Skip to main content

Showing 1–3 of 3 results for author: Aranha, D F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.20190  [pdf, other

    cs.CR cs.LG

    Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data

    Authors: Leonardo Neumann, Antonio GuimarĂ£es, Diego F. Aranha, Edson Borin

    Abstract: The widespread application of machine learning algorithms is a matter of increasing concern for the data privacy research community, and many have sought to develop privacy-preserving techniques for it. Among existing approaches, the homomorphic evaluation of ML algorithms stands out by performing operations directly over encrypted data, enabling strong guarantees of confidentiality. The homomorph… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

  2. arXiv:2308.15191  [pdf, ps, other

    cs.CR

    State of the Art Report: Verified Computation

    Authors: Jim Woodcock, Mikkel Schmidt Andersen, Diego F. Aranha, Stefan Hallerstede, Simon Thrane Hansen, Nikolaj Kuhne Jakobsen, Tomas Kulik, Peter Gorm Larsen, Hugo Daniel Macedo, Carlos Ignacio Isasa Martin, Victor Alexander Mtsimbe Norrild

    Abstract: This report describes the state of the art in verifiable computation. The problem being solved is the following: The Verifiable Computation Problem (Verifiable Computing Problem) Suppose we have two computing agents. The first agent is the verifier, and the second agent is the prover. The verifier wants the prover to perform a computation. The verifier sends a description of the computation to t… ▽ More

    Submitted 16 February, 2024; v1 submitted 29 August, 2023; originally announced August 2023.

    Comments: 54 pages

  3. arXiv:2101.07365  [pdf, other

    cs.CR cs.LG

    Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation

    Authors: Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha

    Abstract: We propose a privacy-preserving Naive Bayes classifier and apply it to the problem of private text classification. In this setting, a party (Alice) holds a text message, while another party (Bob) holds a classifier. At the end of the protocol, Alice will only learn the result of the classifier applied to her text input and Bob learns nothing. Our solution is based on Secure Multiparty Computation… ▽ More

    Submitted 8 June, 2021; v1 submitted 18 January, 2021; originally announced January 2021.