April 8, 2024, 6:18 p.m. |

IACR News www.iacr.org

ePrint Report: Breaking Bicoptor from S$\&$P 2023 Based on Practical Secret Recovery Attack

Jun Xu, Zhiwei Li, Lei Hu


At S$\&$P 2023, a family of secure three-party computing protocols called Bicoptor was mainly proposed by Huawei Technology in China, which is used to compute non-linear functions in privacy preserving machine learning. In these protocols, two parties $P_0, P_1$ respectively hold the corresponding shares of the secret, while a third party $P_2$ acts as an assistant. The authors claimed that neither …

amp attack breaking called china compute computing eprint report family functions huawei linear non party privacy privacy preserving protocols recovery report secret technology

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Engineer

@ Core10 | Nashville, Tennessee, United States - Remote

Security Operations Engineer I

@ Jamf | US Remote

IT Security ISSO Specialist (15.10)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

Compliance Officer

@ Aspire Software | Canada - Remote

Security Operations Center (SOC) - AVP

@ Paytm | Noida, Uttar Pradesh