Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 810–824https://doi.org/10.1145/3658644.3690223Achieving malicious security with high efficiency in dishonest-majority secure multiparty computation is a formidable challenge. The milestone works SPDZ and TinyOT have spawn a large family of protocols in this direction. For boolean circuits, state-of-...
- research-articleJune 2024
Log Diameter Rounds MST Verification and Sensitivity in MPC
SPAA '24: Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 269–280https://doi.org/10.1145/3626183.3659984We consider two natural variants of the problem of minimum spanning tree (MST) of a graph in the parallel setting: MST verification (verifying if a given tree is an MST) and the sensitivity analysis of an MST (finding the lowest cost replacement edge for ...
- research-articleNovember 2023
Scalable Multiparty Garbling
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 2158–2172https://doi.org/10.1145/3576915.3623132Multiparty garbling is the most popular approach for constant-round secure multiparty computation (MPC). Despite being the focus of significant research effort, instantiating prior approaches to multiparty garbling results in constant-round MPC that can ...
- research-articleNovember 2023
Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs)
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 2516–2530https://doi.org/10.1145/3576915.3616664In MPC, we usually represent programs as circuits. This is a poor fit for programs that use complex control flow, as it is costly to compile control flow to circuits. This motivated prior work to emulate CPUs inside MPC. Emulated CPUs can run complex ...
- research-articleJune 2023
Fast Dynamic Programming in Trees in the MPC Model
- Chetan Gupta,
- Rustam Latypov,
- Yannic Maus,
- Shreyas Pai,
- Simo Särkkä,
- Jan Studený,
- Jukka Suomela,
- Jara Uitto,
- Hossein Vahidi
SPAA '23: Proceedings of the 35th ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 443–453https://doi.org/10.1145/3558481.3591098We present a deterministic algorithm for solving a wide range of dynamic programming problems in trees in O(log D) rounds in the massively parallel computation model (MPC), with O(nδ) words of local memory per machine, for any given constant 0 < δ < 1. ...
- research-articleJune 2023
On Parallel k-Center Clustering
SPAA '23: Proceedings of the 35th ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 65–75https://doi.org/10.1145/3558481.3591075We consider the classic k-center problem in a parallel setting, on the low-local-space Massively Parallel Computation (MPC) model, with local space per machine of O (nδ), where δ ∈ (0,1) is an arbitrary constant. As a central clustering problem, the k-...
- posterNovember 2022
Poster MPClan:: Protocol Suite for Privacy-Conscious Computations
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3379–3381https://doi.org/10.1145/3548606.3563496The growing volumes of data collected and its analysis to provide better services create worries about digital privacy. The literature has relied on secure multiparty computation techniques to address privacy concerns and give practical solutions. ...
- research-articleAugust 2022
Scalable Differentially Private Clustering via Hierarchically Separated Trees
- Vincent Cohen-Addad,
- Alessandro Epasto,
- Silvio Lattanzi,
- Vahab Mirrokni,
- Andres Munoz Medina,
- David Saulpic,
- Chris Schwiegelshohn,
- Sergei Vassilvitskii
KDD '22: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 221–230https://doi.org/10.1145/3534678.3539409We study the private k-median and k-means clustering problem in d dimensional Euclidean space. By leveraging tree embeddings, we give an efficient and easy to implement algorithm, that is empirically competitive with state of the art non private methods. ...
- research-articleJuly 2022
Massively Parallel Algorithms for b-Matching
SPAA '22: Proceedings of the 34th ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 35–44https://doi.org/10.1145/3490148.3538589This paper presents an O(log log đ) round massively parallel algorithm for 1 + ε approximation of maximum weighted b-matchings, using near-linear memory per machine. Here đ denotes the average degree in the graph and ε is an arbitrarily small positive ...
- research-articleNovember 2021
A PKI-based Framework for Establishing Efficient MPC Channels
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 1961–1980https://doi.org/10.1145/3460120.3484806The Transport Layer Security (TLS) protocol is a fundamental building block for ensuring security on Internet. It provides an easy to use framework for the purposes of establishing an authenticated and secure channel between two parties that have never ...
- research-articleJuly 2021
String Matching with Wildcards in the Massively Parallel Computation Model
SPAA '21: Proceedings of the 33rd ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 275–284https://doi.org/10.1145/3409964.3461793We study distributed algorithms for string matching problem in presence of wildcard characters. Given a string T (a text), we look for all occurrences of another string P (a pattern) as a substring of string T. Each wildcard character in the pattern ...
- research-articleNovember 2020
Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks
ASHES'20: Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware SecurityPages 45–56https://doi.org/10.1145/3411504.3421219LowMC is a parameterizable block cipher developed for use in Multi-Party Computation (MPC) and Fully Homomorphic Encryption (FHE). In these applications, linear operations are much less expensive in terms of resource utilization compared to the non-...
- keynoteNovember 2020
Introduction to Secure Collaborative Intelligence (SCI) Lab
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in PracticePage 1https://doi.org/10.1145/3411501.3418606With the rapid development of technology, user privacy and data security are drawing much attention over the recent years. On one hand, how to protect user privacy while making use of customers? data is a challenging task. On the other hand, data silos ...
- abstractNovember 2020
PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityPages 2139–2140https://doi.org/10.1145/3372297.3416245With the rapid development of technology, data is becoming ubiquitous. User privacy and data security are drawing much attention over the recent years, especially with the European Union's General Data Protection Regulation (GDPR) and other laws coming ...
- research-articleJuly 2019
Weighted Matchings via Unweighted Augmentations
PODC '19: Proceedings of the 2019 ACM Symposium on Principles of Distributed ComputingPages 491–500https://doi.org/10.1145/3293611.3331603We design a generic method to reduce the task of finding weighted matchings to that of finding short augmenting paths in unweighted graphs. This method enables us to provide efficient implementations for approximating weighted matchings in the massively ...
- research-articleOctober 2018
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 847–861https://doi.org/10.1145/3243734.3243786While secure multi-party computation (MPC) is a vibrant research topic and a multitude of practical MPC applications have been presented recently, their development is still a tedious task that requires expert knowledge. Previous works have made first ...
- research-articleOctober 2017
A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 259–276https://doi.org/10.1145/3133956.3133999Protocols for secure multiparty computation enable a set of parties to compute a function of their inputs without revealing anything but the output. The security properties of the protocol must be preserved in the presence of adversarial behavior. The ...
- research-articleMay 2016
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
- Johannes Buchmann,
- Niklas Büscher,
- Florian Göpfert,
- Stefan Katzenbeisser,
- Juliane Krämer,
- Daniele Micciancio,
- Sander Siim,
- Christine van Vredendaal,
- Michael Walter
AsiaPKC '16: Proceedings of the 3rd ACM International Workshop on ASIA Public-Key CryptographyPages 11–20https://doi.org/10.1145/2898420.2898422Practical hardness results are necessary to select parameters for cryptographic schemes. Cryptographic challenges proved to be useful for determining the practical hardness of computational problems that are used to build public-key cryptography. ...
- research-articleJuly 2010
On the theoretical gap between synchronous and asynchronous MPC protocols
PODC '10: Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computingPages 211–218https://doi.org/10.1145/1835698.1835746Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if
- t < n/2, when the channels are synchronous, and
- t < n/3, when the channels are asynchronous, respectively.
In this work we analyze ...