all InfoSec news
Breaking Bicoptor from S$\&$P 2023 Based on Practical Secret Recovery Attack
April 8, 2024, 6:18 p.m. |
IACR News www.iacr.org
ePrint Report: Breaking Bicoptor from S$\&$P 2023 Based on Practical Secret Recovery Attack
Jun Xu, Zhiwei Li, Lei Hu
At S$\&$P 2023, a family of secure three-party computing protocols called Bicoptor was mainly proposed by Huawei Technology in China, which is used to compute non-linear functions in privacy preserving machine learning. In these protocols, two parties $P_0, P_1$ respectively hold the corresponding shares of the secret, while a third party $P_2$ acts as an assistant. The authors claimed that neither …
amp attack breaking called china compute computing eprint report family functions huawei linear non party privacy privacy preserving protocols recovery report secret technology
More from www.iacr.org / IACR News
A New Hash-based Enhanced Privacy ID Signature Scheme
1 day, 9 hours ago |
www.iacr.org
Hash-based Direct Anonymous Attestation
1 day, 9 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Senior Security Engineer
@ Core10 | Nashville, Tennessee, United States - Remote
Security Operations Engineer I
@ Jamf | US Remote
IT Security ISSO Specialist (15.10)
@ OCT Consulting, LLC | Washington, District of Columbia, United States
Compliance Officer
@ Aspire Software | Canada - Remote
Security Operations Center (SOC) - AVP
@ Paytm | Noida, Uttar Pradesh