Filters








63,578 Hits in 7.2 sec

Floating Point Arithmetic Protocols for Constructing Secure Data Analysis Application

Yun-Ching Liu, Yi-Ting Chiang, Tsan-Sheng Hsu, Churn-Jung Liau, Da-Wei Wang
2013 Procedia Computer Science  
Our Floating Point Number Format A floating point number consists of three parts, namely the sign bit, the exponent, and the mantissa.  ...  In this paper, we have developed protocols for floating point arithmetic based on secure scalar product protocols, which is required in many real world applications.  ...  [2] proposed another set of protocols for single precision floating point computation, based on a modification of fixed point number protocols.  ... 
doi:10.1016/j.procs.2013.09.091 fatcat:fdmzcpv7sbb4zczsga5f5rneue

Robustness Analysis of Floating-Point Programs by Self-Composition

Liqian Chen, Jiahong Jiang, Banghu Yin, Wei Dong, Ji Wang
2014 Journal of Applied Mathematics  
Current critical systems often involve lots of floating-point computations which are inexact.  ...  Robustness analysis of floating-point programs needs to consider both the uncertain inputs and the inexact computation.  ...  On the other hand, due to finite precision on computers, physical values are truncated into digital ones. In modern computers, real numbers are approximated by a finite set of floating-point numbers.  ... 
doi:10.1155/2014/789213 fatcat:iqgzc23jtjdbxbsyl6nvphwbca

Secure and Evaluable Clustering based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit

Jialin Li, Penghao Lu, Xuemin Lin.
2022 IEEE Access  
operation on floating point numbers costs 100x computational overhead than that on integers.  ...  and power on ciphertext of integers and floating point numbers.  ...  . • Secure Floating Point Numbers Multiplication Protocol(SFPM): It performs secure multiplication of two floating point number plaintext on ciphertext, i.e.  ... 
doi:10.1109/access.2022.3166523 fatcat:dxpw6qgopffq7lo4f26fh65igy

Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing

Kota SASAKI, Koji NUIDA
2021 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but these are basically expensive.  ...  In particular, for MPC based on secret sharing (SS), the floating-point addition takes many communication rounds though the addition is the most fundamental operation.  ...  Acknowledgments This work was partly supported by the Ministry of Internal Affairs and Communications SCOPE Grant Number 182103105 and by JST CREST JPMJCR19F6.  ... 
doi:10.1587/transfun.2021cip0013 fatcat:s4ag534cezevbavv5ucr3337ea

Optimizing Secure Statistical Computations with PICCO [article]

Justin DeBenedetto, Marina Blanton
2016 arXiv   pre-print
Specifically, we focus on chi-squared and standard deviation computations and optimize user programs for them to assess performance that an informed user might expect from securely evaluating these functions  ...  Secure multi-party computation enables any function to be securely evaluated over private data without revealing any unintended data.  ...  This leaves us with only one floating-point operation to perform per cell. All of X i,j 's can be computed in batch, since cell computations are independent in this step.  ... 
arXiv:1612.08678v1 fatcat:eapdcmluknedtbhjmm5cmzcz44

Secure floating point arithmetic and private satellite collision analysis

Liina Kamm, Jan Willemson
2014 International Journal of Information Security  
For this purpose, we first describe basic floating point arithmetic operators (addition and multiplication) for multiparty computations. The operators are implemented on the Sharemind SMC engine.  ...  In this paper, we show that it is possible and, indeed, feasible to use secure multiparty computation (SMC) for calculating the probability of a collision between two satellites.  ...  Acknowledgments The authors would like to thank Galois Inc for the use of their prototype that works on public data.  ... 
doi:10.1007/s10207-014-0271-8 fatcat:7vh4xx562ne6rpgj6vahhv5ibu

Privacy-Preserving Outsourced Calculation on Floating Point Numbers

Ximeng Liu, Robert H. Deng, Wenxiu Ding, Rongxing Lu, Baodong Qin
2016 IEEE Transactions on Information Forensics and Security  
We then present an approach to outsourcing floating point numbers for storage in privacy-preserving way, and securely processing commonly used floating point number operations on-the-fly.  ...  Using POCF, a user can securely outsource the storing and processing of floating point numbers to a cloud server while preserving the privacy of the (original) data and the computed results.  ...  Secure Outsourced Floating Point Number Computation Here, we introduce five protocols to achieve five different secure floating point numbers computation in the outsourced environment. = t y .  ... 
doi:10.1109/tifs.2016.2585121 fatcat:7ugnfufva5f3pj5gnphilncxqa

CrypTFlow: Secure TensorFlow Inference [article]

Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2020 arXiv   pre-print
The malicious security of the protocols output by Aramis relies on integrity of the hardware and semi-honest security of MPC.  ...  We present CrypTFlow, a first of its kind system that converts TensorFlow inference code into Secure Multi-party Computation (MPC) protocols at the push of a button.  ...  We use 0.1f to denote the floating-point number closest to the Real number 0.1.  ... 
arXiv:1909.07814v2 fatcat:e776uzl6crgv3mibgykniljweu

Secure Medical Image Analysis with CrypTFlow [article]

Javier Alvarez-Valle, Pratik Bhatu, Nishanth Chandran, Divya Gupta, Aditya Nori, Aseem Rastogi, Mayank Rathee, Rahul Sharma, Shubham Ugare
2020 arXiv   pre-print
We present CRYPTFLOW, a system that converts TensorFlow inference code into Secure Multi-party Computation (MPC) protocols at the push of a button. To do this, we build two components.  ...  In particular, this paper provides the first evaluation of secure segmentation of 3D images, a task that requires much more powerful models than classification and is the largest secure inference task  ...  CRYPTFLOW provides the first implementation and evaluation of a system for secure segmentation.  ... 
arXiv:2012.05064v1 fatcat:naymjmjxwzcb3b35mq23v7bxkm

Oblivious Polynomial Evaluation and Oblivious Neural Learning [chapter]

Yan-Cheng Chang, Chi-Jen Lu
2001 Lecture Notes in Computer Science  
Many important real-world applications deal with floating-point numbers, instead of integers or arbitrary finite fields, and our protocols have the advantage of operating directly on floating-point numbers  ...  Unlike that of [15] , slight modifications to our protocols immediately give protocols to handle multi-variate polynomials and polynomials over floating-point numbers.  ...  Oblivious Polynomial Evaluation for Floating-Point Numbers Floating-Point Number System We first give the definition of a floating-point number system. Definition 5.  ... 
doi:10.1007/3-540-45682-1_22 fatcat:cfxijlfvtrhzhfpeqngcck7xfu

Image Encryption based on Floating-Point Representation

Ali Hussein Fadel
2017 Diyala Journal for Pure Science  
In this paper we have presented a new design random numbers generator based on single precision floating point(RNG-SFP). Randomness of RNG-SFR is used for encryption the images.  ...  The experimented result show that the proposed technique is efficient and has high security feature  ...  an initial value through a function numbers = (Floating-Point).  ... 
doi:10.24237/djps.1301.161a fatcat:zayggtthzfcxppehkopldjggny

Replication study challenges and new number formats for chaotic pseudo random number generators

Carina Heßeling, Jörg Keller
2022 it - Information Technology  
Chaotic Pseudo Random Number Generators have been seen as a promising candidate for secure random number generation.  ...  We find that different decisions lead to different streams with different security properties, where we focus on period length.  ...  Also a rounding can be applied similar to floating-point numbers.  ... 
doi:10.1515/itit-2021-0065 fatcat:bjj65upctjgwhgkw4dfcu3spqm

CrypTFlow: Secure TensorFlow Inference

Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2020 2020 IEEE Symposium on Security and Privacy (SP)  
The malicious security of the protocols output by Aramis relies on integrity of the hardware and semi-honest security of MPC.  ...  We present CRYPTFLOW, a first of its kind system that converts TensorFlow inference code into Secure Multi-party Computation (MPC) protocols at the push of a button.  ...  We use 0.1f to denote the floating-point number closest to the Real number 0.1.  ... 
doi:10.1109/sp40000.2020.00092 dblp:conf/sp/0001RCGR020 fatcat:orhgwxqvoneelddaeask4l2nny

Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme

Shuangjie Bai, Geng Yang, Jingqi Shi, Guoxiu Liu, Zhaoe Min
2018 Security and Communication Networks  
Specifically, the precision of the ciphertext operation's result is similar to unencrypted floating-point number computation.  ...  This paper proposes a revised floating-point fully homomorphic encryption scheme (FFHE) that achieves the goal of floating-point numbers operation without privacy leakage to unauthorized parties.  ...  By using five integers to express a floating-point number [19] , we convert the operations on a floating-point number to an integer.  ... 
doi:10.1155/2018/2363928 fatcat:dnf4nm7fbfebvfconueifmidr4

SecFloat: Accurate Floating-Point meets Secure 2-Party Computation [article]

Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi
2022 IACR Cryptology ePrint Archive  
We build a library SECFLOAT for secure 2-party computation (2PC) of 32-bit single-precision floating-point operations and math functions.  ...  The high precision of SECFLOAT leads to the first accurate implementation of secure inference. All prior works on secure inference of deep neural networks rely on ad hoc float-to-fixed converters.  ...  INTRODUCTION Floating-point is the default format used to perform operations on real numbers on modern computer hardware.  ... 
dblp:journals/iacr/RatheeBSGCR22 fatcat:or5gfnam5rabpnbonypepxh6yi
« Previous Showing results 1 — 15 out of 63,578 results