April 28, 2023, 6:06 p.m. |

IACR News www.iacr.org

ePrint Report: Implementing and Optimizing Matrix Triples with Homomorphic Encryption

Johannes Mono, Tim Güneysu


In today’s interconnected world, data has become a valuable asset, leading to a growing interest in protecting it through techniques such as privacy-preserving computation. Two well-known approaches are multi-party computation and homomorphic encryption with use cases such as privacy-preserving machine learning evaluating or training neural networks. For multi-party computation, one of the fundamental arithmetic operations is the secure multiplication in the malicious security model and by …

asset cases computation compute data encryption eprint report extension homomorphic encryption interest machine machine learning malicious matrix networks neural networks operations party privacy protecting report security techniques tim training use cases well-known world

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff DFIR Investigator

@ SentinelOne | United States - Remote

Senior Consultant.e (H/F) - Product & Industrial Cybersecurity

@ Wavestone | Puteaux, France

Information Security Analyst

@ StarCompliance | York, United Kingdom, Hybrid

Senior Cyber Security Analyst (IAM)

@ New York Power Authority | White Plains, US