Tag

Secure Computation

0 views collected around this technical thread.

AntTech
AntTech
Oct 31, 2024 · Information Security

Coral: A Maliciously Secure Computation Framework for Packed and Mixed Circuits

Ant Group’s cryptography lab introduced Coral, a new maliciously secure multi‑party computation framework that leverages a reverse multiplication‑friendly embedding (RMFE) to efficiently handle packed and mixed circuits, enhancing security from semi‑honest to fully malicious models and delivering practical performance improvements.

Ant GroupMPCMalicious Security
0 likes · 4 min read
Coral: A Maliciously Secure Computation Framework for Packed and Mixed Circuits
AntTech
AntTech
Sep 25, 2024 · Information Security

Live Presentation of “Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits” – Paper Highlights and Insights

The announcement introduces the ACM CCS flagship conference, highlights the award‑winning Coral paper that advances malicious secure multi‑party computation with the novel RMFE packing algorithm, and invites readers to a live online session on September 26, 2024 for an in‑depth walkthrough of its theory, technical innovations, and future applications.

ACM CCSCoral FrameworkLive Presentation
0 likes · 4 min read
Live Presentation of “Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits” – Paper Highlights and Insights
AntTech
AntTech
Sep 2, 2023 · Information Security

Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information

The announcement details a September 7 forum hosted by the China Cryptology Society, featuring eight technical talks on cutting‑edge cryptographic and data‑security technologies—including hardware security, secure GPT inference, volume‑hiding encrypted multi‑maps, end‑to‑same‑end encryption, fully homomorphic encryption databases, dishonest‑majority MPC, active privacy computing, and the Bicoptor protocol—along with speaker biographies and abstracts.

Data SecurityMPCSecure Computation
0 likes · 15 min read
Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information
DataFunSummit
DataFunSummit
Aug 27, 2023 · Artificial Intelligence

Privacy-Preserving Gradient Boosting Decision Trees via Multi-Party Computation and the Squirrel Framework

This article introduces a privacy-preserving gradient boosting decision tree (GBDT) solution built on multi‑party computation, detailing its background, training steps, the MPC tools used, and the Squirrel framework’s workflow, while discussing performance challenges and experimental results demonstrating scalability to millions of samples.

GBDTMPCSecure Computation
0 likes · 9 min read
Privacy-Preserving Gradient Boosting Decision Trees via Multi-Party Computation and the Squirrel Framework
DataFunSummit
DataFunSummit
Jul 7, 2023 · Information Security

Exploration and Reflections on Interoperability of Privacy Computing

This article presents a comprehensive overview of privacy‑computing interoperability in the financial sector, covering background challenges, the Beijing FinTech Alliance’s collaborative project structure, an industry‑level framework with technical and requirement layers, sub‑topic research results, achieved milestones, and future outlook for standardisation and ecosystem building.

Data SharingSecure Computationfinancial data security
0 likes · 11 min read
Exploration and Reflections on Interoperability of Privacy Computing
AntTech
AntTech
Sep 22, 2022 · Artificial Intelligence

SecretFlow Open‑Source Privacy Computing Framework Releases Version 0.7 with Enhanced MPC, Federated Learning, and Performance Optimizations

The SecretFlow privacy‑computing open‑source framework announced its inclusion in the PPCA Open‑Source Working Group and launched version 0.7, adding multi‑party computation, federated learning, infrastructure upgrades, and documentation improvements to advance secure AI and data analytics.

AIFederated LearningMPC
0 likes · 7 min read
SecretFlow Open‑Source Privacy Computing Framework Releases Version 0.7 with Enhanced MPC, Federated Learning, and Performance Optimizations
DataFunSummit
DataFunSummit
Jul 19, 2022 · Information Security

Fully Homomorphic Encryption: Origins, Development, Applications, and Engineering Challenges in Privacy Computing

This article explores the limitations of current non‑fully homomorphic privacy computing techniques, traces the evolution of fully homomorphic encryption, examines its practical applications in finance and machine learning, and discusses engineering challenges, protocol choices, and implementation considerations for secure data processing.

Financial ApplicationsFully Homomorphic EncryptionSecure Computation
0 likes · 16 min read
Fully Homomorphic Encryption: Origins, Development, Applications, and Engineering Challenges in Privacy Computing
JD Tech Talk
JD Tech Talk
Sep 30, 2020 · Artificial Intelligence

Secure Training Methods for Federated Transfer Learning

This article reviews the model structure of federated transfer learning and details three secure training approaches—additive homomorphic encryption, ABY, and SPDZ—combined with polynomial approximation, explaining their protocols, steps, and the role of federated transfer learning within the broader federated learning landscape.

Federated LearningSecure Computationhomomorphic encryption
0 likes · 11 min read
Secure Training Methods for Federated Transfer Learning