共 52 条
[1]
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:1231-1247
[2]
Asharov G., 2013, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013, P535, DOI [DOI 10.1145/2508859.2516738, 10.1145/2508859.2516738]
[3]
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
[J].
CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS,
2019,
:3-15
[4]
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:291-308
[5]
Bulat A., 2020, P ICLR, P1
[6]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[8]
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning
[J].
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P),
2019,
:496-511
[9]
Courbariaux M, 2016, Arxiv, DOI arXiv:1602.02830
[10]
EVA: An Encrypted Vector Arithmetic Language and Compiler for Efficient Homomorphic Computation
[J].
PROCEEDINGS OF THE 41ST ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '20),
2020,
:546-561