M. Al-rubaie and J. Chang, Privacy-preserving machine learning: Threats and solutions, IEEE Security & Privacy, vol.17, issue.2, pp.49-58, 2019.

D. Beaver, Efficient multiparty protocols using circuit randomization, Annual International Cryptology Conference, pp.420-432, 1991.

A. Ben-efraim, Y. Lindell, and E. Omri, Optimizing semi-honest secure multiparty computation for the internet, Proceedings of the Conference on Computer and Communications Security, pp.578-590, 2016.

F. Boemer, A. Costache, R. Cammarota, and C. Wierzynski, nGraph-HE2: A high-throughput framework for neural network inference on encrypted data, Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp.45-56, 2019.

F. Boemer, Y. Lao, R. Cammarota, and C. Wierzynski, nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data, Proceedings of the ACM International Conference on Computing Frontiers, pp.3-13, 2019.

D. Bogdanov, S. Laur, and J. Willemson, Sharemind: A framework for fast privacypreserving computations, European Symposium on Research in Computer Security, pp.192-206, 2008.

K. Bonawitz, H. Eichner, W. Grieskamp, D. Huba, A. Ingerman et al., Towards federated learning at scale: System design, 2019.

K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H. B. Mcmahan et al., Practical secure aggregation for privacy-preserving machine learning, Proceedings of the Conference on Computer and Communications Security, pp.1175-1191, 2017.

E. Boyle, N. Gilboa, and Y. Ishai, Function secret sharing, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.337-367

. Springer, , 2015.

E. Boyle, N. Gilboa, and Y. Ishai, Function secret sharing: Improvements and extensions, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.1292-1303, 2016.

E. Boyle, N. Gilboa, and Y. Ishai, Secure computation with preprocessing via function secret sharing, Theory of Cryptography Conference, pp.341-371, 2019.

K. Chellapilla, S. Puri, and P. Simard, High performance convolutional neural networks for document processing, International Workshop on Frontiers in Handwriting Recognition, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00112631

I. Chillotti, N. Gama, M. Georgieva, and M. Izabachene, Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds, international Conference on the Theory and Application of Cryptology and Information Security, pp.3-33, 2016.
URL : https://hal.archives-ouvertes.fr/cea-01832762

M. Dahl, Private Image Analysis with MPC. Accessed 2019-11-01, 2017.

I. Damgård, N. Valerio-pastro, S. Smart, and . Zakarias, Multiparty computation from somewhat homomorphic encryption, Annual Cryptology Conference, pp.643-662

. Springer, , 2012.

D. Demmler, T. Schneider, and M. Zohner, Aby-a framework for efficient mixed-protocol secure two-party computation, NDSS, 2015.

T. Dugan and X. Zou, A survey of secure multiparty computation protocols for privacy preserving genetic tests, International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pp.173-182, 2016.

M. Fredrikson, S. Jha, and T. Ristenpart, Model inversion attacks that exploit confidence information and basic countermeasures, Proceedings of the Conference on Computer and Communications Security, pp.1322-1333, 2015.

R. Gilad-bachrach, N. Dowlin, K. Laine, K. Lauter, M. Naehrig et al., Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy, International Conference on Machine Learning, pp.201-210, 2016.

O. Goldreich, Foundations of Cryptography, vol.2, 2009.

A. Hannun, B. Knott, S. Sengupta, and L. Van-der-maaten, , 2019.

K. He, X. Zhang, S. Ren, and J. Sun, Deep residual learning for image recognition, Proceedings of the Conference on Computer Vision and Pattern Recognition, pp.770-778, 2016.

N. J. Higham, Accuracy and stability of numerical algorithms, vol.80, 2002.

B. Hitaj, G. Ateniese, and F. Perez-cruz, Deep models under the gan: information leakage from collaborative deep learning, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.603-618, 2017.

T. Hunt, C. Song, R. Shokri, V. Shmatikov, and E. Witchel, Chiron: Privacy-preserving machine learning as a service, 2018.

C. Juvekar, V. Vaikuntanathan, and A. Chandrakasan, {GAZELLE}: A low latency framework for secure neural network inference, USENIX Security Symposium, vol.18, pp.1651-1669, 2018.

H. Kaur, N. Kumar, and S. Batra, An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system, Future Generation Computer Systems, vol.86, pp.297-307, 2018.

M. Keller, V. Pastro, and D. Rotaru, Overdrive: making spdz great again, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.158-189, 2018.

J. Kone?n?, B. Mcmahan, F. X. Yu, P. Richtárik, A. Theertha-suresh et al., Federated learning: Strategies for improving communication efficiency, 2016.

A. Krizhevsky, V. Nair, and G. Hinton, The CIFAR-10 dataset, vol.55, 2014.

A. Krizhevsky, I. Sutskever, and G. E. Hinton, Imagenet classification with deep convolutional neural networks, Advances in Neural Information Processing Systems, pp.1097-1105, 2012.

Y. Lecun, L. Bottou, Y. Bengio, and P. Haffner, Gradient-based learning applied to document recognition, Proceedings of the IEEE, vol.86, issue.11, pp.2278-2324, 1998.

Y. Lecun, C. Cortes, and C. J. Burges, MNIST handwritten digit database, vol.2, 2010.

J. Liu, M. Juuti, Y. Lu, and N. Asokan, Oblivious neural network predictions via minionn transformations, Proceedings of the Conference on Computer and Communications Security, pp.619-631, 2017.

P. Mohassel and P. Rindal, Aby3: A mixed protocol framework for machine learning, Proceedings of the Conference on Computer and Communications Security, pp.35-52, 2018.

P. Mohassel and Y. Zhang, Secureml: A system for scalable privacy-preserving machine learning, Symposium on Security and Privacy (SP), pp.19-38, 2017.

V. Pan and R. Schreiber, An improved newton iteration for the generalized inverse of a matrix, with applications, SIAM Journal on Scientific and Statistical Computing, vol.12, issue.5, pp.1109-1130, 1991.

S. Park, G. J. Choi, and H. Ko, Information technology-based tracing strategy in response to COVID-19 in South Korea-privacy controversies, JAMA, 2020.

L. Reichert, S. Brack, and B. Scheuermann, Privacy-preserving contact tracing of covid-19 patients, Cryptology ePrint, p.2020

C. Sadegh-riazi, O. Weinert, . Tkachenko, M. Ebrahim, T. Songhori et al., Chameleon: A hybrid secure computation framework for machine learning applications, Proceedings of the Asia Conference on Computer and Communications Security, pp.707-721, 2018.

M. Bita-darvish-rouhani, F. Sadegh-riazi, and . Koushanfar, Deepsecure: Scalable provably-secure deep learning, Proceedings of the 55th Annual Design Automation Conference, pp.1-6, 2018.

O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh et al., Imagenet large scale visual recognition challenge, International Journal of Computer Vision, vol.115, issue.3, pp.211-252, 2015.

T. Ryffel, A. Trask, M. Dahl, B. Wagner, J. Mancuso et al., A generic framework for privacy preserving deep learning, 2018.

S. Microsoft, , 2018.

R. Shokri and V. Shmatikov, Privacy-preserving deep learning, Proceedings of the Conference on Computer and Communications Security, pp.1310-1321, 2015.

K. Simonyan and A. Zisserman, Very deep convolutional networks for large-scale image recognition, 2014.

S. Wagh, D. Gupta, and N. Chandran, Securenn: Efficient and private neural network training, IACR Cryptology ePrint Archive, p.442, 2018.

S. Wagh, S. Tople, F. Benhamouda, E. Kushilevitz, P. Mittal et al., Falcon: Honest-majority maliciously secure framework for private deep learning, 2020.

J. Wu, Q. Zhang, and G. Xu, Tiny imagenet challenge, 2017.

A. Yao, How to generate and exchange secrets, Annual Symposium on Foundations of Computer Science, pp.162-167, 1986.

R. Zhu, Y. Huang, J. Katz, and A. Shelat, The cut-and-choose game and its application to cryptographic protocols, USENIX Security Symposium Security 16, pp.1085-1100, 2016.