Weikeng Chen

Results 288 comments of Weikeng Chen

If we don't just sign the LSB, but sign the hashes of two labels (the 0-label and 1-label), there is still an obstacle: Maybe a bit flip only makes a...

The overkill solution is to sign everything, including OT and the circuit. So, I smell some academic research here... even in the malicious case, we don't want a network attacker...

The motivating example for malicious case (off-topic for Obliv-C): 10 companies are actually honest, but they run a maliciously secure 10-party federated learning platform. After THREE months of computation, they...

I have previously played with Obliv-C on MacOS. There are just too many differences between Linux and MacOS in many aspects. Therefore, I would strongly recommend you to use Linux...

This is a more general question that I would refer you to other online resource: https://linoxide.com/how-tos/linux-make-command-examples/ (this link is better) So, at a high level, at the end of the...

Nope. Obliv-C relies on CIL, which can basically support many features in C, but no guarantee in C++. https://people.eecs.berkeley.edu/~necula/cil/

I think in this case, space needs to be initialized via `malloc` instead of `obliv int arr[150][150]`.

It looks like OblivC has some implementations on the dual-execution protocol: https://github.com/samee/obliv-c/blob/obliv-c/src/ext/oblivc/dualex.c#L133 But I haven't used it, and right now, there is a limitation: ``` fprintf(stderr,"Right now, Dualex protocol requires...

I think your question is about whether the oblivious transfer is done maliciously secure, in order to enable dual execution to be secure. I would leave this question to @samee....

While, not in the Bay Area Google, but Google Switzerland.