DeepAI AI Chat
Log In Sign Up

Secure Two-Party Feature Selection

01/03/2019
by   Vanishree Rao, et al.
0

In this work, we study how to securely evaluate the value of trading data without requiring a trusted third party. We focus on the important machine learning task of classification. This leads us to propose a provably secure four-round protocol that computes the value of the data to be traded without revealing the data to the potential acquirer. The theoretical results demonstrate a number of important properties of the proposed protocol. In particular, we prove the security of the proposed protocol in the honest-but-curious adversary model.

READ FULL TEXT

page 1

page 2

page 3

page 4

03/01/2020

Gimme That Model!: A Trusted ML Model Trading Protocol

We propose a HE-based protocol for trading ML models and describe possib...
07/26/2022

Secure Internet Exams Despite Coercion

We study coercion-resistance for online exams. We propose two properties...
01/09/2018

An efficient and secure two-party key agreement protocol based on chaotic maps

Secure communication is a matter of genuine concern that includes means ...
03/18/2019

Securely Trading Unverifiable Information without Trust

In future, information may become one of the most important assets in ec...
06/13/2022

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Due to the computational cost of running inference for a neural network,...
03/01/2023

SMPC Task Decomposition: A Theory for Accelerating Secure Multi-party Computation Task

Today, we are in the era of big data, and data are becoming more and mor...
11/25/2019

Faster Privacy-Preserving Computation of Edit Distance with Moves

We consider an efficient two-party protocol for securely computing the s...