Jain et al., 2021 - Google Patents
Efficient cnn building blocks for encrypted dataJain et al., 2021
View PDF- Document ID
- 13162531442912554603
- Author
- Jain N
- Nandakumar K
- Ratha N
- Pankanti S
- Kumar U
- Publication year
- Publication venue
- arXiv preprint arXiv:2102.00319
External Links
Snippet
Machine learning on encrypted data can address the concerns related to privacy and legality of sharing sensitive data with untrustworthy service providers. Fully Homomorphic Encryption (FHE) is a promising technique to enable machine learning and inferencing …
- 238000010801 machine learning 0 abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/726—Inversion; Reciprocal calculation; Division of elements of a finite field
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/50—Oblivious transfer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jiang et al. | Secure outsourced matrix computation and application to neural networks | |
Hesamifard et al. | Deep neural networks classification over encrypted data | |
Alabdulatif et al. | Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption | |
Mo et al. | PPFL: Privacy-preserving federated learning with trusted execution environments | |
Boemer et al. | nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data | |
Tan et al. | CryptGPU: Fast privacy-preserving machine learning on the GPU | |
Hesamifard et al. | Cryptodl: Deep neural networks over encrypted data | |
Riazi et al. | Chameleon: A hybrid secure computation framework for machine learning applications | |
Wagh et al. | Falcon: Honest-majority maliciously secure framework for private deep learning | |
Sanyal et al. | TAPAS: Tricks to accelerate (encrypted) prediction as a service | |
Xie et al. | BAYHENN: Combining Bayesian deep learning and homomorphic encryption for secure DNN inference | |
Li et al. | Optimizing privacy-preserving outsourced convolutional neural network predictions | |
Zheng et al. | Privacy-preserving image denoising from external cloud databases | |
Kim et al. | Secure human action recognition by encrypted neural network inference | |
Jain et al. | Efficient cnn building blocks for encrypted data | |
Salinas et al. | Efficient secure outsourcing of large-scale quadratic programs | |
Wang et al. | Secgnn: Privacy-preserving graph neural network training and inference as a cloud service | |
Mann et al. | Towards practical secure neural network inference: the journey so far and the road ahead | |
Hassan et al. | Secure content based image retrieval for mobile users with deep neural networks in the cloud | |
Ran et al. | CryptoGCN: Fast and scalable homomorphically encrypted graph convolutional network inference | |
Wu et al. | Ppolynets: Achieving high prediction accuracy and efficiency with parametric polynomial activations | |
Mireshghallah et al. | A principled approach to learning stochastic representations for privacy in deep neural inference | |
Zhang et al. | Teeslice: slicing dnn models for secure and efficient deployment | |
Dawson et al. | Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme | |
Folkerts et al. | REDsec: Running Encrypted DNNs in Seconds. |