DArL: Dynamic Parameter Adjustment for LWE-based Secure Inference

被引:0
|
作者
Bian, Song [1 ]
Hiromoto, Masayuki [1 ]
Sato, Takashi [1 ]
机构
[1] Kyoto Univ, Sch Informat, Dept Commun & Comp Engn, Sakyo Ku, Yoshida Hon Machi, Kyoto 6068501, Japan
来源
2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) | 2019年
关键词
FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.23919/date.2019.8715110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Packed additive homomorphic encryption (PAHE) based secure neural network inference is attracting increasing attention in the field of applied cryptography. In this work, we seek to improve the practicality of LWE-based secure inference by dynamically changing the cryptographic parameters depending on the underlying architecture of the neural network. First, we develop and apply theoretical methods to closely examine the error behavior of secure inference, and propose parameters that can reduce as much as 67% of ciphertext size when smaller networks are used. Second, we use rare-event simulation techniques based on the sigma-scale sampling method to provide tight bounds on the size of cumulative errors drawn from (somewhat) arbitrary distributions. Finally, in the experiment, we instantiate an example PAHE scheme and show that we can further reduce the ciphertext size by 3.3x if we adopt a binarized neural network architecture, along with a computation speedup of 2x-3x.
引用
收藏
页码:1739 / 1744
页数:6
相关论文
共 50 条
  • [1] LWE-based Identification Schemes
    Silva, Rosemberg
    Campello, Antonio C. de A., Jr.
    Dahab, Ricardo
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [2] LWE-Based FHE with Better Parameters
    Wang, Fuqun
    Wang, Kunpeng
    Li, Bao
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 175 - 192
  • [3] AN LWE-BASED KEY TRANSFER PROTOCOL WITH ANONYMITY
    Georgescu, Adela
    TATRACRYPT '12, 2012, 53 : 119 - 135
  • [4] Packed Ciphertexts in LWE-Based Homomorphic Encryption
    Brakerski, Zvika
    Gentry, Craig
    Halevi, Shai
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 1 - 13
  • [5] On the Multi-user Security of LWE-Based NIKE
    Langrehr, Roman
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 33 - 62
  • [6] Better Key Sizes (and Attacks) for LWE-Based Encryption
    Lindner, Richard
    Peikert, Chris
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 319 - +
  • [7] A Homomorphic LWE-Based Verifiable Electronic Voting System
    Wu, Chen
    Tang, Shaohua
    Yan, Xingfu
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 98 - 105
  • [8] A LWE-Based Receiver-Deniable Encryption Scheme
    Chi, Po-Wen
    Wang, Ming-Hung
    Chuang, Yun-Hsin
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 124 - 133
  • [9] FFT Program Generation for Ring LWE-Based Cryptography
    Masuda, Masahiro
    Kameyama, Yukiyoshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2021, 2021, 12835 : 151 - 171
  • [10] LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things
    Huth, Christopher
    Becker, Daniela
    Guajardo, Jorge
    Duplys, Paul
    Gueneysu, Tim
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 154 - 154