On Fully Homomorphic Encryption for Privacy-Preserving Deep Learning

被引:11
作者
Hernandez Marcano, Nestor J. [1 ]
Moller, Mads [1 ]
Hansen, Soren [1 ]
Jacobsen, Rune Hylsberg [1 ]
机构
[1] Aarhus Univ, DIGIT, Dept Engn, Aarhus, Denmark
来源
2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) | 2019年
关键词
Fully Homomorphic Encryption; Convolutional Neural Network; Circuit Analysis; Privacy; Machine Learning;
D O I
10.1109/gcwkshps45667.2019.9024625
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Given the rise of Machine Learning (ML) applications using sensitive private data, we present an implementation of Fully Homomorphic Encryption (FHE) with Convolutional Neural Networks (CNNs) for privacy-preserving Deep Learning (DL). This permits to utilize DL image recognition algorithms without compromising personal data of served customers, e.g medical images. The combination of FHE and CNN is accomplished by using logic circuits, which enable to conduct deep learning algorithms on ciphertext instead of plaintext. We provide a set of practical measurements from an implementation on the number of logic circuit operations required to carry out privacy-preserving ML. The results are function of the numerical representation and security parameters. Our results indicate that the protection of customer data is a trade-off between the required level of security, prediction capability and computational complexity. Thus, we reach full correct classification with 6 hits in the fractional part, and evaluate the time costs associated with our circuits as a function of its security parameters.
引用
收藏
页数:6
相关论文
共 17 条
  • [1] [Anonymous], 2013, 2013340 IACR CRYPT E
  • [2] [Anonymous], 2014, Report 2014/816
  • [3] Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
  • [4] Brakerski Z., 2011, ELECT C COMPUT COMPL, VTR11, P277
  • [5] Chillotti Ilaria, 2016, Paper 2016/870
  • [6] Dowlin N, 2016, PR MACH LEARN RES, V48
  • [7] Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
  • [8] Computing Arbitrary Functions of Encrypted Data
    Gentry, Craig
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (03) : 97 - 105
  • [9] Gentry Craig, 2009, PhD thesis
  • [10] PROBABILISTIC ENCRYPTION
    GOLDWASSER, S
    MICALI, S
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) : 270 - 299