1. R. L. Rivest, "Cryptography and machine learning," inAdvances in Cryptology --- ASIACRYPT '91(H. Imai, R. L. Rivest, and T. Matsumoto, eds.), (Berlin, Heidelberg), pp. 427--439, Springer Berlin Heidelberg, 1993.
2. C. Dwork, A. Roth,et al., "The algorithmic foundations of differential privacy,"Foundations and Trends®in Theoretical Computer Science, vol. 9, no. 3--4, pp. 211--407, 2014.
3. A. D. Sarwate and K. Chaudhuri, "Signal processing and machine learning with differential privacy: Algorithms and challenges for continuous data,"IEEE signal processing magazine, vol. 30, no. 5, pp. 86--94, 2013.
4. O. Ohrimenko, F. Schuster, C. Fournet, A. Mehta, S. Nowozin, K. Vaswani, and M. Costa, "Oblivious multi-party machine learning on trusted processors.," inUSENIX Security Symposium, pp. 619--636, 2016.
5. B. Wang, M. Li, S. S. Chow, and H. Li, "Computing encrypted cloud data efficiently under multiple keys," inCommunications and Network Security (CNS), 2013 IEEE Conference on, pp. 504--513, IEEE, 2013.