Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 274–288https://doi.org/10.1145/3634737.3657024As a well known machine learning model, Gradient Boosting Decision Tree (GBDT) is widely used in many real-world scenes such as online marketing, risk management, fraud detection and recommendation systems. Due to limited data resources, two data owners ...
- research-articleJuly 2024
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 257–273https://doi.org/10.1145/3634737.3657022Computing the distance between two non-normalized vectors x and y, represented by Δ (x, y) and comparing it to a predefined public threshold τ is an essential functionality used in privacy-sensitive applications such as biometric authentication, ...
- research-articleJune 2024
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning
SACMAT 2024: Proceedings of the 29th ACM Symposium on Access Control Models and TechnologiesPages 19–30https://doi.org/10.1145/3649158.3657039The popularity of Machine Learning (ML) makes the privacy of sensitive data more imperative than ever. Collaborative learning techniques like Split Learning (SL) aim to protect client data while enhancing ML processes. Though promising, SL has been ...
- research-articleNovember 2024
Secure Full-Text Search Using Function Secret Sharing
WPES '24: Proceedings of the 23rd Workshop on Privacy in the Electronic SocietyPages 59–72https://doi.org/10.1145/3689943.3695052Secure full-text search enables searching for a string within a collection of documents while maintaining privacy. Despite recent studies on secure full-text search having achieved efficient round complexity, searches on large-scale databases remain ...
- research-articleOctober 2023
Online Efficient Secure Logistic Regression based on Function Secret Sharing
CIKM '23: Proceedings of the 32nd ACM International Conference on Information and Knowledge ManagementPages 1597–1606https://doi.org/10.1145/3583780.3614998Logistic regression is an algorithm widely used for binary classification in various real-world applications such as fraud detection, medical diagnosis, and recommendation systems. However, training a logistic regression model with data from different ...
- ArticleJune 2023
Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS
AbstractFunction Secret Sharing (FSS) is a cryptographic tool introduced by Boyle et al. (EUROCRYPT 2015) and is useful for several applications such as private information retrieval, oblivious-RAM, multi-party computation, etc. Most of the known FSS ...
- research-articleNovember 2019
DURASIFT: A Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy Controls
WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic SocietyPages 26–36https://doi.org/10.1145/3338498.3358651Several important lines of research have been geared toward the ability to search on encrypted data. Techniques such as Symmetric Searchable Encryption (SSE), Private Information Retrieval (PIR), Oblivious RAM (ORAM) and more have been introduced to ...
- tutorialOctober 2017
Tutorial: Private Information Retrieval
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 2611–2612https://doi.org/10.1145/3133956.3136069Private information retrieval (PIR) is a cryptographic primitive that facilitates the seemingly impossible task of letting users fetch records from untrusted and remote database servers without revealing to those servers which records are being fetched. ...
- short-paperDecember 2016
(t,p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application
UCC '16: Proceedings of the 9th International Conference on Utility and Cloud ComputingPages 269–275https://doi.org/10.1145/2996890.3007871Point function secret sharing(PFSS)was a special kind of function secret sharing(FSS)that was a special case of secret sharing,that the shared secret was a point function instead of a value.Motivated by the reason that the PFSS has very good application ...
- research-articleOctober 2016
Function Secret Sharing: Improvements and Extensions
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1292–1303https://doi.org/10.1145/2976749.2978429Function Secret Sharing (FSS), introduced by Boyle et al. (Eurocrypt 2015), provides a way for additively secret-sharing a function from a given function family F. More concretely, an m-party FSS scheme splits a function f : {0, 1}n -> G, for some ...