[1]Goldreich O. Foundations of Cryptography: Volume 2, Basic Applications[M]. Cambridge: Cambridge University Press, 2004: 599764[2]Bonawitz K, Ivanov V, Kreuter B, et al. Practical secure aggregation forprivacypreserving machine learning[C] Proc of the 2017 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2017: 11751191[3]Yang Y, Huang X, Liu X, et al. A comprehensive survey on secure outsourced computation and its applications[J]. IEEE Access, 2019, 7: 159426159465[4]Ma J, Zheng Y, Feng J, et al. SecretFlowSPU: A performant and userfriendly framework for privacypreserving machine learning[C] Proc of the 2023 USENIX Annual Technical Conference (USENIX ATC 23). Berkeley, CA: USENIX Association, 2023: 1733[5]Knott B, Venkataraman S, Hannun A, et al. Crypten: Secure multiparty computation meets machine learning[J]. Advances in Neural Information Processing Systems, 2021, 34: 49614973[6]Allen J H, Christie A M, Fithen W L, et al. State of the practice of intrusion detection technologies, CMUSEI99TR028[R]. Pittsburgh: Carnegie Mellon University, Software Engineering Institute, 2000[7]蒋凯元. 多方安全计算研究综述[J]. 信息安全研究, 2021, 7(12): 11611165[8]Mohassel P, Rindal P. ABY3: A mixed protocol framework for machine learning[C] Proc of the 2018 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM,2018: 3552[9]Li Y, Duan Y, Yu Y, et al. PrivPy: Enabling scalable and general privacypreserving machine learning[J]. arXiv preprint, arXiv:1801.10117, 2018[10]Damgrd I, Pastro V, Smart N, et al. Multiparty computation from somewhat homomorphic encryption[C] Proc of Annual Cryptology Conference. Berlin: Springer, 2012: 643662[11]Beaver D. Efficient multiparty protocols using circuit randomization[C] Proc of the 11th Annual Int Cryptology Conference. Berlin: Springer, 1992: 420432[12]Keller M, Orsini E, Scholl P. MASCOT: Faster malicious arithmetic secure computation with oblivious transfer[C] Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 830842[13]Keller M, Pastro V, Rotaru D. Overdrive: Making SPDZ great again[C] Proc of the Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2018: 158189[14]O’Shea K. An introduction to convolutional neural networks[J]. arXiv preprint, arXiv:1511.08458, 2015[15]Kivity A, Kamay Y, Laor D, et al. kvm: the Linux virtual machine monitor[COL] Proc of the Linux Symposium. 2007: 225230 [20250202]. https:www.kernel.orgdocols2007ols2007v1pages225230.pdf[16]Keller M, Sun K. Secure quantized training for deep learning[C] Proc of the Int Conf on Machine Learning. New York: PMLR, 2022: 1091210938[17]Keller M. MPSPDZ: A versatile framework for multiparty computation[C] Proc of the 2020 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2020: 15751590
|