Efficient Secure Multi-party Computation for Multi-dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification

被引:0
作者
Wu, Dongyu [1 ]
Liang, Bei [1 ]
Lu, Zijie [1 ]
Ding, Jintai [1 ]
机构
[1] Beijing Inst Math Sci & Applicat, Beijing 101408, Peoples R China
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2024, PT I | 2025年 / 14905卷
基金
国家重点研发计划;
关键词
Tensor triple; MPC; Beaver triple; VOLE; Privacy-preserving biometric identification; Privacy-preserving machine learning;
D O I
10.1007/978-981-97-8013-6_1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Over years of the development of secure multi-party computation (MPC), many sophisticated functionalities have been made practical and multi-dimensional operations occur more and more frequently in MPC protocols, especially in protocols involving datasets of vector elements, such as privacy-preserving biometric identification and privacy-preserving machine learning. In this paper, we introduce a new kind of correlation, called tensor triples, which is designed to make multi-dimensional MPC protocols more efficient. We will discuss the generation process, the usage, as well as the applications of tensor triples and show that it can accelerate privacy-preserving biometric identification protocols, such as FingerCode, Eigenfaces and FaceNet, by more than 1000 times, with reasonable offline costs.
引用
收藏
页码:3 / 25
页数:23
相关论文
共 45 条
  • [1] Abspoel M, 2020, LECT NOTES COMPUT SC, V12493, P151, DOI 10.1007/978-3-030-64840-4_6
  • [2] Secure Arithmetic Computation with Constant Computational Overhead
    Applebaum, Benny
    Damgard, Ivan
    Ishai, Yuval
    Nielsen, Michael
    Zichron, Lior
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 223 - 254
  • [3] Asharov Gilad, 2013, ACM CCS 2013, P535
  • [4] Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
  • [5] Boddeti VN, 2018, INT CONF BIOMETR THE
  • [6] Practical Secure Aggregation for Privacy-Preserving Machine Learning
    Bonawitz, Keith
    Ivanov, Vladimir
    Kreuter, Ben
    Marcedone, Antonio
    McMahan, H. Brendan
    Patel, Sarvar
    Ramage, Daniel
    Segal, Aaron
    Seth, Karn
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1175 - 1191
  • [7] Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
    Boyle, Elette
    Couteau, Geoffroy
    Gilboa, Niv
    Ishai, Yuval
    Kohl, Lisa
    Rindal, Peter
    Scholl, Peter
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 291 - 308
  • [8] Compressing Vector OLE
    Boyle, Elette
    Couteau, Geoffroy
    Gilboa, Niv
    Ishai, Yuval
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 896 - 912
  • [9] Brakerski Zvika, 2012, P 3 INN THEOR COMP S, P309, DOI [10.1145/2090236.2090262, DOI 10.1145/2090236.2090262]
  • [10] Privacy-Preserving Biometric Identification Using Secure Multiparty Computation
    Bringer, Julien
    Chabanne, Herve
    Patey, Alain
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 42 - 52