scispace - formally typeset
Open AccessProceedings ArticleDOI

Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning

Reads0
Chats0
TLDR
This work proposes an actively secure four-party protocol (4PC), and a framework for PPML, showcasing its applications on four of the most widely-known machine learning algorithms -- Linear Regression, Logisticregression, Neural Networks, and Convolutional Neural Networks.
Abstract
Machine learning has started to be deployed in fields such as healthcare and finance, which involves dealing with a lot of sensitive data. This propelled the need for and growth of privacy-preserving machine learning (PPML). We propose an actively secure four-party protocol (4PC), and a framework for PPML, showcasing its applications on four of the most widely-known machine learning algorithms -- Linear Regression, Logistic Regression, Neural Networks, and Convolutional Neural Networks. Our 4PC protocol tolerating at most one malicious corruption is practically efficient as compared to Gordon et al. (ASIACRYPT 2018) as the 4th party in our protocol is not active in the online phase, except input sharing and output reconstruction stages. Concretely, we reduce the online communication as compared to them by 1 ring element. We use the protocol to build an efficient mixed-world framework (Trident) to switch between the Arithmetic, Boolean, and Garbled worlds. Our framework operates in the offline-online paradigm over rings and is instantiated in an outsourced setting for machine learning, where the data is secretly shared among the servers. Also, we propose conversions especially relevant to privacy-preserving machine learning. With the privilege of having an extra honest party, we outperform the current state-of-the-art ABY3 (for three parties), in terms of both rounds as well as communication complexity. The highlights of our framework include using a minimal number of expensive circuits overall as compared to ABY3. This can be seen in our technique for truncation, which does not affect the online cost of multiplication and removes the need for any circuits in the offline phase. Our B2A conversion has an improvement of 7× in rounds and 18× in the communication complexity.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

CrypTFlow: Secure TensorFlow Inference

TL;DR: In this article, the authors present CrypTFlow, a system that converts TensorFlow inference code into Secure Multi-Party Computation (MPC) protocols at the push of a button.
Journal ArticleDOI

Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning

TL;DR: The experiments in the WAN setting show that over large networks and datasets, compute operations dominate the overall latency of MPC, as opposed to the communication.
Posted Content

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.

TL;DR: This work improves semi-honest secure two-party computation (2PC) over rings, with a focus on the efficiency of the online phase, and proposes an efficient mixed-protocol framework, outperforming the state-of-the-art 2PC framework of ABY.
Proceedings ArticleDOI

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU

TL;DR: CryptGPU as discussed by the authors is a system for privacy-preserving machine learning that implements all operations on the GPU (graphics processing unit) and achieves state-of-the-art performance on convolutional neural networks.
Posted Content

Privacy in Deep Learning: A Survey

TL;DR: This survey reviews the privacy concerns brought by deep learning, and the mitigating techniques introduced to tackle these issues, and shows that there is a gap in the literature regarding test-time inference privacy.
References
More filters
Journal ArticleDOI

Indications of nonlinear deterministic and finite-dimensional structures in time series of brain electrical activity: dependence on recording region and brain state.

TL;DR: Dynamical properties of brain electrical activity from different recording regions and from different physiological and pathological brain states are compared and strongest indications of nonlinear deterministic dynamics were found for seizure activity.
Journal ArticleDOI

Hedonic housing prices and the demand for clean air

TL;DR: In this article, the authors investigated the methodological problems associated with the use of housing market data to measure the willingness to pay for clean air, using a hedonic housing price model and data for the Boston metropolitan area.
Book ChapterDOI

Multiparty Computation from Somewhat Homomorphic Encryption

TL;DR: A general multiparty computation protocol secure against an active adversary corrupting up to $$n-1$$ of the n players is proposed, which may be used to compute securely arithmetic circuits over any finite field $$\mathbb {F}_{p^k}$$.
Book ChapterDOI

Improved Garbled Circuit: Free XOR Gates and Applications

TL;DR: In this one-round protocol, XOR gates are evaluated "for free", which results in the corresponding improvement over the best garbled circuit implementations (e.g. Fairplay) and improves integer addition and equality testing by factor of up to 2.
Book ChapterDOI

Efficient Multiparty Protocols Using Circuit Randomization

TL;DR: This protocol replaces each secret multiplication -- multiplication that requires further sharing, addition, zero-knowledge proofs, and secret reconstruction -- that is used during the body of a standard protocol by a simple reconstruction of secretly shared values, thereby reducing rounds by an order of magnitude.