Privacy-Preserving Machine Learning Based on Cryptography: A Survey

被引:0
作者
Chen, Congcong [1 ]
Wei, Lifei [2 ]
Xie, Jintao [1 ]
Shi, Yang [1 ]
机构
[1] Tongji Univ, Sch Comp Sci & Technol, Shanghai, Peoples R China
[2] Shanghai Maritime Univ, Coll Informat Engn, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Machine learning; secure multi-party computation; homomorphic encryp-tion; privacy preserving; cryptography; SECURE 2-PARTY COMPUTATION; FULLY HOMOMORPHIC ENCRYPTION; NEURAL-NETWORK INFERENCE; PROTOCOLS; CIRCUIT; CRYPTOSYSTEM; FRAMEWORK; SYSTEM; GATES;
D O I
10.1145/3729234
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has profoundly influenced various aspects of our lives. However, privacy breaches have caused significant unease and concern among the general public. Preserving the privacy of sensitive data during the training and inference phases of machine learning is a key challenge. Cryptography-based privacy-preserving machine learning (crypto-based PPML) offers a viable solution to this challenge. In this article, we studied over 100 publications on crypto-based PPML frameworks published between 2016 and 2024, including 55 client-server architecture frameworks and 64 multi-party architecture frameworks. We provide a comprehensive overview of these frameworks, highlighting their features across various dimensions. Furthermore, we conduct an in-depth analysis, delving into scenarios, privacy goals, threat models, and optimization techniques that underpin these innovative solutions. We also discuss the challenges in the field of crypto-based PPML, including aspects of security and privacy, efficiency, and availability and usability. Finally, we offer an outlook on future research directions, aiming to provide valuable insights for both scholars and practitioners.
引用
收藏
页数:33
相关论文
共 216 条
[1]   QUOTIENT: Two-Party Secure Neural Network Training and Prediction [J].
Agrawal, Nitin ;
Shamsabadi, Ali Shahin ;
Kusner, Matt J. ;
Gascon, Adria .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :1231-1247
[2]   MPC with Friends and Foes [J].
Alon, Bar ;
Omri, Eran ;
Paskin-Cherniaysky, Anat .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT II, 2020, 12171 :677-706
[3]   Scalable and Secure Logistic Regression via Homomorphic Encryption [J].
Aono, Yoshinori ;
Hayashi, Takuya ;
Le Trieu Phong ;
Wang, Lihua .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :142-144
[4]  
Attrapadung Nuttapong, 2022, Proceedings on Privacy Enhancing Technologies, V4, P746
[5]  
Aumann Y, 2007, LECT NOTES COMPUT SC, V4392, P137
[6]  
Ball M., 2019, Cryptology ePrint Archive, Paper 2019/338
[7]   Garbling Gadgets for Boolean and Arithmetic Circuits [J].
Ball, Marshall ;
Malkin, Tal ;
Rosulek, Mike .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :565-577
[8]   HELiKs: HE Linear Algebra Kernels for Secure Inference [J].
Balla, Shashank ;
Koushanfar, Farinaz .
PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, :2306-2320
[9]  
Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
[10]  
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420