpc, 7.7+/-1.7 Mpc and 9.6+/-2.2 Mpc. ...
When combined with existing kinematic and BSM distance estimates, we derive a mean value of 9.3+/-1.8 Mpc. ...
A weighted average yields a value of D = 9.6 ± 2.8 Mpc. This error is statistical and comes from combining the uncertainties of each parameter in the SCM equations. ...
doi:10.1111/j.1365-2966.2005.08928.x
fatcat:4nf35iydkzcd7p4iilm7wqjb3u
TheHubble Space TelescopeKey Project on the Extragalactic Distance Scale. XV. A Cepheid Distance to the Fornax Cluster and Its Implications
1999
Astrophysical Journal
moduli ranging from Fornax to Abell 2147 gives Ho = 72 (+/-)_r [+/-6]_s km/s/Mpc. ...
using NGC 1365 and six nearby spiral galaxies, and applying it to 15 galaxy clusters out to 100 Mpc gives Ho = 76 (+/-3)_r [+/-8]_s km/s/Mpc. (4) Using a broad-based set of differential cluster distance ...
This research was supported by the National Aeronautics and Space Administration (NASA) and the National Science Foundation (NSF) and beneÐted from the use of the NASA/IPAC Extragalactic Database (NED) ...
doi:10.1086/307004
fatcat:3ks2r64y7rbzbbw6lqythlprbi
The electron-capture origin of supernova 2018zd
[article]
2020
arXiv
pre-print
Stars up to about 8 solar masses lose their outer layers and leave behind a degenerate core – a white dwarf. ...
from evolved supernova remnants. ...
lower limit of the Type IIn-P SN rate within 60 Mpc combined with SN 2018zd (see Methods); "ILRT" is a rough estimate from ILRTs within 30 Mpc 127 ; "NS" is an estimated rate from the bimodality in the ...
arXiv:2011.02176v1
fatcat:3k7pna4lgfgdnfliwfgst2ecde
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning
2021
Proceedings on Privacy Enhancing Technologies
Our experiments in the WAN setting show that over large networks and datasets, compute operations dominate the overall latency of MPC, as opposed to the communication. ...
Compared to prior art for private inference, we are about 8× faster than SecureNN (PETS'19) on average and comparable to ABY3 (CCS'18). ...
Acknowledgments We thank Vikash Sehwag for his help with the experiments, the anonymous reviews, and our Shepherd Melek Önen. ...
doi:10.2478/popets-2021-0011
fatcat:of622d63gzggthhd2avph3l2yi
« Previous
Showing results 1 — 15 out of 1,053 results