An Efficient Privacy Preserving 4PC Machine Learning Scheme Based on Secret Sharing

被引:0
|
作者
Yan Y. [1 ]
Ma M. [1 ]
Jiang H. [1 ,2 ]
机构
[1] School of Software, Shandong University, Jinan
[2] Key Laboratory of Software Engineering of Shandong Province (Shandong University), Jinan
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2022年 / 59卷 / 10期
基金
中国国家自然科学基金;
关键词
Machine learning; Malicious adversaries; Privacy preserving; Secret sharing; Secure multi-party computation;
D O I
10.7544/issn1000-1239.20220514
中图分类号
学科分类号
摘要
The wide application of machine learning technology makes user data face a serious risk of privacy leakage, and the privacy-preserving distributed machine learning protocol based on secure multi-party computation technology has become a widely concerned research field. In order to obtain a more efficient protocol, Chaudhari et al. proposed the Trident quadrilateral protocol framework. On the basis of the tripartite protocol, an honest participant is introduced as a trusted third party to execute the protocol, and the Swift framework proposed by Koti et al. is to select an honest participant as a trusted third party to complete the protocol through a screening process under the background of a three-party protocol with honest majority of participants. The framework to an honest-majority quadrilateral protocol is generalized. Under such a computing framework, a trusted third party obtains sensitive data of all users, which violates the original intention of secure multi-party computation. To solve this problem, a four-party machine learning protocol based on (2,4) secret sharing is designed. By improving the honest party screening process of the Swift framework, two honest parties can be determined and a semi-honest secure two-party computing protocol which can efficiently complete computing tasks is executed. The protocol transfers 25% of the communication load from the online phase to the offline phase, which improves the efficiency of the online phase of the scheme. © 2022, Science Press. All right reserved.
引用
收藏
页码:2338 / 2347
页数:9
相关论文
共 20 条
  • [1] Liu Junxu, Meng Xiaofeng, Survey on privacy-preserving machinelearning, Journal of Computer Research and Development, 57, 2, pp. 346-362, (2020)
  • [2] Song Lei, Ma Chunguang, Duan Guanghan, Machine learning security and privacy: A survey, Chinese Journal of Network and Information Security, 4, 8, pp. 5-15, (2018)
  • [3] Li Pan, Zhao Wentao, Liu Qiang, Et al., Security issues and their counter measuring techniques of machine learning: A survey, Journal of Frontiers of Computer Science and Technology, 12, 2, pp. 171-184, (2018)
  • [4] Lindell Y, Pinkas B., Privacy preserving data mining, Proc of Annual Int Cryptology Conf, pp. 36-54, (2000)
  • [5] Jiang Han, Xu Qiuliang, Advances in key techniques of practical secure multi-party computation, Journal of Computer Research and Development, 52, 10, pp. 2247-2257, (2015)
  • [6] Mohassel P, SecMohassel P, Zhang Yupeng, SecureML: A system for scalable privacy-preserving machine learning, Proc of 2017 IEEE Symp on Security and Privacy (SP), pp. 19-38, (2017)
  • [7] Demmler D, Schneider T, Zohner M., ABY-A framework for efficient mixed-protocol secure two-party computation, Proc of Network and Distributed System Security Symp, pp. 1-15, (2015)
  • [8] Mohassel P, Rindal P., ABY3: A mixed protocol framework for machine learning, Proc of the 2018 ACM SIGSAC Conf on Computer and Communications Security, pp. 35-52, (2018)
  • [9] Chaudhari H, Choudhury A, Patra A, Et al., ASTRA: High throughput 3PC over rings with application to secure prediction, Proc of the 2019 ACM SIGSAC Conf on Cloud Computing Security Workshop, pp. 81-92, (2019)
  • [10] Patra A, Suresh A., BLAZE: Blazing fast privacy-Preserving machine learning[J/OL], (2020)