-
### Current System
Currently, the Aggregation Service aggregates contributions from raw encrypted reports and produces aggregated and noised histograms.
In scenarios where an adtech needs to batch…
-
Hello, VENumML team!
I came across VENumML, and I’m very impressed by its vision for enabling `Privacy-Preserving Machine Learning (PPML)` with `Fully Homomorphic Encryption (FHE)`. I believe this …
-
Dear Pere @fronterapp ,
Thank you for maintaining the code and patiently answering questions.
Based on your paper CFD Simulation of a Floating Wind Turbine with OpenFOAM, I encrypted the mesh near …
-
Some time ago we took a decision to enforce DMs being only "direct rooms with at most 2 users, encrypted".
As we developed the app, we apparently duplicated the computation of this value in several…
-
1. **Design a generic gate**: Create a generic gate that can be used to build complex digital circuits.
2. **Implement arithmetic circuits**: Implement arithmetic circuits using the generic gate, whic…
-
[ Began writing up some notes on this ~ Dec 3, 2021: ]
Can we allow voters to submit their votes, and have strong cryptographic confirmation that it was received, without ever revealing the links b…
-
Mandatory:
- [x] rename branch and add protections
- [ ] check these changes against TFW tutorial
- [x] update `setup.py` to require `tensorflow ==2.0.0`
- [ ] ~introduce and use `tfe.encrypted_…
-
> **Note:** this is a bit messy, will be cleaned some time soon
## Background
- **Privacy-preserving computation**: either X of F are hidden to who computes F(X)
- **Verifiable computation**: A…
-
## Feature request
From the [doc of encrypted training](https://docs.zama.ai/concrete-ml/built-in-models/training), only `SGDClassifier` is mentioned. I would like to train other ML/DL models on encr…
-
Is it possible to use the Yubikey challenge-response secret (hex string) to decrypt a KeePassXC database using the KeePassXC yubichallenge implementation? I like how you guys implement the Yubichallen…