2009
DOI: 10.1007/978-3-642-04444-1_26
|View full text |Cite
|
Sign up to set email alerts
|

Secure Evaluation of Private Linear Branching Programs with Medical Applications

Abstract: Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Branching programs (BP) is a popular representation model for describing the underlying classification/diagnostics algorithms. Typical application scenarios involve a client who provides data and a service provider (server) whose diagnostic program is run on client's data. Both parties need to keep their inputs private. We present new, more effici… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
109
0
1

Year Published

2010
2010
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 94 publications
(111 citation statements)
references
References 29 publications
0
109
0
1
Order By: Relevance
“…1 We begin by showing a protocol in the semi-honest setting; this illustrates our core techniques and represents what we consider to be our main contribution. (Semi-honest security was the focus of all prior work on PFE [33,6,8,9,11,12,13,19,5,32,30,3].) Zero-knowledge proofs can be used in the standard way [15] to obtain security against malicious parties, still in constant rounds and with linear complexity; however, the resulting protocol is unlikely in practice to out-perform secure computation of universal circuits using efficient protocols for the malicious setting (e.g., [23]).…”
Section: Contributions Of Our Workmentioning
confidence: 99%
See 2 more Smart Citations
“…1 We begin by showing a protocol in the semi-honest setting; this illustrates our core techniques and represents what we consider to be our main contribution. (Semi-honest security was the focus of all prior work on PFE [33,6,8,9,11,12,13,19,5,32,30,3].) Zero-knowledge proofs can be used in the standard way [15] to obtain security against malicious parties, still in constant rounds and with linear complexity; however, the resulting protocol is unlikely in practice to out-perform secure computation of universal circuits using efficient protocols for the malicious setting (e.g., [23]).…”
Section: Contributions Of Our Workmentioning
confidence: 99%
“…Here we treat the more difficult case where everything about the circuit (except an upper bound on its size and the number of inputs/outputs) is hidden. Another direction has been to consider PFE for limited classes of functions: e.g., functions defined by low-depth circuits [33,4], branching programs [19,3], or polynomials [9,27]. Here we handle functions defined by arbitrary (polynomial-size) circuits.…”
Section: Other Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, several solutions have been proposed that use SMC to enhance privacy in auctions [12], data clustering [13], [14] or filtering [15]. Recently, there is also an increased interest in combining SMC with methods of signal processing in order to be able to privately analyze signals; examples are the analysis of medical signals [16] or the evaluation of biometrics on encrypted data [2]. All these systems currently rely on a fixed-point representation of the signals.…”
Section: Secure Multiparty Computation (Smc) Several Constructions Fmentioning
confidence: 99%
“…A number of previous work [1,2,4,12,14,15,16,17,22,24] have considered the design and implementation of more efficient general-and special-purpose private function evaluation. A major motivation behind these solutions (and PFE in general) is to hide the function being computed since it is proprietary, private or contains sensitive information.…”
Section: Introductionmentioning
confidence: 99%