
Pika: Secure Computation using Function Secret Sharing over Rings
Pika: Secure Computation using Function Secret Sharing over Rings Authors: Sameer Wagh (Devron Corporation and UC Berkeley) Volume: 2022 Issue: 4 Pages: 351–377 DOI: …
Keywords: Multi-party computation, Function Secret Shar-ing, Distributed Point Function, Schwartz-Zippel Lemma over Rings DOI 10.56553/popets-2022-0113 Received 2022-02-28; …
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF Authors: Nishanth Chandran (Microsoft Research.), Divya Gupta (Microsoft Research.), Akash Shah (UCLA. Work done at …
Proceedings on Privacy Enhancing Technologies ; 2022 (1):353–372 Nishanth Chandran*, Divya Gupta, and Akash Shah
PoPETs Proceedings — Differentially private partition selection
Volume: 2022 Issue: 1 Pages: 339–352 DOI: https://doi.org/10.2478/popets-2022-0017 Download PDF Abstract: Many data analysis operations can be expressed as a GROUP BY query on an …
PoPETs Proceedings — Updatable Private Set Intersection
Volume: 2022 Issue: 2 Pages: 378–406 DOI: https://doi.org/10.2478/popets-2022-0051 Download PDF Abstract: Private set intersection (PSI) allows two mutually distrusting parties each with a …
SoK: TEE-Assisted Confidential Smart Contract
Volume: 2022 Issue: 3 Pages: 711–731 DOI: https://doi.org/10.56553/popets-2022-0093 Download PDF Abstract: The blockchain-based smart contract lacks privacy, since the …
PoPETs Proceedings — Keeping Privacy Labels Honest
Volume: 2022 Issue: 4 Pages: 486–506 DOI: Download PDF Abstract: At the end of 2020, Apple introduced privacy nutritional labels, requiring app developers to state what data is collected …
PoPETs Proceedings — Mixnet optimization methods
DOI: https://doi.org/10.56553/popets-2022-0081 Download PDF Abstract: We propose a method to optimally select mix network parameters for a given deployment context and adversarial …
Privacy-preserving training of tree ensembles over continuous data
Volume: 2022 Issue: 2 Pages: 205–226 DOI: Download PDF Abstract: Most existing Secure Multi-Party Computation (MPC) protocols for privacy-preserving training of decision trees over …