Skip to main content

Showing 1–4 of 4 results for author: Rabin, T

Searching in archive cs. Search in all archives.
.
  1. Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning

    Authors: Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin

    Abstract: This paper introduces Flamingo, a system for secure aggregation of data across a large set of clients. In secure aggregation, a server sums up the private inputs of clients and obtains the result without learning anything about the individual inputs beyond what is implied by the final sum. Flamingo focuses on the multi-round setting found in federated learning in which many consecutive summations… ▽ More

    Submitted 13 October, 2024; v1 submitted 18 August, 2023; originally announced August 2023.

  2. arXiv:2004.02229  [pdf, other

    cs.CR cs.LG

    FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning

    Authors: Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin

    Abstract: We propose Falcon, an end-to-end 3-party protocol for efficient private training and inference of large machine learning models. Falcon presents four main advantages - (i) It is highly expressive with support for high capacity networks such as VGG16 (ii) it supports batch normalization which is important for training complex networks such as AlexNet (iii) Falcon guarantees security with abort agai… ▽ More

    Submitted 7 September, 2020; v1 submitted 5 April, 2020; originally announced April 2020.

    Comments: Revised version, contains some more experiments and fixes minor typos in the paper

  3. arXiv:1604.03160  [pdf

    cs.CY

    Towards a Privacy Research Roadmap for the Computing Community

    Authors: Lorrie Cranor, Tal Rabin, Vitaly Shmatikov, Salil Vadhan, Daniel Weitzner

    Abstract: Great advances in computing and communication technology are bringing many benefits to society, with transformative changes and financial opportunities being created in health care, transportation, education, law enforcement, national security, commerce, and social interactions. Many of these benefits, however, involve the use of sensitive personal data, and thereby raise concerns about privacy. F… ▽ More

    Submitted 11 April, 2016; originally announced April 2016.

    Comments: A Computing Community Consortium (CCC) white paper, 23 pages

  4. arXiv:1009.1759  [pdf, other

    cs.IT cs.CR

    On Compression of Data Encrypted with Block Ciphers

    Authors: Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin

    Abstract: This paper investigates compression of data encrypted with block ciphers, such as the Advanced Encryption Standard (AES). It is shown that such data can be feasibly compressed without knowledge of the secret key. Block ciphers operating in various chaining modes are considered and it is shown how compression can be achieved without compromising security of the encryption scheme. Further, it is sho… ▽ More

    Submitted 9 September, 2010; originally announced September 2010.