-
Link anything you'd like to discuss: news, demos, ideas, whatever!
-
## 任务介绍
- 任务名称:【特别任务】联邦学习中的安全聚合方案设计以及实现
- 技术方向:Federated Learning
- 任务难度:挑战🌟🌟🌟
- 说明:本任务不参与🌟累计哈~
## 详细要求
安全聚合是解决联邦学习中梯度泄露问题的有效手段。然而,现有安全聚合方案仍可能存在“参与方掉线不容忍”、“聚合行为不可控”、“共谋推断不可抗”和“系统效能不实际”等问题。希望同学们能够在这个开…
-
Hello!
I can not reconstruct the original polynomial using the data stored in "Persistence/Transactions-P..." with the malicious-shamir-party protocol.
I have written the MPC program
```a = sint.…
-
Hi,
Maybe I'm not understanding the code very well - but I thought the point of splitting up a private key into multiple keyshares was to increase security and that distributed key generation was t…
-
@mathewvermeer @marius-pop0 @bas921 @JLauriks @jeffsirocki
> You will create your own blockchain, almost from scratch. Your blockchain will be special! Your blockchain will be both fully permission…
-
We need to be able to:
- detect whether a partition is encrypted or not (LUKS does this via its metadata)
- apply a key to encrypt and mount an encrypted partition
Possible tools:
- [Luks.g…
-
Every time we have to vote on a non-binary issue (where there are more options than "yes", "no", and "abstain"), we have to discuss what tool to use, and I think it'd be useful to have a "blessed" too…
-
Theoretically, a Chinese-Remainder-Theorem-based Distributed Key Generation protocol would enable us to have weighted key shares while keeping a linear runtime complexity when signing, from my underst…
-
### Issue Type
Others
### Source
binary
### Secretflow Version
1.5.0.dev20240325
### OS Platform and Distribution
Linux Ubuntu 18.04
### Python version
3.10.14
### Bazel version
_No respons…
-
_draft thesis direction_
Investigate the revealing of privacy-sensitive attributes of your identity.
Should be usable even in the sensitive medical domain with electronic patient files.
First s…