Proceedings of the Conference of the ACM Special Interest Group on Data Communication 2017
DOI: 10.1145/3098822.3098835
|View full text |Cite
|
Sign up to set email alerts
|

Pretzel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 61 publications
0
2
0
Order By: Relevance
“…The remaining four works had some concrete actionable transparency proposal: Section 4.4 of the Pretzel spam detector for E2EE by Gupta et al [155] is dedicated to transparency issues. In addition to preventing all but one bit of leakage against a malicious server, Gupta et al also discuss a particular client action that would allow the client to "opt out with plausible deniability" by garbling the incorrect function without the server's knowledge.…”
Section: Transparency Methods In the Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…The remaining four works had some concrete actionable transparency proposal: Section 4.4 of the Pretzel spam detector for E2EE by Gupta et al [155] is dedicated to transparency issues. In addition to preventing all but one bit of leakage against a malicious server, Gupta et al also discuss a particular client action that would allow the client to "opt out with plausible deniability" by garbling the incorrect function without the server's knowledge.…”
Section: Transparency Methods In the Literaturementioning
confidence: 99%
“…AI/ML via general crypto or MPC [34,76,155,198,284,315,323,370,383] (total: 9) AI/ML or matching fully clientside [4,86,128,138,207,214,352,366,377] (total: 9) Metadata-based [58,176,262,368,384] (total: 5) Other [269,329,351] (total: 3)…”
Section: Spam Filteringmentioning
confidence: 99%
“…Privacy-preserving protocols combine the benefits of analysis on shared data with privacy rights of the data owners. In a two-party scenario, privacy-preserving genome analysis [29], email spam filtering [23], image processing [13] and machine learning [34] have been successfully implemented, just to name a few. Formalization of such two-party computation is called Secure Function Evaluation (SFE).…”
Section: Introductionmentioning
confidence: 99%