About 3,010 results
Open links in new tab
  1. Pika: Secure Computation using Function Secret Sharing over Rings

    Pika: Secure Computation using Function Secret Sharing over Rings Authors: Sameer Wagh (Devron Corporation and UC Berkeley) Volume: 2022 Issue: 4 Pages: 351–377 DOI: …

  2. Keywords: Multi-party computation, Function Secret Shar-ing, Distributed Point Function, Schwartz-Zippel Lemma over Rings DOI 10.56553/popets-2022-0113 Received 2022-02-28; …

  3. Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF

    Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF Authors: Nishanth Chandran (Microsoft Research.), Divya Gupta (Microsoft Research.), Akash Shah (UCLA. Work done at …

  4. Proceedings on Privacy Enhancing Technologies ; 2022 (1):353–372 Nishanth Chandran*, Divya Gupta, and Akash Shah

  5. PoPETs Proceedings — Differentially private partition selection

    Volume: 2022 Issue: 1 Pages: 339–352 DOI: https://doi.org/10.2478/popets-2022-0017 Download PDF Abstract: Many data analysis operations can be expressed as a GROUP BY query on an …

  6. PoPETs Proceedings — Updatable Private Set Intersection

    Volume: 2022 Issue: 2 Pages: 378–406 DOI: https://doi.org/10.2478/popets-2022-0051 Download PDF Abstract: Private set intersection (PSI) allows two mutually distrusting parties each with a …

  7. SoK: TEE-Assisted Confidential Smart Contract

    Volume: 2022 Issue: 3 Pages: 711–731 DOI: https://doi.org/10.56553/popets-2022-0093 Download PDF Abstract: The blockchain-based smart contract lacks privacy, since the …

  8. PoPETs Proceedings — Keeping Privacy Labels Honest

    Volume: 2022 Issue: 4 Pages: 486–506 DOI: Download PDF Abstract: At the end of 2020, Apple introduced privacy nutritional labels, requiring app developers to state what data is collected …

  9. PoPETs Proceedings — Mixnet optimization methods

    DOI: https://doi.org/10.56553/popets-2022-0081 Download PDF Abstract: We propose a method to optimally select mix network parameters for a given deployment context and adversarial …

  10. Privacy-preserving training of tree ensembles over continuous data

    Volume: 2022 Issue: 2 Pages: 205–226 DOI: Download PDF Abstract: Most existing Secure Multi-Party Computation (MPC) protocols for privacy-preserving training of decision trees over …