“…The second broad class of approaches is protocol-based, requiring multiple rounds of communication where data is sent back-and-forth between the host that is requesting computation, and the third party server performing the bulk of computation. Methods like Secure Multi-party Com-putation (SMC) (Kerschbaum, 2006;Du & Atallah, 2001) and other "protocols" are developed on top of "Oblivious Transfer" (OT), a primitive by which a sender and receiver exchange messages (Rabin, 1981). Many OT protocols 3 have been customized for deep learning applications (Riazi et al, 2018;Rouhani et al, 2018;Chandran et al, 2019;Riazi et al, 2019;Liu et al, 2017;Mohassel & Zhang, 2017), but suffer similar limitations to FHE.…”