Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196522
|View full text |Cite
|
Sign up to set email alerts
|

Chameleon

Abstract: We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs. Chameleon combines the best aspects of generic SFE protocols with the ones that are based upon additive secret sharing. In particular, the framework performs linear operations in the ring Z 2 l using additively secret shared values and nonlinear operations using Yao's Garbled Circuits or the Goldreich-Micali-Wigders… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 294 publications
(30 citation statements)
references
References 73 publications
(139 reference statements)
0
26
0
Order By: Relevance
“…CryptoNets is basically developed by the Microsoft Research group, by introducing levelled Homomorphic Encryption (LHC). Due to nonlinear activation functions that cannot be achieved using LHE, the authors proposed that the activation functions are approached using polynomials of multiple degrees [41]. erefore, the neural network must be retrained in plain text with the same activation function to maintain good prediction accuracy.…”
Section: Cryptonetsmentioning
confidence: 99%
See 1 more Smart Citation
“…CryptoNets is basically developed by the Microsoft Research group, by introducing levelled Homomorphic Encryption (LHC). Due to nonlinear activation functions that cannot be achieved using LHE, the authors proposed that the activation functions are approached using polynomials of multiple degrees [41]. erefore, the neural network must be retrained in plain text with the same activation function to maintain good prediction accuracy.…”
Section: Cryptonetsmentioning
confidence: 99%
“…Chameleon uses secret sharing for arithmetic and addition functions. It has offline and online phases like in MiniONN [41]. e offline computation provided more fast computation for prediction instead of the online phase.…”
Section: Minionnmentioning
confidence: 99%
“…(1) Equality Check An equality check protocol Equality( x A , y A ) (e.g., [10], [40], [41]) outputs z B , where z = 1 iff x = y. A basic strategy for constructing Equality is as follows: we first compute t = x − y and then check all bits of t are 0 or not.…”
Section: Higher-level Secure Protocolsmentioning
confidence: 99%
“…(2) Less-Than Comparison A less-than comparison protocol (Comparison( x A , y A )) outputs z B , where z = 1 iff the condition x < y holds (e.g., [10], [40], [41]). A basic strategy for constructing Comparison is to check the sign of x − y.…”
Section: Higher-level Secure Protocolsmentioning
confidence: 99%
See 1 more Smart Citation