no code implementations • 18 Apr 2024 • Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo
With the increasingly widespread application of machine learning, how to strike a balance between protecting the privacy of data and algorithm parameters and ensuring the verifiability of machine learning has always been a challenge.
no code implementations • 23 Feb 2024 • Kaiping Cui, Xia Feng, Liangmin Wang, Haiqin Wu, XiaoYu Zhang, Boris Düdder
Specifically, in terms of share transfer, Chu-ko-nu breaks the probability P barrier by supplementing a redistribution process of secret key components (the sum of all components is the secret key), thus ensuring the reusability of the secret key.