[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chen et al., 2021 - Google Patents

HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation.

Chen et al., 2021

View PDF
Document ID
3012658158492919629
Author
Chen W
Sotiraki K
Chang I
Kantarcioglu M
Popa R
Publication year
Publication venue
IACR Cryptol. ePrint Arch.

External Links

Snippet

Though maliciously secure multiparty computation (SMPC) ensures confidentiality and integrity of the computation from malicious parties, malicious parties can still provide malformed inputs. As a result, when using SMPC for collaborative computation, input can be …
Continue reading at scholar.archive.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • G06Q30/0185Product, service or business identity fraud

Similar Documents

Publication Publication Date Title
Wu et al. Privacy preserving vertical federated learning for tree-based models
Hardy et al. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption
Vu Privacy-preserving Naive Bayes classification in semi-fully distributed data model
Abspoel et al. Secure training of decision trees with continuous attributes
Dwork A firm foundation for private data analysis
Wang et al. Hybrid differentially private federated learning on vertically partitioned data
Xie et al. Privlogit: Efficient privacy-preserving logistic regression by tailoring numerical optimizers
Nóbrega et al. Blockchain-based privacy-preserving record linkage: enhancing data privacy in an untrusted environment
Niu et al. Secure federated submodel learning
Li et al. Fine-grained poisoning attack to local differential privacy protocols for mean and variance estimation
Chatel et al. SoK: Privacy-preserving collaborative tree-based model learning
Wang et al. Differentially private data publishing for arbitrarily partitioned data
Xing et al. Zero-knowledge proof meets machine learning in verifiability: A survey
Chen et al. HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation.
Fontenla-Romero et al. FedHEONN: Federated and homomorphically encrypted learning method for one-layer neural networks
Pereira et al. Secure multiparty computation for synthetic data generation from distributed data
Lu et al. Collaborative graph-based mechanism for distributed big data leakage prevention
Chang et al. {HOLMES}: Efficient Distribution Testing for Secure Collaborative Learning
Yu et al. Trustworthy decentralized collaborative learning for edge intelligence: A survey
Tang et al. Privacy-preserving and trustless verifiable fairness audit of machine learning models
Jurado et al. Analyzing the shuffle model through the lens of quantitative information flow
Liu et al. Differential privacy performance evaluation under the condition of non-uniform noise distribution
Jiang et al. Privacy-preserving biomedical data dissemination via a hybrid approach
Chen et al. Authenticable data analytics over encrypted data in the cloud
Liu et al. Federated graph analytics with differential privacy