Skip to main content

Showing 1–8 of 8 results for author: Riazi, M S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2002.08900  [pdf, other

    eess.IV cs.CV cs.LG

    SynFi: Automatic Synthetic Fingerprint Generation

    Authors: M. Sadegh Riazi, Seyed M. Chavoshian, Farinaz Koushanfar

    Abstract: Authentication and identification methods based on human fingerprints are ubiquitous in several systems ranging from government organizations to consumer products. The performance and reliability of such systems directly rely on the volume of data on which they have been verified. Unfortunately, a large volume of fingerprint databases is not publicly available due to many privacy and security conc… ▽ More

    Submitted 16 February, 2020; originally announced February 2020.

  2. arXiv:1909.09731  [pdf

    cs.CR cs.AI cs.AR cs.PF

    HEAX: An Architecture for Computing on Encrypted Data

    Authors: M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai

    Abstract: With the rapid increase in cloud computing, concerns surrounding data privacy, security, and confidentiality also have been increased significantly. Not only cloud providers are susceptible to internal and external hacks, but also in some scenarios, data owners cannot outsource the computation due to privacy laws such as GDPR, HIPAA, or CCPA. Fully Homomorphic Encryption (FHE) is a groundbreaking… ▽ More

    Submitted 23 January, 2020; v1 submitted 20 September, 2019; originally announced September 2019.

    Comments: To appear in proceedings of ACM ASPLOS 2020

  3. arXiv:1904.02033  [pdf, other

    cs.DS cs.CR cs.DB cs.LG stat.ML

    SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search

    Authors: Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi

    Abstract: The $k$-Nearest Neighbor Search ($k$-NNS) is the backbone of several cloud-based services such as recommender systems, face recognition, and database search on text and images. In these services, the client sends the query to the cloud server and receives the response in which case the query and response are revealed to the service provider. Such data disclosures are unacceptable in several scenar… ▽ More

    Submitted 8 March, 2020; v1 submitted 3 April, 2019; originally announced April 2019.

    Comments: 18 pages, to appear at USENIX Security Symposium 2020

  4. arXiv:1902.07342  [pdf, other

    cs.CR

    XONN: XNOR-based Oblivious Deep Neural Network Inference

    Authors: M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar

    Abstract: Advancements in deep learning enable cloud servers to provide inference-as-a-service for clients. In this scenario, clients send their raw data to the server to run the deep learning model and send back the results. One standing challenge in this setting is to ensure the privacy of the clients' sensitive data. Oblivious inference is the task of running the neural network on the client's input with… ▽ More

    Submitted 13 September, 2019; v1 submitted 19 February, 2019; originally announced February 2019.

    Comments: To appear in USENIX Security 2019

  5. arXiv:1902.02908  [pdf, other

    cs.CR

    ARM2GC: Succinct Garbled Processor for Secure Computation

    Authors: Ebrahim M. Songhori, M. Sadegh Riazi, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar

    Abstract: We present ARM2GC, a novel secure computation framework based on Yao's Garbled Circuit (GC) protocol and the ARM processor. It allows users to develop privacy-preserving applications using standard high-level programming languages (e.g., C) and compile them using off-the-shelf ARM compilers (e.g., gcc-arm). The main enabler of this framework is the introduction of SkipGate, an algorithm that dynam… ▽ More

    Submitted 17 October, 2019; v1 submitted 7 February, 2019; originally announced February 2019.

    Comments: 13 pages

  6. arXiv:1801.03239  [pdf, other

    cs.CR cs.AI

    Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications

    Authors: M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar

    Abstract: We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs. Chameleon combines the best aspects of generic SFE protocols with the ones that are based upon additive secret sharing. In particular, the framework performs linear operations in the ring… ▽ More

    Submitted 9 January, 2018; originally announced January 2018.

  7. arXiv:1705.08963  [pdf

    cs.CR

    DeepSecure: Scalable Provably-Secure Deep Learning

    Authors: Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar

    Abstract: This paper proposes DeepSecure, a novel framework that enables scalable execution of the state-of-the-art Deep Learning (DL) models in a privacy-preserving setting. DeepSecure targets scenarios in which neither of the involved parties including the cloud servers that hold the DL model parameters or the delegating clients who own the data is willing to reveal their information. Our framework is the… ▽ More

    Submitted 24 May, 2017; originally announced May 2017.

  8. arXiv:1612.01835  [pdf, other

    cs.CR cs.DB cs.IR

    Sub-Linear Privacy-Preserving Near-Neighbor Search

    Authors: M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan Wallach, Farinaz Koushanfar

    Abstract: In Near-Neighbor Search (NNS), a new client queries a database (held by a server) for the most similar data (near-neighbors) given a certain similarity metric. The Privacy-Preserving variant (PP-NNS) requires that neither server nor the client shall learn information about the other party's data except what can be inferred from the outcome of NNS. The overwhelming growth in the size of current dat… ▽ More

    Submitted 17 October, 2019; v1 submitted 6 December, 2016; originally announced December 2016.