1. Primitives towards verifiable computation: a survey
2. [ 2 ] P. Ananth , G. Asharov , H. Dahari and V. Goyal . 2021. Towards accountability in CRS generation . In Advanced in Cryptology-EUROCRYPT 2021 , pp. 278 - 308 . Springer. [2] P. Ananth, G. Asharov, H. Dahari and V. Goyal. 2021. Towards accountability in CRS generation. In Advanced in Cryptology-EUROCRYPT 2021, pp. 278-308. Springer.
3. [ 3 ] N. Bitansky , R. Canetti , A. Chiesa and E. Tromer . 2012. From extractable collision resistance to succint non-interactive arguments of knowledge, and back again . In 3rd Innovations in Theoretical Computer Science Conference – ITCS’12 , pp. 326 - 349 . ACM. [3] N. Bitansky, R. Canetti, A. Chiesa and E. Tromer. 2012. From extractable collision resistance to succint non-interactive arguments of knowledge, and back again. In 3rd Innovations in Theoretical Computer Science Conference – ITCS’12, pp. 326-349. ACM.
4. Achieving security and privacy in federated learning systems: Survey, research challenges and future directions
5. [
5
] A. Blanco-Justicia D. Sánchez J. Domingo-Ferrer and K. Muralidhar. 2022. A critical review on the use (and misuse) of differential privacy in machine learning. ACM Computing Surveys to appear. [5] A. Blanco-Justicia D. Sánchez J. Domingo-Ferrer and K. Muralidhar. 2022. A critical review on the use (and misuse) of differential privacy in machine learning. ACM Computing Surveys to appear.