Secure Multi-Party Computation for Magnetic Resonance Imaging Classification
نویسندگان
چکیده
Accessing private data always requires a complex negotiation process. This process becomes even more challenging under privacy regulations such as the General Data Protection Regulation and California Consumer Privacy Act. However, in most cases, availability of greater amounts leads to significant technological breakthroughs. The perfect example is ImageNet classification challenge, which improvements image recognition area. combination these concerns raises question performing computations on that cannot be seen, whole new research field consolidates privacy-preserving concepts modern mining techniques comes into place. also purpose work presented this paper, discovery Secure Multi-Party Computation (SMPC) capabilities protecting during machine learning main attention paid towards SMPC approach based convolutional neural network, especially secure inference encrypted magnetic resonance images.
منابع مشابه
Unconditionally Secure Multi-Party Computation
The most general type of multi-party computation involves n participants. Participant i supplies private data xi and obtains an output function fi(x1, . . . , xn). The computation is said to be unconditionally secure if each participant can verify, with probability arbitrarily close to one, that every other participant obtains arbitrarily little information beyond their agreed output fi. We giv...
متن کاملHeterogeneous Secure Multi-Party Computation
The increased processing power and storage capacity of inhome and mobile computing devices has motivated their inclusion in distributed and cloud computing systems. The resulting diverse environment creates a strong requirement for secure computations, which can be realised by Secure Multi-Party Computation (MPC). However, MPC most commonly assumes that parties performing the secure computation...
متن کاملEfficient Secure Multi-party Computation
Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n6) field elements for each multiplication of two elements, even if only one pla...
متن کاملPrivacy-Preserving Classification and Clustering Using Secure Multi-Party Computation
Nowadays, data mining and machine learning techniques are widely used in electronic applications in different areas such as e-government, e-health, e-business, and so on. One major and very crucial issue in these type of systems, which are normally distributed among two or more parties and are dealing with sensitive data, is preserving the privacy of individual’s sensitive information. Each par...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2023
ISSN: ['1877-0509']
DOI: https://doi.org/10.1016/j.procs.2023.03.006