Dated Jan 22, 2019;
last modified on Sun, 14 Mar 2021
Examples include: secure communication, anti-tracking features in browsers and mobile OSes, secure multiparty computation, differential privacy, anonymous communication, etc.
Timeline of Secure Multi-Party Communication In 1982, secure two-party computation (2PC) was introduced for problems that are boolean predicates, e.g. Yao’s Millionaires' Problem that asks whether \(a \ge b\) is true without revealing the actual values of \(a\) and \(b\).
Andrew Yao generalized 2PC for any feasible computation in 1986. Goldreich, Micali and Wigderson later generalized it to secure multiparty communication.
Yao-based protocols requires that the function to be securely evaluated be represented as a circuit, but an efficient transformation is not trivial....
Journals note that prediction services can still make accurate predictions using a fraction of the data collected from a user device. They propose Cloak, which suppresses non-pertinent features (i.e. those features which can consistently tolerate addition of noise without degrading utility) to the prediction task. Cloak has a provable degree of privacy, and unlike cryptographic techniques, does not degrade prediction latency. Using the training data, labels, a pre-trained model and a privacy-utility knob, they (1) find the pertinent features through perturbation training, and (2) learn utility-preserving constant values for suppressing the non-pertinent data....