Tagged articles
23 articles
Page 1 of 1
AntTech
AntTech
Sep 16, 2025 · Information Security

Cutting-Edge Privacy Tech Unveiled: Gibbon, Panther & PromeFuzz at ACM CCS 2025

At the ACM CCS 2025 live paper showcase, three groundbreaking studies—Gibbon’s fast secure two‑party GBDT training, Panther’s efficient private approximate nearest‑neighbor search on a single server, and PromeFuzz’s knowledge‑driven LLM approach to fuzzing harness generation—are presented, highlighting significant performance and security advances.

LLMMPCapproximate nearest neighbor
0 likes · 8 min read
Cutting-Edge Privacy Tech Unveiled: Gibbon, Panther & PromeFuzz at ACM CCS 2025
AntTech
AntTech
Oct 31, 2024 · Information Security

Coral: A Maliciously Secure Computation Framework for Packed and Mixed Circuits

Ant Group’s cryptography lab introduced Coral, a new maliciously secure multi‑party computation framework that leverages a reverse multiplication‑friendly embedding (RMFE) to efficiently handle packed and mixed circuits, enhancing security from semi‑honest to fully malicious models and delivering practical performance improvements.

Ant GroupMPCMalicious Security
0 likes · 4 min read
Coral: A Maliciously Secure Computation Framework for Packed and Mixed Circuits
AntTech
AntTech
Jul 7, 2024 · Information Security

2024 WAIC Forum on Privacy Computing: Enabling Trusted Data Sharing for Large Models

The 2024 WAIC Privacy Computing Forum gathered leading experts from academia and industry to discuss how encryption, anonymization, and secure multi‑party computation can protect data privacy while enabling large‑model training and inference, highlighting technical challenges, standards, and emerging solutions across AI, big data, and information security domains.

AIMPCPrivacy Computing
0 likes · 15 min read
2024 WAIC Forum on Privacy Computing: Enabling Trusted Data Sharing for Large Models
Alimama Tech
Alimama Tech
Feb 29, 2024 · Industry Insights

How Alibaba’s Secure Data Hub Powers Cross‑Domain Advertising Tracking with Privacy‑Preserving Computation

This article details how Alibaba Mama’s Secure Data Hub (SDH) leverages multi‑party computation, federated learning, and differential privacy to break data silos in advertising, enabling secure cross‑domain user tracking, full‑domain asset analysis, and rapid, privacy‑compliant marketing insights.

Federated LearningMPCPrivacy Computing
0 likes · 18 min read
How Alibaba’s Secure Data Hub Powers Cross‑Domain Advertising Tracking with Privacy‑Preserving Computation
AntTech
AntTech
Dec 22, 2023 · Information Security

2023 Security and Trustworthy Computing Research Summary – 14 Papers Accepted at Top International Conferences

In late 2023, Ant Group and academic partners reported fourteen security‑focused research papers accepted at top venues such as USENIX Security, ACM CCS, and USENIX ATC, covering privacy‑preserving computation, secure two‑party GBDT training, macOS kernel fuzzing, privacy‑preserving ML frameworks, Rust OOM handling, and more.

MPCSystemscryptography
0 likes · 18 min read
2023 Security and Trustworthy Computing Research Summary – 14 Papers Accepted at Top International Conferences
AntTech
AntTech
Dec 12, 2023 · Information Security

Privacy Computing Case Study: Multi‑Party Secure Computation for Financial Risk Control by Jiangsu Bank and Ningbo Bank

This article presents a detailed case study of how Jiangsu Bank and Ningbo Bank leveraged Ant Group’s multi‑party secure computation platform and the “YinYu” privacy‑computing framework to build joint risk‑control models, enhancing data sharing, security, and approval rates for inclusive finance.

Inclusive FinanceMPCPrivacy Computing
0 likes · 9 min read
Privacy Computing Case Study: Multi‑Party Secure Computation for Financial Risk Control by Jiangsu Bank and Ningbo Bank
AntTech
AntTech
Sep 2, 2023 · Information Security

Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information

The announcement details a September 7 forum hosted by the China Cryptology Society, featuring eight technical talks on cutting‑edge cryptographic and data‑security technologies—including hardware security, secure GPT inference, volume‑hiding encrypted multi‑maps, end‑to‑same‑end encryption, fully homomorphic encryption databases, dishonest‑majority MPC, active privacy computing, and the Bicoptor protocol—along with speaker biographies and abstracts.

MPCcryptographydata security
0 likes · 15 min read
Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information
DataFunSummit
DataFunSummit
Aug 27, 2023 · Artificial Intelligence

Privacy-Preserving Gradient Boosting Decision Trees via Multi-Party Computation and the Squirrel Framework

This article introduces a privacy-preserving gradient boosting decision tree (GBDT) solution built on multi‑party computation, detailing its background, training steps, the MPC tools used, and the Squirrel framework’s workflow, while discussing performance challenges and experimental results demonstrating scalability to millions of samples.

GBDTMPCSquirrel Framework
0 likes · 9 min read
Privacy-Preserving Gradient Boosting Decision Trees via Multi-Party Computation and the Squirrel Framework
AntTech
AntTech
Aug 16, 2023 · Information Security

Ant Group Research Institute Presents Two First-Author Papers at USENIX Security 2023 on Secure MPC for GBDT Training and Efficient 3PC for Binary Circuits

At the 32nd USENIX Security Symposium in Anaheim, Ant Group’s Research Institute sponsored the event and showcased two first‑author papers—one introducing the Squirrel framework for fast, secure two‑party computation of Gradient Boosting Decision Trees, and another proposing an efficient 3‑party protocol for binary circuits in maliciously‑secure DNN inference.

DNN inferenceMPCUSENIX Security
0 likes · 3 min read
Ant Group Research Institute Presents Two First-Author Papers at USENIX Security 2023 on Secure MPC for GBDT Training and Efficient 3PC for Binary Circuits
AI Cyberspace
AI Cyberspace
Mar 9, 2023 · Backend Development

Build a Cross‑Platform C REPL with GNU Readline and MPC Parser

This guide walks through building a cross‑platform interactive C REPL, covering basic input/output loops, integrating GNU Readline for line editing and history, handling portability with preprocessor directives, and using the MPC library to create a simple Doge language parser.

CGNU ReadlineMPC
0 likes · 14 min read
Build a Cross‑Platform C REPL with GNU Readline and MPC Parser
DataFunSummit
DataFunSummit
Feb 12, 2023 · Information Security

Privacy Computing: Technical Routes Overview and Ant Group’s Contributions

This article introduces and compares major privacy computing technologies—including MPC, federated learning, TEE, and proxy MPC—evaluating them across security, development cost, operational cost, accuracy, performance, participant scale, control, hardware cost, and trust, and then outlines Ant Group’s privacy computing framework, applications, and standards work.

Ant GroupFederated LearningMPC
0 likes · 8 min read
Privacy Computing: Technical Routes Overview and Ant Group’s Contributions
DataFunSummit
DataFunSummit
Nov 28, 2022 · Artificial Intelligence

Introduction to Federated Learning: Concepts, Key Technologies, and the Dianshi Federated Learning Platform

This article introduces the concept of federated learning, outlines its industry opportunities and challenges, explains the evolution of data‑sharing technologies, details core techniques such as MPC, TEE, and differential privacy, and presents the architecture and capabilities of the Dianshi federated learning platform.

AIMPCTEE
0 likes · 20 min read
Introduction to Federated Learning: Concepts, Key Technologies, and the Dianshi Federated Learning Platform
AntTech
AntTech
Sep 22, 2022 · Artificial Intelligence

SecretFlow Open‑Source Privacy Computing Framework Releases Version 0.7 with Enhanced MPC, Federated Learning, and Performance Optimizations

The SecretFlow privacy‑computing open‑source framework announced its inclusion in the PPCA Open‑Source Working Group and launched version 0.7, adding multi‑party computation, federated learning, infrastructure upgrades, and documentation improvements to advance secure AI and data analytics.

AIFederated LearningMPC
0 likes · 7 min read
SecretFlow Open‑Source Privacy Computing Framework Releases Version 0.7 with Enhanced MPC, Federated Learning, and Performance Optimizations
AntTech
AntTech
Apr 8, 2022 · Artificial Intelligence

Release of Financial Application Guidance for Multi‑Party Secure Computation and Federated Learning

On March 29, the Beijing FinTech Industry Alliance published two white‑papers—‘Multi‑Party Secure Computation Financial Application Status and Implementation Guide’ and ‘Federated Learning Technology Financial Application White Paper’—detailing policies, standards, case studies, and recommendations for deploying privacy‑preserving AI technologies in the financial sector.

AIFederated LearningMPC
0 likes · 4 min read
Release of Financial Application Guidance for Multi‑Party Secure Computation and Federated Learning
DataFunTalk
DataFunTalk
Mar 30, 2022 · Information Security

A Brief History of Cryptography and the Rise of Privacy Computing

This article surveys the evolution of cryptography from ancient Mesopotamian cipher sticks through classical ciphers, the Enigma machine, modern public‑key systems, and multi‑party computation, then explains the concept, current challenges, and future directions of privacy‑preserving computation technologies.

MPCcryptographyinformation security
0 likes · 19 min read
A Brief History of Cryptography and the Rise of Privacy Computing
Meituan Technology Team
Meituan Technology Team
Dec 24, 2020 · Artificial Intelligence

Integrated Lateral‑Longitudinal Control for Autonomous Vehicles Using Linear Time‑Varying MPC

The paper presents an integrated lateral‑longitudinal control framework for autonomous vehicles that employs a coupled vehicle model and joint constraints within a linear time‑varying model predictive control scheme, yielding a unified performance index and demonstrating more human‑like, balanced tracking of speed, position, and yaw compared with traditional separated controllers.

MPCModel Predictive Controlautonomous driving
0 likes · 14 min read
Integrated Lateral‑Longitudinal Control for Autonomous Vehicles Using Linear Time‑Varying MPC
AntTech
AntTech
Aug 18, 2020 · Artificial Intelligence

Shared Intelligence vs. Federated Learning: Techniques, Challenges, and Ant Group’s Practical Experience

The article compares shared intelligence and federated learning, examines privacy‑preserving techniques such as MPC, TEE, and differential privacy, discusses gradient‑inversion attacks and their mitigations, and presents Ant Group’s end‑to‑end system design and real‑world deployments in finance.

AI securityAnt GroupFederated Learning
0 likes · 22 min read
Shared Intelligence vs. Federated Learning: Techniques, Challenges, and Ant Group’s Practical Experience
Youku Technology
Youku Technology
Aug 26, 2019 · Artificial Intelligence

Technical Deep Dive of Adaptive Streaming for “The Longest Day in Chang'an”: AI, Big Data, and QoE Optimization

Alibaba Entertainment’s technical deep‑dive reveals how its Smart Bitrate system leverages big‑data analytics, AI‑driven machine‑learning (including MPC and the Pensieve model) to dynamically select 5‑10‑second video segments, optimizing QoE by balancing high‑definition playback and buffering, achieving 5‑10% more HD viewing and 10‑20% fewer stalls for “The Longest Day in Chang’an.”

AIMPCQoE
0 likes · 10 min read
Technical Deep Dive of Adaptive Streaming for “The Longest Day in Chang'an”: AI, Big Data, and QoE Optimization
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 1, 2019 · Information Security

How MPC‑Based Key Management Eliminates Key Leakage Risks

This article explains the challenges of traditional key management, compares local and server‑side encryption approaches, and introduces a secure multi‑party computation (MPC) key management system that distributes key fragments across multiple servers to prevent key exposure even if some nodes are compromised.

MPCThreshold Cryptographyinformation security
0 likes · 9 min read
How MPC‑Based Key Management Eliminates Key Leakage Risks
Hulu Beijing
Hulu Beijing
Apr 18, 2019 · Artificial Intelligence

How Deep Reinforcement Learning Optimizes DASH/HLS Bitrate Adaptation

This article examines the challenges of adaptive bitrate selection in DASH and HLS streaming, compares traditional MPC and buffer‑based methods, and explains how deep reinforcement learning, specifically the Pensieve A3C model, addresses QoE optimization under uncertain network conditions.

DASHMPCQoE
0 likes · 8 min read
How Deep Reinforcement Learning Optimizes DASH/HLS Bitrate Adaptation