首页 > 最新文献

Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography最新文献

英文 中文
On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption 同态加密中稀疏秘密LWE参数集标准化的可行性及影响
Benjamin R. Curtis, Rachel Player
In November 2018, the urlHomomorphicEncryption.org consortium published the Homomorphic Encryption Security Standard. The Standard recommends several sets of Learning with Errors (LWE) parameters that can be selected by application developers to achieve a target security level ( łambda in 128,192,256 ). These parameter sets all involve a power-of-two dimension ( n łeq 2^15 ), an error distribution of standard deviation ( σ approx 3.19 ), and a secret whose coefficients are either chosen uniformly in ( ZZ_q ), chosen according to the error distribution, or chosen uniformly in ( -1, 0, 1 ). These parameter sets do not necessarily reflect implementation choices in the most commonly used homomorphic encryption libraries. For example, several libraries support dimensions that are not a power of two. Moreover, all known implementations for bootstrapping for the CKKS, BFV and BGV schemes use a sparse secret and a large ring dimension such as ( n in 2^16, 2^17 ), and advanced applications such as logistic regression have used equally large dimensions. This motivates the community to consider widening the recommended parameter sets, and the purpose of this paper is to investigate such possible extensions. We explore the security of possible sparse-secret LWE parameter sets, taking into account hybrid attacks, which are often the most competitive in the sparse-secret regime. We present a conservative analysis of the hybrid decoding and hybrid dual attacks for parameter sets of varying sparsity, with the goal of balancing security requirements with bootstrapping efficiency. We also show how the methodology in the Standard can be easily adapted to support parameter sets with power-of-two dimension ( n geq 2^16 ). We conclude with a number of discussion points to motivate future improvements to the Standard.
2018年11月,urlHomomorphicEncryption .org联盟发布了同态加密安全标准。该标准推荐了几组带有错误的学习(LWE)参数,应用程序开发人员可以选择这些参数来实现目标安全级别( łambda in 128,192,256 )。这些参数集都涉及一个二次幂维度( n łeq 2^15 )、一个标准差的误差分布( σ approx 3.19 )和一个秘密,其系数要么在( ZZ_q )中均匀选择,要么根据误差分布选择,要么在( -1, 0, 1 )中均匀选择。这些参数集不一定反映最常用的同态加密库中的实现选择。例如,一些库支持不是2的幂的维度。此外,所有已知的CKKS、BFV和BGV方案的自举实现都使用了一个稀疏的秘密和一个大的环维,如( n in 2^16, 2^17 ),而逻辑回归等高级应用也使用了同样大的维数。这促使社区考虑扩大推荐参数集,本文的目的就是研究这种可能的扩展。我们探讨了可能的稀疏秘密LWE参数集的安全性,考虑了混合攻击,这通常是稀疏秘密体制中最具竞争力的。本文对不同稀疏度参数集的混合解码和混合双重攻击进行了保守分析,目的是平衡安全需求和自举效率。我们还展示了如何轻松地调整标准中的方法来支持具有二维幂的参数集( n geq 2^16 )。我们总结了一些讨论点,以激励对标准的未来改进。
{"title":"On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption","authors":"Benjamin R. Curtis, Rachel Player","doi":"10.1145/3338469.3358940","DOIUrl":"https://doi.org/10.1145/3338469.3358940","url":null,"abstract":"In November 2018, the urlHomomorphicEncryption.org consortium published the Homomorphic Encryption Security Standard. The Standard recommends several sets of Learning with Errors (LWE) parameters that can be selected by application developers to achieve a target security level ( łambda in 128,192,256 ). These parameter sets all involve a power-of-two dimension ( n łeq 2^15 ), an error distribution of standard deviation ( σ approx 3.19 ), and a secret whose coefficients are either chosen uniformly in ( ZZ_q ), chosen according to the error distribution, or chosen uniformly in ( -1, 0, 1 ). These parameter sets do not necessarily reflect implementation choices in the most commonly used homomorphic encryption libraries. For example, several libraries support dimensions that are not a power of two. Moreover, all known implementations for bootstrapping for the CKKS, BFV and BGV schemes use a sparse secret and a large ring dimension such as ( n in 2^16, 2^17 ), and advanced applications such as logistic regression have used equally large dimensions. This motivates the community to consider widening the recommended parameter sets, and the purpose of this paper is to investigate such possible extensions. We explore the security of possible sparse-secret LWE parameter sets, taking into account hybrid attacks, which are often the most competitive in the sparse-secret regime. We present a conservative analysis of the hybrid decoding and hybrid dual attacks for parameter sets of varying sparsity, with the goal of balancing security requirements with bootstrapping efficiency. We also show how the methodology in the Standard can be easily adapted to support parameter sets with power-of-two dimension ( n geq 2^16 ). We conclude with a number of discussion points to motivate future improvements to the Standard.","PeriodicalId":332171,"journal":{"name":"Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129334272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Linear-Regression on Packed Encrypted Data in the Two-Server Model 双服务器模型中打包加密数据的线性回归
Adi Akavia, Hayim Shaul, Mor Weiss, Z. Yakhini
Developing machine learning models from federated training data, containing many independent samples, is an important task that can significantly enhance the potential applicability and prediction power of learned models. Since single users, like hospitals or individual labs, typically collect data-sets that do not support accurate learning with high confidence, it is desirable to combine data from several users without compromising data privacy. In this paper, we develop a privacy-preserving solution for learning a linear regression model from data collectively contributed by several parties ("data owners''). Our protocol is based on the protocol of Giacomelli et al. (ACNS 2018) that utilized two non colluding servers and Linearly Homomorphic Encryption (LHE) to learn regularized linear regression models. Our methods use a different LHE scheme that allows us to significantly reduce both the number and runtime of homomorphic operations, as well as the total runtime complexity. Another advantage of our protocol is that the underlying LHE scheme is based on a different (and post-quantum secure) security assumption than Giacomelli et al. Our approach leverages the Chinese Remainder Theorem, and Single Instruction Multiple Data representations, to obtain our improved performance. For a 1000 x 40 linear regression task we can learn a model in a total of 3 seconds for the homomorphic operations, compared to more than 100 seconds reported in the literature. Our approach also scales up to larger feature spaces: we implemented a system that can handle a 1000 x 100 linear regression task, investing minutes of server computing time after a more significant offline pre-processing by the data owners. We intend to incorporate our protocol and implementations into a comprehensive system that can handle secure federated learning at larger scales.
从包含许多独立样本的联邦训练数据中开发机器学习模型是一项重要的任务,可以显著提高学习模型的潜在适用性和预测能力。由于单个用户(如医院或单个实验室)通常收集的数据集不支持高可信度的准确学习,因此希望在不损害数据隐私的情况下合并来自多个用户的数据。在本文中,我们开发了一种隐私保护解决方案,用于从多方(“数据所有者”)共同提供的数据中学习线性回归模型。我们的协议基于Giacomelli等人(ACNS 2018)的协议,该协议使用两个非串通服务器和线性同态加密(LHE)来学习正则化线性回归模型。我们的方法使用了一种不同的LHE方案,使我们能够显著减少同态操作的数量和运行时,以及总运行时复杂性。我们协议的另一个优点是底层LHE方案基于与Giacomelli等人不同的(和后量子安全)安全假设。我们的方法利用中国剩余定理和单指令多数据表示来获得改进的性能。对于一个1000 x 40的线性回归任务,我们可以在总共3秒内学习一个同态操作的模型,而文献中报道的时间超过100秒。我们的方法也可以扩展到更大的特征空间:我们实现了一个可以处理1000 x 100线性回归任务的系统,在数据所有者进行更重要的离线预处理之后,投入了几分钟的服务器计算时间。我们打算将我们的协议和实现合并到一个全面的系统中,以处理更大规模的安全联邦学习。
{"title":"Linear-Regression on Packed Encrypted Data in the Two-Server Model","authors":"Adi Akavia, Hayim Shaul, Mor Weiss, Z. Yakhini","doi":"10.1145/3338469.3358942","DOIUrl":"https://doi.org/10.1145/3338469.3358942","url":null,"abstract":"Developing machine learning models from federated training data, containing many independent samples, is an important task that can significantly enhance the potential applicability and prediction power of learned models. Since single users, like hospitals or individual labs, typically collect data-sets that do not support accurate learning with high confidence, it is desirable to combine data from several users without compromising data privacy. In this paper, we develop a privacy-preserving solution for learning a linear regression model from data collectively contributed by several parties (\"data owners''). Our protocol is based on the protocol of Giacomelli et al. (ACNS 2018) that utilized two non colluding servers and Linearly Homomorphic Encryption (LHE) to learn regularized linear regression models. Our methods use a different LHE scheme that allows us to significantly reduce both the number and runtime of homomorphic operations, as well as the total runtime complexity. Another advantage of our protocol is that the underlying LHE scheme is based on a different (and post-quantum secure) security assumption than Giacomelli et al. Our approach leverages the Chinese Remainder Theorem, and Single Instruction Multiple Data representations, to obtain our improved performance. For a 1000 x 40 linear regression task we can learn a model in a total of 3 seconds for the homomorphic operations, compared to more than 100 seconds reported in the literature. Our approach also scales up to larger feature spaces: we implemented a system that can handle a 1000 x 100 linear regression task, investing minutes of server computing time after a more significant offline pre-processing by the data owners. We intend to incorporate our protocol and implementations into a comprehensive system that can handle secure federated learning at larger scales.","PeriodicalId":332171,"journal":{"name":"Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Revisiting the Hybrid Attack on Sparse Secret LWE and Application to HE Parameters 再论稀疏秘密LWE混合攻击及其在HE参数中的应用
Yongha Son, J. Cheon
In the practical use of the Learning With Error (LWE) based cryptosystems, it is quite common to choose the secret to be extremely small: one popular choice is ternary ((±1,0),coefficient vector, and some further use ternary vector having only small numbers of nonzero coefficient, what is called em sparse and ternary vector. This use of small secret also benefits to attack algorithms against LWE, and currently LWE-based cryptosystems including homomorphic encryptions (HE) set parameters based on the attack complexity of those improved attacks. In this work, we revisit the well-known Howgrave-Graham's hybrid attack, which was originally designed to solve the NTRU problem, with respect to sparse and ternary secret LWE case, and also refine the previous analysis for the hybrid attack in line with LWE setting. Moreover, upon our analysis we estimate attack complexity of the hybrid attack for several LWE parameters. As a result, we argue the currently used HE parameters should be raised to maintain the same security level by considering the hybrid attack; for example, the parameter set (n,log q,σ) = (65536, 1240, 3.2) with Hamming weight of secret key h = 64, which was estimated to satisfy ≥ 128$ bit-security by the previously considered attacks, is newly estimated to provide only 113 bit-security by the hybrid attack.
在基于误差学习(LWE)的密码系统的实际使用中,通常选择极小的秘密:一种流行的选择是三元(±1,0),系数向量,还有一些进一步使用只有少量非零系数的三元向量,称为em稀疏和三元向量。这种小秘密的使用也有利于针对LWE的攻击算法,目前基于LWE的密码系统(包括同态加密(HE))根据这些改进攻击的攻击复杂性设置参数。在这项工作中,我们重新审视了著名的Howgrave-Graham混合攻击,该混合攻击最初是为了解决NTRU问题而设计的,针对稀疏和三元秘密LWE情况,并根据LWE设置对先前的混合攻击分析进行了改进。此外,在分析的基础上,我们估计了几种LWE参数下混合攻击的攻击复杂度。因此,我们认为应考虑混合攻击,提高当前使用的HE参数,以保持相同的安全级别;例如,参数集(n,log q,σ) =(65536,1240,3.2),秘钥的Hamming权值h = 64,先前考虑的攻击估计该参数集满足≥128$ bit的安全性,而新的混合攻击估计该参数集仅提供113 $ bit的安全性。
{"title":"Revisiting the Hybrid Attack on Sparse Secret LWE and Application to HE Parameters","authors":"Yongha Son, J. Cheon","doi":"10.1145/3338469.3358941","DOIUrl":"https://doi.org/10.1145/3338469.3358941","url":null,"abstract":"In the practical use of the Learning With Error (LWE) based cryptosystems, it is quite common to choose the secret to be extremely small: one popular choice is ternary ((±1,0),coefficient vector, and some further use ternary vector having only small numbers of nonzero coefficient, what is called em sparse and ternary vector. This use of small secret also benefits to attack algorithms against LWE, and currently LWE-based cryptosystems including homomorphic encryptions (HE) set parameters based on the attack complexity of those improved attacks. In this work, we revisit the well-known Howgrave-Graham's hybrid attack, which was originally designed to solve the NTRU problem, with respect to sparse and ternary secret LWE case, and also refine the previous analysis for the hybrid attack in line with LWE setting. Moreover, upon our analysis we estimate attack complexity of the hybrid attack for several LWE parameters. As a result, we argue the currently used HE parameters should be raised to maintain the same security level by considering the hybrid attack; for example, the parameter set (n,log q,σ) = (65536, 1240, 3.2) with Hamming weight of secret key h = 64, which was estimated to satisfy ≥ 128$ bit-security by the previously considered attacks, is newly estimated to provide only 113 bit-security by the hybrid attack.","PeriodicalId":332171,"journal":{"name":"Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122447161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications RAMPARTS:一个程序员友好的系统,用于构建同态加密应用
David W. Archer, José Manuel Calderón Trilla, Jason Dagit, A. Malozemoff, Y. Polyakov, K. Rohloff, Gerard W. Ryan
Homomorphic Encryption (HE) is an emerging technology that enables computing on data while the data is encrypted. A major challenge with homomorphic encryption is that it takes extensive expert knowledge to design meaningful and useful programs that are constructed from atomic HE operations. We present RAMPARTS to address this challenge. RAMPARTS provides an environment for developing HE applications in Julia, a high-level language, the same way as "cleartext'' applications are typically written in Julia. RAMPARTS makes the following three contributions. First, we use symbolic execution to automate the construction of an optimized computation circuit where both the circuit size and multiplicative depth are chosen by the compiler. Second, RAMPARTS automatically selects the HE parameters for the generated circuit, which is typically done manually by an HE expert. Third, RAMPARTS automatically selects the plaintext encoding for input values, and performs input and output data transformations. These three operations are not easily performed by programmers who are not HE experts. Thus, RAMPARTS makes HE more widely available and usable by the the population of programmers. We compare our approach with Cingulata, the only previously known system that automatically generates circuits for HE computations. The HE circuits generated by RAMPARTS are significantly more efficient than the circuits compiled by Cingulata. For instance, our runtimes for key generation/circuit compilation and all online operations are more than one order of magnitude lower for a sample image processing application used for performance evaluation in our study.
同态加密(HE)是一种新兴技术,可以在数据加密的同时对数据进行计算。同态加密的一个主要挑战是,它需要大量的专业知识来设计由原子HE操作构建的有意义和有用的程序。我们提出了RAMPARTS来应对这一挑战。RAMPARTS为在Julia(一种高级语言)中开发HE应用程序提供了一个环境,与通常用Julia编写“明文”应用程序的方式相同。RAMPARTS做出了以下三个贡献。首先,我们使用符号执行来自动构建优化的计算电路,其中电路大小和乘法深度都由编译器选择。其次,RAMPARTS自动为生成的电路选择HE参数,这通常由HE专家手动完成。第三,RAMPARTS自动为输入值选择明文编码,并执行输入和输出数据转换。非HE专家的程序员不容易执行这三个操作。因此,RAMPARTS使HE更广泛地被程序员使用。我们将我们的方法与Cingulata进行了比较,Cingulata是之前唯一已知的自动生成HE计算电路的系统。RAMPARTS生成的HE电路比Cingulata编写的电路效率高得多。例如,对于我们研究中用于性能评估的示例图像处理应用程序,我们用于密钥生成/电路编译和所有在线操作的运行时间要低一个数量级以上。
{"title":"RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications","authors":"David W. Archer, José Manuel Calderón Trilla, Jason Dagit, A. Malozemoff, Y. Polyakov, K. Rohloff, Gerard W. Ryan","doi":"10.1145/3338469.3358945","DOIUrl":"https://doi.org/10.1145/3338469.3358945","url":null,"abstract":"Homomorphic Encryption (HE) is an emerging technology that enables computing on data while the data is encrypted. A major challenge with homomorphic encryption is that it takes extensive expert knowledge to design meaningful and useful programs that are constructed from atomic HE operations. We present RAMPARTS to address this challenge. RAMPARTS provides an environment for developing HE applications in Julia, a high-level language, the same way as \"cleartext'' applications are typically written in Julia. RAMPARTS makes the following three contributions. First, we use symbolic execution to automate the construction of an optimized computation circuit where both the circuit size and multiplicative depth are chosen by the compiler. Second, RAMPARTS automatically selects the HE parameters for the generated circuit, which is typically done manually by an HE expert. Third, RAMPARTS automatically selects the plaintext encoding for input values, and performs input and output data transformations. These three operations are not easily performed by programmers who are not HE experts. Thus, RAMPARTS makes HE more widely available and usable by the the population of programmers. We compare our approach with Cingulata, the only previously known system that automatically generates circuits for HE computations. The HE circuits generated by RAMPARTS are significantly more efficient than the circuits compiled by Cingulata. For instance, our runtimes for key generation/circuit compilation and all online operations are more than one order of magnitude lower for a sample image processing application used for performance evaluation in our study.","PeriodicalId":332171,"journal":{"name":"Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE 赞福德:有效地结合了LSSS和乱码电路
A. Aly, Emmanuela Orsini, Dragos Rotaru, N. Smart, Tim Wood
We present modifications to the MPC system SCALE-MAMBA to enable the evaluation of garbled circuit (GC) based MPC functionalities and Linear Secret Sharing (LSSS) based MPC functionalities along side each other. This allows the user to switch between different MPC paradigms to achieve the best performance. To do this we present modifications to the GC-based MPC protocol of Hazay et al. (Asiacrypt 2017) (to enable it to support reactive computation), and combine different aspects of their pre-processing phase with those of Wang et al. (CCS 2017), in order to optimize our pre-processing protocols. We also give a more efficient method for producing daBits (double authenticated Bits) than that presented in the work of Rotaru and Wood (ePrint 2019). Finally, we examine how the functionality can be integrated within the existing MPC framework SCALE-MAMBA.
我们对MPC系统SCALE-MAMBA进行了修改,使基于乱码电路(GC)的MPC功能和基于线性秘密共享(LSSS)的MPC功能能够相互评估。这允许用户在不同的MPC范例之间切换,以实现最佳性能。为此,我们对Hazay等人(Asiacrypt 2017)基于gc的MPC协议进行了修改(使其能够支持响应式计算),并将其预处理阶段的不同方面与Wang等人(CCS 2017)的预处理阶段相结合,以优化我们的预处理协议。我们还提供了一种比Rotaru和Wood的工作(ePrint 2019)中提出的更有效的生成daBits(双重认证比特)的方法。最后,我们研究如何将功能集成到现有的MPC框架SCALE-MAMBA中。
{"title":"Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE","authors":"A. Aly, Emmanuela Orsini, Dragos Rotaru, N. Smart, Tim Wood","doi":"10.1145/3338469.3358943","DOIUrl":"https://doi.org/10.1145/3338469.3358943","url":null,"abstract":"We present modifications to the MPC system SCALE-MAMBA to enable the evaluation of garbled circuit (GC) based MPC functionalities and Linear Secret Sharing (LSSS) based MPC functionalities along side each other. This allows the user to switch between different MPC paradigms to achieve the best performance. To do this we present modifications to the GC-based MPC protocol of Hazay et al. (Asiacrypt 2017) (to enable it to support reactive computation), and combine different aspects of their pre-processing phase with those of Wang et al. (CCS 2017), in order to optimize our pre-processing protocols. We also give a more efficient method for producing daBits (double authenticated Bits) than that presented in the work of Rotaru and Wood (ePrint 2019). Finally, we examine how the functionality can be integrated within the existing MPC framework SCALE-MAMBA.","PeriodicalId":332171,"journal":{"name":"Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122314325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data nGraph-HE2:一种基于加密数据的高吞吐量神经网络推理框架
Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski
In previous work, Boemer et al. introduced nGraph-HE, an extension to the Intel nGraph deep learning (DL) compiler, that enables data scientists to deploy models with popular frameworks such as TensorFlow and PyTorch with minimal code changes. However, the class of supported models was limited to relatively shallow networks with polynomial activations. Here, we introduce nGraph-HE2, which extends nGraph-HE to enable privacy-preserving inference on standard, pre-trained models using their native activation functions and number fields (typically real numbers). The proposed framework leverages the CKKS scheme, whose support for real numbers is friendly to data science, and a client-aided model using a two-party approach to compute activation functions. We first present CKKS-specific optimizations, enabling a 3x-88x runtime speedup for scalar encoding, and doubling the throughput through a novel use of CKKS plaintext packing into complex numbers. Second, we optimize ciphertext-plaintext addition and multiplication, yielding 2.6x-4.2x runtime speedup. Third, we exploit two graph-level optimizations: lazy-rescaling and depth-aware encoding, which allow us to significantly improve performance. Together, these optimizations enable state-of-the-art throughput of 1,998 images/s on the CryptoNets network. Using the client-aided model, we also present homomorphic evaluation of (to our knowledge) the largest network to date, namely, pre-trained MobileNetV2 models on the ImageNet dataset, with 60.4%/82.7% top-1/top-5 accuracy and an amortized runtime of 381 ms/image.
在之前的工作中,Boemer等人介绍了nGraph-他,这是英特尔nGraph深度学习(DL)编译器的扩展,它使数据科学家能够使用流行的框架(如TensorFlow和PyTorch)部署模型,只需进行最小的代码更改。然而,支持的模型类别仅限于具有多项式激活的相对较浅的网络。在这里,我们介绍nGraph-HE2,它扩展了nGraph-HE,使用标准的预训练模型的原生激活函数和数字字段(通常是实数)来支持隐私保护推理。提出的框架利用CKKS方案,其对实数的支持对数据科学友好,以及使用两方方法计算激活函数的客户端辅助模型。我们首先介绍了CKKS特定的优化,为标量编码提供了3 -88倍的运行时加速,并通过新颖地使用CKKS明文打包成复数将吞吐量提高了一倍。其次,我们优化了密文-明文的加法和乘法,产生了2.6 -4.2倍的运行时加速。第三,我们利用了两个图级优化:延迟重新缩放和深度感知编码,这使我们能够显著提高性能。总之,这些优化在CryptoNets网络上实现了最先进的1998张图像/秒的吞吐量。使用客户端辅助模型,我们还对(据我们所知)迄今为止最大的网络进行了同态评估,即在ImageNet数据集上预训练的MobileNetV2模型,具有60.4%/82.7%的top-1/top-5精度和381 ms/image的平摊运行时间。
{"title":"nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data","authors":"Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski","doi":"10.1145/3338469.3358944","DOIUrl":"https://doi.org/10.1145/3338469.3358944","url":null,"abstract":"In previous work, Boemer et al. introduced nGraph-HE, an extension to the Intel nGraph deep learning (DL) compiler, that enables data scientists to deploy models with popular frameworks such as TensorFlow and PyTorch with minimal code changes. However, the class of supported models was limited to relatively shallow networks with polynomial activations. Here, we introduce nGraph-HE2, which extends nGraph-HE to enable privacy-preserving inference on standard, pre-trained models using their native activation functions and number fields (typically real numbers). The proposed framework leverages the CKKS scheme, whose support for real numbers is friendly to data science, and a client-aided model using a two-party approach to compute activation functions. We first present CKKS-specific optimizations, enabling a 3x-88x runtime speedup for scalar encoding, and doubling the throughput through a novel use of CKKS plaintext packing into complex numbers. Second, we optimize ciphertext-plaintext addition and multiplication, yielding 2.6x-4.2x runtime speedup. Third, we exploit two graph-level optimizations: lazy-rescaling and depth-aware encoding, which allow us to significantly improve performance. Together, these optimizations enable state-of-the-art throughput of 1,998 images/s on the CryptoNets network. Using the client-aided model, we also present homomorphic evaluation of (to our knowledge) the largest network to date, namely, pre-trained MobileNetV2 models on the ImageNet dataset, with 60.4%/82.7% top-1/top-5 accuracy and an amortized runtime of 381 ms/image.","PeriodicalId":332171,"journal":{"name":"Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132736168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 128
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography 第七届美国计算机学会加密计算与应用同态密码学研讨会论文集
{"title":"Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography","authors":"","doi":"10.1145/3338469","DOIUrl":"https://doi.org/10.1145/3338469","url":null,"abstract":"","PeriodicalId":332171,"journal":{"name":"Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1