Nothing Special   »   [go: up one dir, main page]

Jain et al., 2021 - Google Patents

Efficient cnn building blocks for encrypted data

Jain et al., 2021

View PDF
Document ID
13162531442912554603
Author
Jain N
Nandakumar K
Ratha N
Pankanti S
Kumar U
Publication year
Publication venue
arXiv preprint arXiv:2102.00319

External Links

Snippet

Machine learning on encrypted data can address the concerns related to privacy and legality of sharing sensitive data with untrustworthy service providers. Fully Homomorphic Encryption (FHE) is a promising technique to enable machine learning and inferencing …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/726Inversion; Reciprocal calculation; Division of elements of a finite field
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/50Oblivious transfer

Similar Documents

Publication Publication Date Title
Jiang et al. Secure outsourced matrix computation and application to neural networks
Hesamifard et al. Deep neural networks classification over encrypted data
Alabdulatif et al. Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption
Mo et al. PPFL: Privacy-preserving federated learning with trusted execution environments
Boemer et al. nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data
Tan et al. CryptGPU: Fast privacy-preserving machine learning on the GPU
Hesamifard et al. Cryptodl: Deep neural networks over encrypted data
Riazi et al. Chameleon: A hybrid secure computation framework for machine learning applications
Wagh et al. Falcon: Honest-majority maliciously secure framework for private deep learning
Sanyal et al. TAPAS: Tricks to accelerate (encrypted) prediction as a service
Xie et al. BAYHENN: Combining Bayesian deep learning and homomorphic encryption for secure DNN inference
Li et al. Optimizing privacy-preserving outsourced convolutional neural network predictions
Zheng et al. Privacy-preserving image denoising from external cloud databases
Kim et al. Secure human action recognition by encrypted neural network inference
Jain et al. Efficient cnn building blocks for encrypted data
Salinas et al. Efficient secure outsourcing of large-scale quadratic programs
Wang et al. Secgnn: Privacy-preserving graph neural network training and inference as a cloud service
Mann et al. Towards practical secure neural network inference: the journey so far and the road ahead
Hassan et al. Secure content based image retrieval for mobile users with deep neural networks in the cloud
Ran et al. CryptoGCN: Fast and scalable homomorphically encrypted graph convolutional network inference
Wu et al. Ppolynets: Achieving high prediction accuracy and efficiency with parametric polynomial activations
Mireshghallah et al. A principled approach to learning stochastic representations for privacy in deep neural inference
Zhang et al. Teeslice: slicing dnn models for secure and efficient deployment
Dawson et al. Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme
Folkerts et al. REDsec: Running Encrypted DNNs in Seconds.