Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2013
DOI: 10.1016/j.procs.2013.09.091
|View full text |Cite
|
Sign up to set email alerts
|

Floating Point Arithmetic Protocols for Constructing Secure Data Analysis Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 15 publications
0
16
0
Order By: Relevance
“…The IEEE 754 division and square root perform very well compared to approximation-based versions, whereas the error function and multiplication are slower on larger input sizes. Our protocols well outperform the results from [27] and our double precision addition and division are faster than the implementation of [1], however, multiplication is slightly slower. The latter is expected, since it is efficient to implement floating-point multiplication using secret sharing and less is gained from a GC approach.…”
Section: Performance Analysismentioning
confidence: 72%
See 2 more Smart Citations
“…The IEEE 754 division and square root perform very well compared to approximation-based versions, whereas the error function and multiplication are slower on larger input sizes. Our protocols well outperform the results from [27] and our double precision addition and division are faster than the implementation of [1], however, multiplication is slightly slower. The latter is expected, since it is efficient to implement floating-point multiplication using secret sharing and less is gained from a GC approach.…”
Section: Performance Analysismentioning
confidence: 72%
“…For example, overflows and underflows will result in infinities, multiplying 0 with infinity results in NaN etc. Previous implementations [1][20] [27] did not explicitly handle such cases and produced valid but meaningless results in error situations. Nonetheless, our approach would easily support raising standardized exception flags also in between operations, for example by adding an exception flag variable as an input and output to all circuits.…”
Section: Circuits For Ieee 754 Primitivesmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to access the full power of numerical methods, one needs an implementation of floating point arithmetic. This has been done by three groups of authors, Aliasgari et al [1], Liu et al [15], and Kamm and Willemson [11]. All these approaches follow the same basic pattern -the floating point number x is represented as…”
Section: Previous Workmentioning
confidence: 99%
“…Then all the authors proceed to build elementary operations of addition and multiplication, followed by some selection of more complicated functions. Liu et al [15] consider two-party additive secret sharing over a ring Z N and only develop addition, subtraction, multiplication and division.…”
Section: Previous Workmentioning
confidence: 99%