Cryptography

ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ASCON

Authors: Alvaro Cintas-Canto, Jasmin Kaur, Mehran Mozaffari-Kermani, Reza Azarderakhsh | Published: 2023-06-13
Algorithm
Resource Scarcity Issues
Cryptography

New Secure Sparse Inner Product with Applications to Machine Learning

Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16
Security Analysis
Cryptography
Computational Efficiency

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder

Authors: Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li | Published: 2022-10-16
Multi-Party Computation
Cryptography
Computational Efficiency

Attribute Privacy: Framework and Mechanisms

Authors: Wanrong Zhang, Olga Ohrimenko, Rachel Cummings | Published: 2020-09-08 | Updated: 2021-05-11
Data Generation
Cryptography
Machine Learning Technology

Highly Accurate CNN Inference Using Approximate Activation Functions over Homomorphic Encryption

Authors: Takumi Ishiyama, Takuya Suzuki, Hayato Yamana | Published: 2020-09-08 | Updated: 2020-12-02
Levelled Homomorphic Encryption
Cryptography
Deep Learning Technology

Cloud-based Federated Boosting for Mobile Crowdsensing

Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma | Published: 2020-05-09
Algorithm
Cryptography
Federated Learning System

Privacy-Preserving Gaussian Process Regression — A Modular Approach to the Application of Homomorphic Encryption

Authors: Peter Fenner, Edward O. Pyzer-Knapp | Published: 2020-01-28
Privacy Protection
Cryptography
Machine Learning Technology

Interpretable Encrypted Searchable Neural Networks

Authors: Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu | Published: 2019-08-14
Privacy Enhancing Technology
Cryptography
Computational Complexity

Continuous-Variable Quantum Key Distribution with a Real Local Oscillator and without Auxiliary Signals

Authors: Sebastian Kleis, Max Rueckmann, Christian G. Schaeffer | Published: 2019-08-02
Cryptography
Communication Analysis
Quantum Computing

CryptoNN: Training Neural Networks over Encrypted Data

Authors: Runhua Xu, James B. D. Joshi, Chao Li | Published: 2019-04-15 | Updated: 2019-04-26
Data Protection Method
Privacy Protection Method
Cryptography