Computing Neural Networks with Homomorphic Encryption and Verifiable Computing

被引:5
|
作者
Madi, Abbass [1 ]
Sirdey, Renaud [1 ]
Stan, Oana [1 ]
机构
[1] CEA, LIST, Point Courrier 172, F-91191 Gif Sur Yvette, France
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020 | 2020年 / 12418卷
关键词
Neural Networks; Homomorphic Encryption; Verifiable Computing;
D O I
10.1007/978-3-030-61638-0_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of machine learning and in particular of Artificial Neural Networks (ANN) raises multiple security and data privacy issues. Recent works propose to preserve data confidentiality during the inference process, available as an outsourced service, using Homomorphic Encryption techniques. However, their setting is based on an honest-but-curious service provider and none of them addresses the problem of result integrity. In this paper, we propose a practical framework for privacy-preserving predictions with Homomorphic Encryption (HE) and Verifiable Computing (VC). We propose here a partially encrypted Neural Network in which the first layer consists of a quadratic function and its homomorphic evaluation is checked for integrity using a VC scheme which is slight adaption of the one of Fiore et al. [13]. Inspired by the neural network model proposed by Ryffel et al. [26] which combines adversarial training and functional encryption for partially encrypted machine learning, our solution can be deployed in different application contexts and provides additional security guarantees. We validate our work on the MNIST handwritten recognition dataset for which we achieve high accuracy (97.54%) and decent latency for a practical deployment (on average 3.8 s for both homomorphic evaluation and integrity proof preparation and 0.021 s for the verification).
引用
收藏
页码:295 / 317
页数:23
相关论文
共 50 条
  • [1] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    TECHNOLOGIES, 2019, 7 (01):
  • [2] Oblivious Neural Network Computing via Homomorphic Encryption
    Orlandi, C.
    Piva, A.
    Barni, M.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01):
  • [3] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [4] Homomorphic encryption for stochastic computing
    Koseki, Ryusuke
    Ito, Akira
    Ueno, Rei
    Tibouchi, Mehdi
    Homma, Naofumi
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (02) : 251 - 263
  • [5] Homomorphic encryption for stochastic computing
    Ryusuke Koseki
    Akira Ito
    Rei Ueno
    Mehdi Tibouchi
    Naofumi Homma
    Journal of Cryptographic Engineering, 2023, 13 : 251 - 263
  • [6] Verifiable Homomorphic Encrypted Computations for Cloud Computing
    Awadallah, Ruba
    Samsudin, Azman
    Almazrooie, Mishal
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 797 - 808
  • [7] Dual Homomorphic Encryption for Cloud Computing
    Wang, Huai-Xi
    Shu, Ni-Na
    Li, Yong-Xiang
    Wang, Chen
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 838 - 842
  • [8] Homomorphic Encryption Technology for Cloud Computing
    Zhao, Min E.
    Geng, Yang
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019], 2019, 154 : 73 - 83
  • [9] Homomorphic Encryption of Neural Networks
    Pandey, Purnendu Shekhar
    Kumar, Vinod
    Wario, Ruth
    MACHINE LEARNING, IMAGE PROCESSING, NETWORK SECURITY AND DATA SCIENCES, MIND 2022, PT I, 2022, 1762 : 162 - 173
  • [10] Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption
    Song, Xidan
    Wang, Yulin
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2450 - 2453