A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks

被引:3
作者
Nikfam, Farzad [1 ]
Casaburi, Raffaele [1 ]
Marchisio, Alberto [2 ]
Martina, Maurizio [1 ]
Shafique, Muhammad [2 ]
机构
[1] Politecn Torino, Dept Elect Elect & Telecommun Engn, I-10129 Turin, Italy
[2] NYU, Div Engn, Ebrain Lab, POB 129188, Abu Dhabi, U Arab Emirates
关键词
deep neural network (DNN); spiking neural network (SNN); homomorphic encryption (HE); Brakerski/Fan-Vercauteren (BFV); Norse; Pyfhel; privacy preserving; FashionMNIST; !text type='Python']Python[!/text; PyTorch; privacy; security; safety; machine learning; artificial intelligence;
D O I
10.3390/info14100537
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) is widely used today, especially through deep neural networks (DNNs); however, increasing computational load and resource requirements have led to cloud-based solutions. To address this problem, a new generation of networks has emerged called spiking neural networks (SNNs), which mimic the behavior of the human brain to improve efficiency and reduce energy consumption. These networks often process large amounts of sensitive information, such as confidential data, and thus privacy issues arise. Homomorphic encryption (HE) offers a solution, allowing calculations to be performed on encrypted data without decrypting them. This research compares traditional DNNs and SNNs using the Brakerski/Fan-Vercauteren (BFV) encryption scheme. The LeNet-5 and AlexNet models, widely-used convolutional architectures, are used for both DNN and SNN models based on their respective architectures, and the networks are trained and compared using the FashionMNIST dataset. The results show that SNNs using HE achieve up to 40% higher accuracy than DNNs for low values of the plaintext modulus t, although their execution time is longer due to their time-coding nature with multiple time steps.
引用
收藏
页数:18
相关论文
共 68 条
[1]   OpenFHE: Open-Source Fully Homomorphic Encryption Library [J].
Al Badawi, Ahmad ;
Bates, Jack ;
Bergamaschi, Flavio ;
Cousins, David Bruce ;
Erabelli, Saroja ;
Genise, Nicholas ;
Halevi, Shai ;
Hunt, Hamish ;
Kim, Andrey ;
Lee, Yongwoo ;
Liu, Zeyu ;
Micciancio, Daniele ;
Quah, Ian ;
Polyakov, Yuriy ;
Saraswathy, R. V. ;
Rohloff, Kurt ;
Saylor, Jonathan ;
Suponitsky, Dmitriy ;
Triplett, Matthew ;
Vaikuntanathan, Vinod ;
Zucca, Vincent .
PROCEEDINGS OF THE 10TH WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY, WAHC 2022, 2022, :53-63
[2]  
[Anonymous], 2000, Neurocomputing, DOI DOI 10.1016/S0925-2312(00)00324-6
[3]  
[Anonymous], 2012, Handbook of Natural Computing
[4]  
[Anonymous], 2013, IACR Cryptol. ePrint Archive
[5]  
Barni M., 2006, Proceedings of the 8th Workshop on Multimedia, P146
[6]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[7]   EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
SIAM JOURNAL ON COMPUTING, 2014, 43 (02) :831-871
[8]  
Brakerski Zvika, 2011, Electron. Colloquium Comput. Complex., V18, P111
[9]  
Cammarota R, 2022, PROCEEDINGS OF THE 2022 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2022, P3, DOI [10.1145/3360810.3565290, 10.1145/3560810.3565290]
[10]   Hardware and Software Optimizations for Accelerating Deep Neural Networks: Survey of Current Trends, Challenges, and the Road Ahead [J].
Capra, Maurizio ;
Bussolino, Beatrice ;
Marchisio, Alberto ;
Masera, Guido ;
Martina, Maurizio ;
Shafique, Muhammad .
IEEE ACCESS, 2020, 8 :225134-225180