DeepAI AI Chat
Log In Sign Up

Secure Two-Party Feature Selection

by   Vanishree Rao, et al.

In this work, we study how to securely evaluate the value of trading data without requiring a trusted third party. We focus on the important machine learning task of classification. This leads us to propose a provably secure four-round protocol that computes the value of the data to be traded without revealing the data to the potential acquirer. The theoretical results demonstrate a number of important properties of the proposed protocol. In particular, we prove the security of the proposed protocol in the honest-but-curious adversary model.


page 1

page 2

page 3

page 4


Gimme That Model!: A Trusted ML Model Trading Protocol

We propose a HE-based protocol for trading ML models and describe possib...

Secure Internet Exams Despite Coercion

We study coercion-resistance for online exams. We propose two properties...

An efficient and secure two-party key agreement protocol based on chaotic maps

Secure communication is a matter of genuine concern that includes means ...

Securely Trading Unverifiable Information without Trust

In future, information may become one of the most important assets in ec...

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Due to the computational cost of running inference for a neural network,...

SMPC Task Decomposition: A Theory for Accelerating Secure Multi-party Computation Task

Today, we are in the era of big data, and data are becoming more and mor...

Faster Privacy-Preserving Computation of Edit Distance with Moves

We consider an efficient two-party protocol for securely computing the s...