[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3243734.3243837acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Secure Outsourced Matrix Computation and Application to Neural Networks

Published: 15 October 2018 Publication History

Abstract

Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and security issues in outsourcing computation on sensitive data to an untrusted computation environment. Comparing to secure Multi-Party Computation (MPC), HE has advantages in supporting non-interactive operations and saving on communication costs. However, it has not come up with an optimal solution for modern learning frameworks, partially due to a lack of efficient matrix computation mechanisms. In this work, we present a practical solution to encrypt a matrix homomorphically and perform arithmetic operations on encrypted matrices. Our solution includes a novel matrix encoding method and an efficient evaluation strategy for basic matrix operations such as addition, multiplication, and transposition. We also explain how to encrypt more than one matrix in a single ciphertext, yielding better amortized performance. Our solution is generic in the sense that it can be applied to most of the existing HE schemes. It also achieves reasonable performance for practical use; for example, our implementation takes 9.21 seconds to multiply two encrypted square matrices of order 64 and 2.56 seconds to transpose a square matrix of order 64. Our secure matrix computation mechanism has a wide applicability to our new framework EDM, which stands for encrypted data and encrypted model. To the best of our knowledge, this is the first work that supports secure evaluation of the prediction phase based on both encrypted data and encrypted model, whereas previous work only supported applying a plain model to encrypted data. As a benchmark, we report an experimental result to classify handwritten images using convolutional neural networks (CNN). Our implementation on the MNIST dataset takes 28.59 seconds to compute ten likelihoods of 64 input images simultaneously, yielding an amortized rate of 0.45 seconds per image.

Supplementary Material

MP4 File (p1209-kim.mp4)

References

[1]
Mart'in Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, et al. 2015. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. (2015). https://www.tensorflow.org.
[2]
Martin R Albrecht, Rachel Player, and Sam Scott. 2015. On the concrete hardness of learning with errors. Journal of Mathematical Cryptology, Vol. 9, 3 (2015), 169--203.
[3]
Cloud Security Alliance. 2009. Security guidance for critical areas of focus in cloud computing. (2009). http://www.cloudsecurityalliance.org.
[4]
Mikhail J Atallah and Keith B Frikken. 2010. Securely outsourcing linear algebra computations. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 48--59.
[5]
Mauro Barni, Claudio Orlandi, and Alessandro Piva. 2006. A privacy-preserving protocol for neural-network-based computation. In Proceedings of the 8th workshop on Multimedia and security. ACM, 146--151.
[6]
Joppe W Bos, Kristin Lauter, Jake Loftus, and Michael Naehrig. 2013. Improved security for a ring-based fully homomorphic encryption scheme. Cryptography and Coding. Springer, 45--64.
[7]
Florian Bourse, Michele Minelli, Matthias Minihold, and Pascal Paillier. 2017. Fast Homomorphic Evaluation of Deep Discretized Neural Networks. Cryptology ePrint Archive, Report 2017/1114. (2017). https://eprint.iacr.org/2017/1114.
[8]
Zvika Brakerski. 2012. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. Advances in Cryptology--CRYPTO 2012. Springer, 868--886.
[9]
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2012. (Leveled) fully homomorphic encryption without bootstrapping. In Proc. of ITCS. ACM, 309--325.
[10]
Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, and Emmanuel Prouff. 2017. Privacy-preserving classification on deep neural network. Cryptology ePrint Archive, Report 2017/035. (2017). https://eprint.iacr.org/2017/035.
[11]
David Chaum and Torben Pryds Pedersen. 1992. Wallet databases with observers. In Annual International Cryptology Conference. Springer, 89--105.
[12]
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2018. Bootstrapping for Approximate Homomorphic Encryption. In Advances in Cryptology--EUROCRYPT 2018. Springer, 360--384.
[13]
Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song. 2016. Implementation of textHEAAN. (2016). https://github.com/kimandrik/HEAAN.
[14]
Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song. 2017. Homomorphic encryption for arithmetic of approximate numbers. In Advances in Cryptology--ASIACRYPT 2017: 23rd International Conference on the Theory and Application of Cryptology and Information Security. Springer, 409--437.
[15]
Francc ois Chollet et al. 2015. Keras. (2015). https://github.com/keras-team/keras.
[16]
Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, and Ran Raz. 2011. Memory delegation. In Annual Cryptology Conference. Springer, 151--168.
[17]
Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. textABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In NDSS .
[18]
Dung Hoang Duong, Pradeep Kumar Mishra, and Masaya Yasuda. 2016. Efficient secure matrix multiplication over LWE-based homomorphic encryption. Tatra Mountains Mathematical Publications, Vol. 67, 1 (2016), 69--83.
[19]
Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. Cryptology ePrint Archive, Report 2012/144. (2012). https://eprint.iacr.org/2012/144.
[20]
Dario Fiore and Rosario Gennaro. 2012. Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 501--512.
[21]
Rosario Gennaro, Craig Gentry, and Bryan Parno. 2010. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Annual Cryptology Conference. Springer, 465--482.
[22]
Craig Gentry et al. 2009. Fully homomorphic encryption using ideal lattices. In STOC, Vol. 9. 169--178.
[23]
Craig Gentry, Shai Halevi, and Nigel P Smart. 2012. Homomorphic evaluation of the AES circuit. Advances in Cryptology--CRYPTO 2012. Springer, 850--867.
[24]
Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. 201--210.
[25]
Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In Advances in Cryptology--CRYPTO 2014. Springer, 554--571.
[26]
Shai Halevi and Victor Shoup. 2015. Bootstrapping for HElib. Advances in Cryptology--EUROCRYPT 2015. Springer, 641--670.
[27]
Shai Halevi and Victor Shoup. 2018. Faster Homomorphic Linear Transformations in HElib. Cryptology ePrint Archive, Report 2018/244. (2018). https://eprint.iacr.org/2018/244.
[28]
Xiaoqian Jiang, Yongan Zhao, Xiaofeng Wang, Bradley Malin, Shuang Wang, Lucila Ohno-Machado, and Haixu Tang. 2014. A community assessment of privacy preserving techniques for human genomes. BMC Med. Inform. Decis. Mak., Vol. 14 Suppl 1, Suppl 1 (Dec. 2014), S1.
[29]
Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD.
[30]
Miran Kim and Kristin Lauter. 2015. Private genome analysis through homomorphic encryption. BMC medical informatics and decision making, Vol. 15, Suppl 5 (2015), S3.
[31]
Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, and Xiaoqian Jiang. 2018. Secure Logistic Regression based on Homomorphic Encryption: Design and Evaluation. JMIR medical informatics, Vol. 6, 2 (2018).
[32]
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.
[33]
Yann LeCun. 1998. The MNIST database of handwritten digits. http://yann. lecun. com/exdb/mnist/ (1998).
[34]
Jian Liu, Mika Juuti, Yao Lu, and N Asokan. 2017. Oblivious neural network predictions via minionn transformations. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 619--631.
[35]
Eleftheria Makri, Dragos Rotaru, Nigel P Smart, and Frederik Vercauteren. 2017. PICS: Private Image Classification with textSVM. Cryptology ePrint Archive, Report 2017/1190. (2017). https://eprint.iacr.org/2017/1190.
[36]
Riccardo Miotto, Fei Wang, Shuang Wang, Xiaoqian Jiang, and Joel T Dudley. 2017. Deep learning for healthcare: review, opportunities and challenges. Brief. Bioinform. (May 2017).
[37]
Pradeep Kumar Mishra, Dung Hoang Duong, and Masaya Yasuda. 2017. Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption. In International Conference on Information Security Practice and Experience. Springer, 320--330.
[38]
Payman Mohassel. 2011. Efficient and Secure Delegation of Linear Algebra. Cryptology ePrint Archive, Report 2011/605. (2011). https://eprint.iacr.org/2011/605.
[39]
Payman Mohassel and Yupeng Zhang. 2017. SecureML: A system for scalable privacy-preserving machine learning. In Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 19--38.
[40]
Michael Naehrig, Kristin Lauter, and Vinod Vaikuntanathan. 2011. Can homomorphic encryption be practical?. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop. ACM, 113--124.
[41]
Claudio Orlandi, Alessandro Piva, and Mauro Barni. 2007. Oblivious neural network computing via homomorphic encryption. EURASIP Journal on Information Security, Vol. 2007, 1 (2007), 037343.
[42]
M Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M Songhori, Thomas Schneider, and Farinaz Koushanfar. 2018. Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. arXiv preprint arXiv:1801.03239 (2018).
[43]
Victor Shoup et al. 2001. NTL: A library for doing number theory. (2001).
[44]
Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).
[45]
Nigel P Smart and Frederik Vercauteren. 2011. Fully homomorphic textSIMD operations. Cryptology ePrint Archive, Report 2011/133. (2011). https://eprint.iacr.org/2011/133.
[46]
Hassan Takabi, James BD Joshi, and Gail-Joon Ahn. 2010. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, Vol. 8, 6 (2010), 24--31.
[47]
Shuang Wang, Xiaoqian Jiang, Haixu Tang, Xiaofeng Wang, Diyue Bu, Knox Carey, Stephanie O M Dyke, Dov Fox, Chao Jiang, Kristin Lauter, and Others. 2017. A community effort to protect genomic data sharing, collaboration and outsourcing. npj Genomic Medicine, Vol. 2, 1 (2017), 33.
[48]
David Wu and Jacob Haven. 2012. Using homomorphic encryption for large scale statistical analysis. Technical Report. Technical Report: cs. stanford. edu/people/dwu4/papers/FHESI Report. pdf.
[49]
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, and Takeshi Koshiba. 2015. New packing method in somewhat homomorphic encryption and its applications. Security and Communication Networks, Vol. 8, 13 (2015), 2194--2213.
[50]
Matthew D Zeiler. 2012. ADADELTA: an adaptive learning rate method. arXiv preprint arXiv:1212.5701 (2012).

Cited By

View all
  • (2025)Encrypted Dynamic Control Exploiting Limited Number of Multiplications and a Method Using RLWE-based CryptosystemIEEE Transactions on Systems, Man, and Cybernetics: Systems10.1109/TSMC.2024.345200755:1(158-169)Online publication date: Jan-2025
  • (2024)Geometry Reconstruction from Entries of Impedance Matrices2024 18th European Conference on Antennas and Propagation (EuCAP)10.23919/EuCAP60739.2024.10501168(1-5)Online publication date: 17-Mar-2024
  • (2024)Fast and Accurate Homomorphic Softmax EvaluationProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670369(4391-4404)Online publication date: 2-Dec-2024
  • Show More Cited By

Index Terms

  1. Secure Outsourced Matrix Computation and Application to Neural Networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
    October 2018
    2359 pages
    ISBN:9781450356930
    DOI:10.1145/3243734
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. homomorphic encryption
    2. machine learning
    3. matrix computation
    4. neural networks

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS '18
    Sponsor:

    Acceptance Rates

    CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)332
    • Downloads (Last 6 weeks)41
    Reflects downloads up to 24 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Encrypted Dynamic Control Exploiting Limited Number of Multiplications and a Method Using RLWE-based CryptosystemIEEE Transactions on Systems, Man, and Cybernetics: Systems10.1109/TSMC.2024.345200755:1(158-169)Online publication date: Jan-2025
    • (2024)Geometry Reconstruction from Entries of Impedance Matrices2024 18th European Conference on Antennas and Propagation (EuCAP)10.23919/EuCAP60739.2024.10501168(1-5)Online publication date: 17-Mar-2024
    • (2024)Fast and Accurate Homomorphic Softmax EvaluationProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670369(4391-4404)Online publication date: 2-Dec-2024
    • (2024)HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated LearningProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3656285(512-521)Online publication date: 1-Jul-2024
    • (2024)MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep LearningProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637680(1034-1048)Online publication date: 1-Jul-2024
    • (2024)The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep CircuitsProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653277(127-138)Online publication date: 19-Jun-2024
    • (2024)Towards Efficient Communication and Secure Federated Recommendation System via Low-rank TrainingProceedings of the ACM Web Conference 202410.1145/3589334.3645702(3940-3951)Online publication date: 13-May-2024
    • (2024)Encrypted Data Caching and Learning Framework for Robust Federated Learning-Based Mobile Edge ComputingIEEE/ACM Transactions on Networking10.1109/TNET.2024.336581532:3(2705-2720)Online publication date: Jun-2024
    • (2024)FlGan: GAN-Based Unbiased Federated Learning Under Non-IID SettingsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.330985836:4(1566-1581)Online publication date: Apr-2024
    • (2024)Privacy-Preserving Zero-Sum-Path Evaluation of Decision Trees in Postquantum Industrial IoTIEEE Transactions on Industrial Informatics10.1109/TII.2024.338452320:8(10178-10191)Online publication date: Aug-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media