2022
DOI: 10.1007/978-3-031-20974-1_3
|View full text |Cite
|
Sign up to set email alerts
|

Through the Looking-Glass: Benchmarking Secure Multi-party Computation Comparisons for ReLU ’s

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…We present our protocols for the secure computation of the reciprocal and the (reciprocal) square root in terms of an arithmetic black box (following, e.g., [9][10][11]). The protocols are specified in pseudocode, using a limited set of operations commonly supported in many MPC frameworks.…”
Section: Secure Computationmentioning
confidence: 99%
See 2 more Smart Citations
“…We present our protocols for the secure computation of the reciprocal and the (reciprocal) square root in terms of an arithmetic black box (following, e.g., [9][10][11]). The protocols are specified in pseudocode, using a limited set of operations commonly supported in many MPC frameworks.…”
Section: Secure Computationmentioning
confidence: 99%
“…. , 2 f − 3} and odd f , employing initial approximation (9), and the number of iterations θ is computed with (12), then | θ,n | ≤ δ f +n . In particular, θ,n ∈ {−δ f +n , 0, δ f +n }.…”
Section: Conflicts Of Interestmentioning
confidence: 99%
See 1 more Smart Citation
“…The DL is a queue, represented as [) with back [ and front ) that contains cells' numbers along a multiplication path, i.e., the set of cells that must be multiplied together. In Figure 8, we have the following multiplication paths: (1,4,7,10), (1,4,8,9), (1,5,6), (2,3). For each path, we start with a Algorithm 8 Efficient implementation if 𝛽 = 0 then {AHE Section 6.4} 10: return permute(c) 33: end if list of nodes.…”
Section: Optimized Implementationmentioning
confidence: 99%
“…• Computation of the paths. Using the Illustration in Figure 8, we use a table representation of the tree as explained above and compute the paths: (1, 4, 7, 10), (1,4,8,9), (1,5,6), (2,3). This computation is illustrated in Algorithm 9.…”
Section: B Algorithms For Fhe Instantiationmentioning
confidence: 99%