共 216 条
[1]
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:1231-1247
[2]
MPC with Friends and Foes
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT II,
2020, 12171
:677-706
[3]
Scalable and Secure Logistic Regression via Homomorphic Encryption
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:142-144
[4]
Attrapadung Nuttapong, 2022, Proceedings on Privacy Enhancing Technologies, V4, P746
[5]
Aumann Y, 2007, LECT NOTES COMPUT SC, V4392, P137
[6]
Ball M., 2019, Cryptology ePrint Archive, Paper 2019/338
[7]
Garbling Gadgets for Boolean and Arithmetic Circuits
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:565-577
[8]
HELiKs: HE Linear Algebra Kernels for Secure Inference
[J].
PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023,
2023,
:2306-2320
[9]
Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
[10]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420