PASNet: Polynomial Architecture Search Framework for Two-party Computation-based Secure Neural Network Deployment

被引:1
|
作者
Peng, Hongwu [1 ]
Zhou, Shanglin [1 ]
Luo, Yukui [2 ]
Xu, Nuo [3 ]
Duan, Shijin [2 ]
Ran, Ran [3 ]
Zhao, Jiahui [1 ]
Wang, Chenghong [4 ]
Geng, Tong [5 ]
Wen, Wujie [3 ]
Xu, Xiaolin [2 ]
Ding, Caiwen [1 ]
机构
[1] Univ Connecticut, Storrs, CT 06269 USA
[2] Northeastern Univ, Boston, MA USA
[3] Lehigh Univ, Bethlehem, PA 18015 USA
[4] Duke Univ, Durham, NC USA
[5] Univ Rochester, Rochester, NY USA
关键词
Privacy-Preserving in Machine Learning; Multi Party Computation; Neural Architecture Search; Polynomial Activation Function; Software/Hardware Co-design; FPGA;
D O I
10.1109/DAC56929.2023.10247663
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Two-party computation (2PC) is promising to enable privacy-preserving deep learning (DL). However, the 2PC-based privacy-preserving DL implementation comes with high comparison protocol overhead from the non-linear operators. This work presents PASNet, a novel systematic framework that enables low latency, high energy efficiency & accuracy, and security-guaranteed 2PC-DL by integrating the hardware latency of the cryptographic building block into the neural architecture search loss function. We develop a cryptographic hardware scheduler and the corresponding performance model for Field Programmable Gate Arrays (FPGA) as a case study. The experimental results demonstrate that our light-weighted model PASNet-A and heavily-weighted model PASNet-B achieve 63 ms and 228 ms latency on private inference on ImageNet, which are 147 and 40 times faster than the SOTA CryptGPU system, and achieve 70.54% & 78.79% accuracy and more than 1000 times higher energy efficiency. The pretrained PASNet models and test code can be found on Github(1).
引用
收藏
页数:6
相关论文
共 36 条
  • [1] Secure Two-Party Computation Based on Blind Quantum Computation
    Zhu, Yaqing
    Li, Qin
    Liu, Chengdong
    Sun, Zhiwei
    Peng, Yu
    Shen, Dongsu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 2074 - 2082
  • [2] Secure Two-Party Computation Based on Blind Quantum Computation
    Yaqing Zhu
    Qin Li
    Chengdong Liu
    Zhiwei Sun
    Yu Peng
    Dongsu Shen
    International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
  • [3] PrivC-A Framework for Efficient Secure Two-Party Computation
    He, Kai
    Yang, Liu
    Hong, Jue
    Jiang, Jinghua
    Wu, Jieming
    Dong, Xu
    Liang, Zhuxun
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 394 - 407
  • [4] Encrypted polynomial control based on tailored two-party computation
    Schulze Darup, Moritz
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4168 - 4187
  • [5] Panther: Practical Secure Two-Party Neural Network Inference
    Feng, Jun
    Wu, Yefan
    Sun, Hong
    Zhang, Shunli
    Liu, Debin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1149 - 1162
  • [6] Scalar-product Based Secure Two-party Computation
    Shen, Chih-Hao
    Zhan, Justin
    Hsu, Tsan-Sheng
    Liau, Churn-Jung
    Wang, Da-Wei
    2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 556 - +
  • [7] QUOTIENT: Two-Party Secure Neural Network Training and Prediction
    Agrawal, Nitin
    Shamsabadi, Ali Shahin
    Kusner, Matt J.
    Gascon, Adria
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1231 - 1247
  • [8] ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
    Demmler, Daniel
    Schneider, Thomas
    Zohner, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [9] Fair secure two-party computation protocol based on game theory
    Wang, Jie
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2016, 51 (05): : 902 - 909
  • [10] A PASSWORD-AUTHENTICATION SCHEME BASED ON SECURE TWO-PARTY COMPUTATION
    Sun, Qibo
    Wang, Wenbin
    Yang, Fangchun
    Xiao, Qian
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 275 - +