Secure Two-Party Feature Selection

01/03/2019
by   Vanishree Rao, et al.
0

In this work, we study how to securely evaluate the value of trading data without requiring a trusted third party. We focus on the important machine learning task of classification. This leads us to propose a provably secure four-round protocol that computes the value of the data to be traded without revealing the data to the potential acquirer. The theoretical results demonstrate a number of important properties of the proposed protocol. In particular, we prove the security of the proposed protocol in the honest-but-curious adversary model.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/01/2020

Gimme That Model!: A Trusted ML Model Trading Protocol

We propose a HE-based protocol for trading ML models and describe possib...
research
07/26/2022

Secure Internet Exams Despite Coercion

We study coercion-resistance for online exams. We propose two properties...
research
01/09/2018

An efficient and secure two-party key agreement protocol based on chaotic maps

Secure communication is a matter of genuine concern that includes means ...
research
03/18/2019

Securely Trading Unverifiable Information without Trust

In future, information may become one of the most important assets in ec...
research
06/13/2022

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Due to the computational cost of running inference for a neural network,...
research
12/14/2020

Verifiable Observation of Permissioned Ledgers

Permissioned ledger technologies have gained significant traction over t...
research
11/25/2019

Faster Privacy-Preserving Computation of Edit Distance with Moves

We consider an efficient two-party protocol for securely computing the s...

Please sign up or login with your details

Forgot password? Click here to reset