Chen et al., 2021 - Google Patents
HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation.Chen et al., 2021
View PDF- Document ID
- 3012658158492919629
- Author
- Chen W
- Sotiraki K
- Chang I
- Kantarcioglu M
- Popa R
- Publication year
- Publication venue
- IACR Cryptol. ePrint Arch.
External Links
Snippet
Though maliciously secure multiparty computation (SMPC) ensures confidentiality and integrity of the computation from malicious parties, malicious parties can still provide malformed inputs. As a result, when using SMPC for collaborative computation, input can be …
- 238000000528 statistical test 0 abstract description 51
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wu et al. | Privacy preserving vertical federated learning for tree-based models | |
Hardy et al. | Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption | |
Vu | Privacy-preserving Naive Bayes classification in semi-fully distributed data model | |
Abspoel et al. | Secure training of decision trees with continuous attributes | |
Dwork | A firm foundation for private data analysis | |
Wang et al. | Hybrid differentially private federated learning on vertically partitioned data | |
Xie et al. | Privlogit: Efficient privacy-preserving logistic regression by tailoring numerical optimizers | |
Nóbrega et al. | Blockchain-based privacy-preserving record linkage: enhancing data privacy in an untrusted environment | |
Niu et al. | Secure federated submodel learning | |
Li et al. | Fine-grained poisoning attack to local differential privacy protocols for mean and variance estimation | |
Chatel et al. | SoK: Privacy-preserving collaborative tree-based model learning | |
Wang et al. | Differentially private data publishing for arbitrarily partitioned data | |
Xing et al. | Zero-knowledge proof meets machine learning in verifiability: A survey | |
Chen et al. | HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation. | |
Fontenla-Romero et al. | FedHEONN: Federated and homomorphically encrypted learning method for one-layer neural networks | |
Pereira et al. | Secure multiparty computation for synthetic data generation from distributed data | |
Lu et al. | Collaborative graph-based mechanism for distributed big data leakage prevention | |
Chang et al. | {HOLMES}: Efficient Distribution Testing for Secure Collaborative Learning | |
Yu et al. | Trustworthy decentralized collaborative learning for edge intelligence: A survey | |
Tang et al. | Privacy-preserving and trustless verifiable fairness audit of machine learning models | |
Jurado et al. | Analyzing the shuffle model through the lens of quantitative information flow | |
Liu et al. | Differential privacy performance evaluation under the condition of non-uniform noise distribution | |
Jiang et al. | Privacy-preserving biomedical data dissemination via a hybrid approach | |
Chen et al. | Authenticable data analytics over encrypted data in the cloud | |
Liu et al. | Federated graph analytics with differential privacy |