Posts by Tags

ABY

For ABY Note: Sharing Conversions

less than 1 minute read

Published:

关于论文ABY的阅读笔记。The Conversion Method between Arithmetic, Binary and Yao Sharing –算术共享、布尔共享和混淆电路共享的相互转换

ABY3

For ABY Note: Sharing Conversions

less than 1 minute read

Published:

关于论文ABY的阅读笔记。The Conversion Method between Arithmetic, Binary and Yao Sharing –算术共享、布尔共享和混淆电路共享的相互转换

ABY3 Research Notes

less than 1 minute read

Published:

安全三方计算的机器学习框架

Algorithm

Some Basic Algorithm on PPML

less than 1 minute read

Published:

本次note讨论几个机器学习隐私保护预计算的几个算法

Bit Extraction

Classifiers

Some Classifiers with MPC

less than 1 minute read

Published:

安全多方计算下机器学习分类器的讨论

Decision Tree

Decision Tree Evaluation

Deep Learning

Differential Privacy

Falcon

Reading Falcon Note 2

less than 1 minute read

Published:

处理求数据池中最大值和批量正则化

Reading Falcon Note 1

1 minute read

Published:

诚实方占多数的恶意安全模型下Secure Deep Learning框架

Fixed-point Multiplication

Function Secret Sharing

Garbled Circuit

HE

Homomorphic Encryption

K-means Clustering

Logistic Regression

MPC

Some Classifiers with MPC

less than 1 minute read

Published:

安全多方计算下机器学习分类器的讨论

Reading Falcon Note 2

less than 1 minute read

Published:

处理求数据池中最大值和批量正则化

Reading Falcon Note 1

1 minute read

Published:

诚实方占多数的恶意安全模型下Secure Deep Learning框架

Machine Learning

Some Basic Algorithm on PPML

less than 1 minute read

Published:

本次note讨论几个机器学习隐私保护预计算的几个算法

Some Classifiers with MPC

less than 1 minute read

Published:

安全多方计算下机器学习分类器的讨论

ABY3 Research Notes

less than 1 minute read

Published:

安全三方计算的机器学习框架

Neural Network

Oblivious Transfer

Outsourcing

Privacy Computing Technology

Privacy Preserving

Some Basic Algorithm on PPML

less than 1 minute read

Published:

本次note讨论几个机器学习隐私保护预计算的几个算法

STPC

Secret Sharing

Secure Comparison

Reading Falcon Note 2

less than 1 minute read

Published:

处理求数据池中最大值和批量正则化

Reading Falcon Note 1

1 minute read

Published:

诚实方占多数的恶意安全模型下Secure Deep Learning框架

Secure Multi-parity Computation

Secure Multiply Computation

ABY3 Research Notes

less than 1 minute read

Published:

安全三方计算的机器学习框架

Secure Mutil-party Computation

Secure Three-party Computation

Secure Two-party Computation

Sharing Conversions

For ABY Note: Sharing Conversions

less than 1 minute read

Published:

关于论文ABY的阅读笔记。The Conversion Method between Arithmetic, Binary and Yao Sharing –算术共享、布尔共享和混淆电路共享的相互转换