共 30 条
[1]
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:1231-1247
[3]
Scalable and Secure Logistic Regression via Homomorphic Encryption
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:142-144
[4]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[6]
Chandran N., 2017, 20171109 CRYPT EPRIN, P1109
[7]
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[8]
Ishai Y, 2003, LECT NOTES COMPUT SC, V2729, P145
[9]
Juvekar C., 2018, GAZELLE: A Low Latency Framework for Secure Neural Network Inference
[10]
Juvekar C, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1651