This content will become publicly available on October 14, 2025
- Award ID(s):
- 2115075
- NSF-PAR ID:
- 10523723
- Publisher / Repository:
- CCS
- Date Published:
- ISSN:
- 10.1145/3658644.3670337
- ISBN:
- 979-8-4007-0636-3
- Format(s):
- Medium: X
- Location:
- Salt Lake City, UT, USA
- Sponsoring Org:
- National Science Foundation
More Like this
-
Canteaut, Anne ; Standaert, Francois-Xavier (Ed.)Secure multi-party computation (MPC) allows multiple par-ties to perform secure joint computations on their private inputs. To-day, applications for MPC are growing with thousands of parties wish-ing to build federated machine learning models or trusted setups for blockchains. To address such scenarios we propose a suite of novel MPC protocols that maximize throughput when run with large numbers of parties. In particular, our protocols have both communication and computation complexity that decrease with the number of parties. Our protocols build on prior protocols based on packed secret-sharing, introducing new techniques to build more efficient computation for general circuits. Specifically, we introduce a new approach for handling linear attacks that arise in protocols using packed secret-sharing and we propose a method for unpacking shared multiplication triples without increasingthe asymptotic costs. Compared with prior work, we avoid the log|C|overhead required when generically compiling circuits of size |C| for use in a SIMD computation, and we improve over folklore “committee-based” solutions by a factor of O(s), the statistical security parameter. In practice, our protocol is up to 10X faster than any known construction, under a reasonable set of parameters.more » « less
-
Canteaut, Anne ; Standaert, Francois-Xavier (Ed.)Secure multi-party computation (MPC) allows multiple par-ties to perform secure joint computations on their private inputs. To-day, applications for MPC are growing with thousands of parties wish-ing to build federated machine learning models or trusted setups for blockchains. To address such scenarios we propose a suite of novel MPC protocols that maximize throughput when run with large numbers of parties. In particular, our protocols have both communication and computation complexity that decrease with the number of parties. Our protocols build on prior protocols based on packed secret-sharing, introducing new techniques to build more efficient computation for general circuits. Specifically, we introduce a new approach for handling linear attacks that arise in protocols using packed secret-sharing and we propose a method for unpacking shared multiplication triples without increasingthe asymptotic costs. Compared with prior work, we avoid the log|C|overhead required when generically compiling circuits of size |C| for use in a SIMD computation, and we improve over folklore “committee-based” solutions by a factor of O(s), the statistical security parameter. In practice, our protocol is up to 10X faster than any known construction, under a reasonable set of parameters.more » « less
-
A machine learning-based detection framework is proposed to detect a class of cyber-attacks that redistribute loads by modifying measurements. The detection framework consists of a multi-output support vector regression (SVR) load predictor and a subsequent support vector machine (SVM) attack detector to determine the existence of load redistribution (LR) attacks utilizing loads predicted by the SVR predictor. Historical load data for training the SVR are obtained from the publicly available PJM zonal loads and are mapped to the IEEE 30-bus system. The features to predict loads are carefully extracted from the historical load data capturing both temporal and spatial correlations. The SVM attack detector is trained using normal data and randomly created LR attacks, so that it can maximally explore the attack space. An algorithm to create random LR attacks is introduced. The results show that the SVM detector trained merely using random attacks can effectively detect not only random attacks, but also intelligently designed attacks. Moreover, using the SVR predicted loads to re-dispatch generation when attacks are detected can significantly mitigate the attack consequences.more » « less
-
Abstract Using the existing measures for training numerical (non-categorical) prediction models can cause misclassification of droughts. Thus, developing a drought category-based measure is critical. Moreover, the existing fixed drought category thresholds need to be improved. The objective of this research is to develop a category-based scoring support vector regression (CBS-SVR) model based on an improved drought categorization method to overcome misclassification in drought prediction. To derive variable threshold levels for drought categorization, K-means (KM) and Gaussian mixture (GM) clustering are compared with the traditional drought categorization. For drought prediction, CBS-SVR is performed by using the best categorization method. The new drought model was applied to the Red River of the North Basin (RRB) in the USA. In the model training and testing, precipitation, temperature, and actual evapotranspiration were selected as the predictors, and the target variables consisted of multivariate drought indices, as well as bivariate and univariate standardized drought indices. Results indicated that the drought categorization method, variable threshold levels, and the type of drought index were the major factors that influenced the accuracy of drought prediction. The CBS-SVR outperformed the support vector classification and traditional SVR by avoiding overfitting and miscategorization in drought prediction.
-
null (Ed.)MiniQCrypt is a world where quantum-secure one-way functions exist, and quantum communication is possible. We construct an oblivious transfer (OT) protocol in MiniQCrypt that achieves simulation-security in the plain model against malicious quantum polynomial-time adversaries, building on the foundational work of Bennett, Brassard, Crépeau and Skubiszewska (CRYPTO 1991). Combining the OT protocol with prior works, we obtain secure two-party and multi-party computation protocols also in MiniQCrypt. This is in contrast to the classical world, where it is widely believed that one-way functions alone do not give us OT.more » « less