all InfoSec news
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks. (arXiv:2311.04406v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Secure Multiparty Computation (MPC) protocols enable secure evaluation of a
circuit by several parties, even in the presence of an adversary who
maliciously corrupts all but one of the parties. These MPC protocols are
constructed using the well-known secret-sharing-based paradigm (SPDZ and
SPDZ2k), where the protocols ensure security against a malicious adversary by
computing Message Authentication Code (MAC) tags on the input shares and then
evaluating the circuit with these input shares and tags. However, this tag
computation adds a …
adversary computation enable evaluation mpc networks neural networks paradigm presence protocols secret secure multiparty computation sharing well-known