2019
DOI: 10.1007/978-3-030-21568-2_25
|View full text |Cite
|
Sign up to set email alerts
|

Benchmarking Privacy Preserving Scientific Operations

Abstract: In this work, we examine the efficiency of protocols for secure evaluation of basic mathematical functions (sqrt, sin, arcsin, amongst others), essential to various application domains. e.g., Artificial Intelligence. Furthermore, we have incorporated our code in state-of-the-art Multiparty Computation (MPC) software, so we can focus on the algorithms to be used as opposed to the underlying MPC system. We make use of practical approaches that, although, some of them, theoretically can be regarded as less effici… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(32 citation statements)
references
References 20 publications
0
32
0
Order By: Relevance
“…Logarithm Computation logarithm with any public base can be reduced to logarithm to base two using log x y = log 2 y • log x 2. Aly and Smart [2019] propose to represent y as y = a • 2 b , where a ∈ [0.5, 1) and b ∈ Z. This then allows to compute log 2 y = log 2 a + b.…”
Section: Domain Conversionmentioning
confidence: 99%
See 2 more Smart Citations
“…Logarithm Computation logarithm with any public base can be reduced to logarithm to base two using log x y = log 2 y • log x 2. Aly and Smart [2019] propose to represent y as y = a • 2 b , where a ∈ [0.5, 1) and b ∈ Z. This then allows to compute log 2 y = log 2 a + b.…”
Section: Domain Conversionmentioning
confidence: 99%
“…Exponentiation By using x y = 2 y log 2 x , any exponentiation can be reduced to exponentiation with base two. Aly and Smart [2019] show how to compute 2 a = 2 a • 2 a− a by computing the two exponents using bit decomposition and the second factor using a polynomial approximation. Regarding the first factor, if…”
Section: Domain Conversionmentioning
confidence: 99%
See 1 more Smart Citation
“…Standard logistic regression uses the sigmoid function based on the exponential, and computing the loss the logarithm function. Our implementation of these is based on the code provided in SCALE-MAMBA [4] by Aly and Smart [1].…”
Section: Our Implementationmentioning
confidence: 99%
“…In this section, we summarize the task. 1 Participants were invited to implement machine learning (ML) training in multi-party computation (MPC). MPC allows a set of parties to jointly compute on data hold among each other without revealing anything other than the result of the computation.…”
Section: Introductionmentioning
confidence: 99%