Peter Rindal
YOU?
Author Swipe
View article: Efficient Permutation Correlations and Batched Random Access for Two-Party Computation
Efficient Permutation Correlations and Batched Random Access for Two-Party Computation Open
View article: Compact: Approximating Complex Activation Functions for Secure Computation
Compact: Approximating Complex Activation Functions for Secure Computation Open
Secure multi-party computation (MPC) techniques can be used to provide data privacy when users query deep neural network (DNN) models hosted on a public cloud. State-of-the-art MPC techniques can be directly leveraged for DNN models that u…
View article: Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation
Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation Open
One of the main goals of financial institutions (FIs) today is combating fraud and financial crime. To this end, FIs use sophisticated machine-learning models trained using data collected from their customers. The output of machine learnin…
View article: Compact: Approximating Complex Activation Functions for Secure Computation
Compact: Approximating Complex Activation Functions for Secure Computation Open
Secure multi-party computation (MPC) techniques can be used to provide data privacy when users query deep neural network (DNN) models hosted on a public cloud. State-of-the-art MPC techniques can be directly leveraged for DNN models that u…
View article: Privacy-Enhancing Technologies for Financial Data Sharing
Privacy-Enhancing Technologies for Financial Data Sharing Open
Today, financial institutions (FIs) store and share consumers' financial data for various reasons such as offering loans, processing payments, and protecting against fraud and financial crime. Such sharing of sensitive data have been subje…
View article: On Black-Box Verifiable Outsourcing
On Black-Box Verifiable Outsourcing Open
We study verifiable outsourcing of computation in a model where the verifier has black-box access to the function being computed. We introduce the problem of oracle-aided batch verification of computation (OBVC) for a function class $$\mat…
View article: Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes Open
View article: Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation Open
International audience
View article: Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation Open
We consider the problem of securely generating useful instances of two-party correlations, such as many independent copies of a random oblivious transfer (OT) correlation, using a small amount of communication. This problem is motivated by…
View article: Cheaper Private Set Intersection via Differentially Private Leakage
Cheaper Private Set Intersection via Differentially Private Leakage Open
In this work we demonstrate that allowing differentially private leakage can significantly improve the concrete performance of secure 2-party computation (2PC) protocols. Specifically, we focus on the private set intersection (PSI) protoco…
View article: Labeled PSI from Fully Homomorphic Encryption with Malicious Security
Labeled PSI from Fully Homomorphic Encryption with Malicious Security Open
Private Set Intersection (PSI) allows two parties, the sender and the receiver, to compute the intersection of their private sets without revealing extra information to each other. We are interested in the unbalanced PSI setting, where (1)…
View article: PIR-PSI: Scaling Private Contact Discovery
PIR-PSI: Scaling Private Contact Discovery Open
An important initialization step in many social-networking applications is contact discovery, which allows a user of the service to identify which of its existing social contacts also use the service. Naïve approaches to contact discovery …
View article: Private queries on encrypted genomic data
Private queries on encrypted genomic data Open
View article: SplitCommit: Implementing and Analyzing Homomorphic UC Commitments.
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments. Open