Tag

secure multi-party computation

0 views collected around this technical thread.

AntTech
AntTech
Dec 6, 2024 · Artificial Intelligence

Nimbus: Secure and Efficient Two‑Party Inference for Transformers

The paper introduces Nimbus, a two‑party privacy‑preserving inference framework for Transformer models that leverages a client‑side outer‑product linear‑layer protocol and distribution‑aware polynomial approximations for non‑linear layers, achieving up to five‑fold speedups with negligible accuracy loss.

Transformerhomomorphic encryptionmachine learning
0 likes · 15 min read
Nimbus: Secure and Efficient Two‑Party Inference for Transformers
AntTech
AntTech
Aug 29, 2024 · Databases

Highlights of Ant Group Papers Presented at VLDB 2024

From August 26‑30, 2024, Ant Group showcased eight papers—including seven oral presentations—at the VLDB 2024 conference in Guangzhou, covering advances in knowledge‑graph warehouses, graph analytics, joint clustering and imputation, secure multi‑party queries, distributed logging, deep recommendation model training, cloud autoscaling, and LLM‑driven database interaction.

Ant GroupDatabase ResearchVLDB2024
0 likes · 14 min read
Highlights of Ant Group Papers Presented at VLDB 2024
Alimama Tech
Alimama Tech
Dec 21, 2023 · Information Security

Alibaba Mama Secure Data Hub: Cloud Architecture and Privacy-Preserving Advertising

Alibaba Mama’s Secure Data Hub delivers a privacy‑enhanced clean‑room for advertising by combining multi‑party computation, federated learning and differential privacy with encrypted operators on a Flink engine, offering cloud‑agnostic, scalable deployment that enables cross‑domain analytics while protecting raw user data and boosting ROI.

Advertising AnalyticsFederated Learningcloud deployment
0 likes · 13 min read
Alibaba Mama Secure Data Hub: Cloud Architecture and Privacy-Preserving Advertising
AntTech
AntTech
Dec 12, 2023 · Information Security

Privacy Computing Case Study: Multi‑Party Secure Computation for Financial Risk Control by Jiangsu Bank and Ningbo Bank

This article presents a detailed case study of how Jiangsu Bank and Ningbo Bank leveraged Ant Group’s multi‑party secure computation platform and the “YinYu” privacy‑computing framework to build joint risk‑control models, enhancing data sharing, security, and approval rates for inclusive finance.

Inclusive FinanceMPCdata security
0 likes · 9 min read
Privacy Computing Case Study: Multi‑Party Secure Computation for Financial Risk Control by Jiangsu Bank and Ningbo Bank
DataFunSummit
DataFunSummit
Nov 8, 2023 · Blockchain

Privacy Computing and Blockchain Integration for Secure Data Flow: Practices and Case Studies by WeBank

This article presents WeBank's exploration of privacy‑computing technologies combined with blockchain to enable secure, compliant data flow across enterprises, detailing the regulatory background, technical architectures, key use‑case scenarios such as anonymous query, privacy intersection, joint prediction and statistics, and real‑world deployments including the 2022 Big Data “Star River” benchmark cases.

WeBankblockchaindata security
0 likes · 16 min read
Privacy Computing and Blockchain Integration for Secure Data Flow: Practices and Case Studies by WeBank
vivo Internet Technology
vivo Internet Technology
Aug 23, 2023 · Artificial Intelligence

Federated Learning: Privacy-Preserving Collaborative AI Across Data Islands

Federated learning enables multiple organizations to jointly train high‑performing AI models without sharing raw data, using techniques such as secure multi‑party computation, differential privacy, and homomorphic encryption, thereby overcoming data‑island and regulatory constraints and supporting applications in mobile edge AI, finance, retail, and healthcare.

Artificial IntelligenceData IslandFederated Learning
0 likes · 19 min read
Federated Learning: Privacy-Preserving Collaborative AI Across Data Islands
AntTech
AntTech
Aug 16, 2023 · Information Security

Ant Group Research Institute Presents Two First-Author Papers at USENIX Security 2023 on Secure MPC for GBDT Training and Efficient 3PC for Binary Circuits

At the 32nd USENIX Security Symposium in Anaheim, Ant Group’s Research Institute sponsored the event and showcased two first‑author papers—one introducing the Squirrel framework for fast, secure two‑party computation of Gradient Boosting Decision Trees, and another proposing an efficient 3‑party protocol for binary circuits in maliciously‑secure DNN inference.

CryptographyDNN InferenceGradient Boosting
0 likes · 3 min read
Ant Group Research Institute Presents Two First-Author Papers at USENIX Security 2023 on Secure MPC for GBDT Training and Efficient 3PC for Binary Circuits
AntTech
AntTech
Jul 14, 2023 · Information Security

Open Privacy Computing Protocol SS‑LR: A Secret‑Sharing Based Logistic Regression Framework

The SS‑LR open protocol describes a secret‑sharing based logistic regression algorithm split into four layers—machine learning, secure operators, cryptographic protocol, and network transmission—enabling interoperable, privacy‑preserving data flow and secure multi‑party model training across institutions.

SS-LRdata securitylogistic regression
0 likes · 7 min read
Open Privacy Computing Protocol SS‑LR: A Secret‑Sharing Based Logistic Regression Framework
AntTech
AntTech
Jul 7, 2023 · Information Security

SecretFlow’s YinYu 1.0 Release: New MVP Deployment Package, Expanded Architecture, and Full‑Stack Interoperability

The YinYu 1.0 release introduces an MVP deployment package for privacy‑computing beginners, expands the product, resource, and connectivity layers, adds the Kuscia orchestration framework, enhances algorithm, device, and cryptographic capabilities, and promotes full‑stack interoperability across platforms.

KusciaMVP deploymentSecretFlow
0 likes · 9 min read
SecretFlow’s YinYu 1.0 Release: New MVP Deployment Package, Expanded Architecture, and Full‑Stack Interoperability
AntTech
AntTech
Mar 29, 2023 · Information Security

Introducing SCQL: Secure Collaborative Query Language for Privacy-Preserving Data Analysis

SCQL, an open‑source Secure Collaborative Query Language built on multi‑party computation, enables SQL‑style privacy‑preserving data analysis for small‑to‑medium organizations by offering easy integration, fine‑grained column‑level access control, broad data‑source support, and optimized performance for collaborative queries.

SCQLSQLdata analysis
0 likes · 6 min read
Introducing SCQL: Secure Collaborative Query Language for Privacy-Preserving Data Analysis
Alimama Tech
Alimama Tech
Mar 8, 2023 · Artificial Intelligence

Secure Data Hub: Alibaba's Marketing Privacy Computing Platform

Alibaba’s Secure Data Hub (SDH) is a privacy‑preserving data clean‑room platform that uses secure multi‑party computation and privacy‑enhancing machine learning to let advertisers, ad platforms, and auditors jointly analyze marketing data via a simple SQL API while keeping raw data encrypted, column‑level protected, and confined to each party’s private domain.

Big DataData Clean RoomFederated Learning
0 likes · 13 min read
Secure Data Hub: Alibaba's Marketing Privacy Computing Platform
DataFunTalk
DataFunTalk
Feb 11, 2023 · Information Security

Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping

The interview with Alibaba Cloud Datatrust architect Liang Aiping reveals that privacy computing is still in its early stage, facing technical challenges in data sources, algorithm theory‑engineering gaps, system management interoperability, and product trade‑offs, while outlining future trends toward cross‑platform interoperability and distributed computing.

algorithm engineeringdata securityinteroperability
0 likes · 13 min read
Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping
Alimama Tech
Alimama Tech
Jan 3, 2023 · Information Security

Alibaba Mama Secure Data Hub Passes Trusted Privacy Computing Evaluation

Alibaba Mama’s Secure Data Hub, a privacy‑preserving data clean‑room platform that uses multi‑party computation and federated learning for secure advertising analytics, successfully passed the China Academy of Information and Communications Technology’s Trusted Privacy Computing evaluation, confirming its strong security, compliance and industry‑recognized capabilities.

AlibabaData Clean RoomFederated Learning
0 likes · 3 min read
Alibaba Mama Secure Data Hub Passes Trusted Privacy Computing Evaluation
DataFunSummit
DataFunSummit
Dec 18, 2022 · Information Security

Privacy Computing: Concepts, Product Architecture, and Medical Industry Applications by Ant Group

This article explains Ant Group's privacy computing framework, covering its fundamental concepts, layered product architecture, and four concrete use‑cases in the medical sector—including insurance, hospitals, health commissions, and medical device manufacturers—demonstrating how secure multi‑party computation and federated learning enable data collaboration while preserving privacy.

Ant GroupFederated Learningdata security
0 likes · 12 min read
Privacy Computing: Concepts, Product Architecture, and Medical Industry Applications by Ant Group
DataFunSummit
DataFunSummit
Dec 15, 2022 · Information Security

Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice

This article examines the growing complexity of financial risk scenarios, outlines global privacy regulations, describes Ant Group's three‑layer multi‑party secure risk‑control architecture, showcases anti‑fraud and external client use cases, and discusses current challenges and future directions for secure, privacy‑preserving risk management.

financial securityprivacy protectionregulatory compliance
0 likes · 14 min read
Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice
Tencent Tech
Tencent Tech
Dec 9, 2022 · Artificial Intelligence

How Tencent’s Angel PowerFL Team Dominated iDASH with Homomorphic Encryption

Tencent’s Angel PowerFL team clinched the iDASH homomorphic encryption champion and secured top spots in MPC and SGX tracks, showcasing innovative privacy‑preserving machine‑learning models, CKKS‑based encrypted inference, and a scalable SGX clustering solution that push the boundaries of secure computation.

homomorphic encryptioniDASHmachine learning
0 likes · 5 min read
How Tencent’s Angel PowerFL Team Dominated iDASH with Homomorphic Encryption
DataFunSummit
DataFunSummit
Nov 6, 2022 · Artificial Intelligence

Guangfa Group’s Federated Learning Exploration, Platform Construction, and the Book “Federated Learning Principles and Applications”

This article outlines Guangfa Group’s initiatives in privacy computing and federated learning, detailing the development of its federated learning platform, contributions to open‑source FATE, industry standards, various application scenarios such as joint statistics, precise marketing, risk control, cross‑domain verification, and introduces their newly published book on federated learning principles and applications.

Artificial IntelligenceBig DataFATE
0 likes · 23 min read
Guangfa Group’s Federated Learning Exploration, Platform Construction, and the Book “Federated Learning Principles and Applications”
DataFunSummit
DataFunSummit
Nov 5, 2022 · Information Security

TECC: A New Approach to Trusted Enclave Confidential Computing – Architecture, Security, and Performance

The article introduces TECC, a privacy‑computing framework that balances security and performance by using trusted execution environments, data secret‑sharing, lightweight cryptographic protocols, and Rust‑based implementation to enable near‑plaintext speed for secure multi‑party machine learning and data analysis.

RustTECCinformation security
0 likes · 10 min read
TECC: A New Approach to Trusted Enclave Confidential Computing – Architecture, Security, and Performance
DataFunSummit
DataFunSummit
Oct 8, 2022 · Information Security

Exploring Privacy Computing Technologies in the Open Financial Ecosystem

This article provides a comprehensive overview of privacy computing—covering its background, key techniques such as MPC, TEE, federated learning, homomorphic encryption, and differential privacy—and examines how these technologies are applied in open financial ecosystems, including use cases, challenges, and future directions.

Federated Learningblockchainfinancial data
0 likes · 25 min read
Exploring Privacy Computing Technologies in the Open Financial Ecosystem
DataFunSummit
DataFunSummit
Sep 19, 2022 · Artificial Intelligence

Privacy-Preserving Graph Learning and Recommendation: Techniques, Challenges, and Platform Overview

This article reviews the rapid development of privacy-preserving computation, explains its classification, discusses differential privacy, secure multi‑party computation, federated and split learning, and demonstrates how these techniques can be combined for graph learning and recommendation systems, culminating in a description of the JinZhiTa privacy‑computing platform.

Federated LearningRecommendation systemsdifferential privacy
0 likes · 20 min read
Privacy-Preserving Graph Learning and Recommendation: Techniques, Challenges, and Platform Overview