2020
DOI: 10.1007/978-3-030-61638-0_17
|View full text |Cite
|
Sign up to set email alerts
|

Computing Neural Networks with Homomorphic Encryption and Verifiable Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Additionally, one key contribution of [30] was to associate Paillierbased homomorphic calculations to Verifiable Computing (VC) techniques (e.g. [14]) to further extend the server threat model beyond the honest-but-curious one and bring execution integrity, as [29] did with BFV scheme. However, these works lacked DP.…”
Section: Homomorphic Encryption Protects the Data (And The Model) Aga...mentioning
confidence: 99%
“…Additionally, one key contribution of [30] was to associate Paillierbased homomorphic calculations to Verifiable Computing (VC) techniques (e.g. [14]) to further extend the server threat model beyond the honest-but-curious one and bring execution integrity, as [29] did with BFV scheme. However, these works lacked DP.…”
Section: Homomorphic Encryption Protects the Data (And The Model) Aga...mentioning
confidence: 99%
“…4) Machine-Learning Prediction: Advances in machine learning (ML) enable new ways for data analytics and several works explore the use of HE in order to protect, during ML inference, data confidentiality [24], [97], [108], [137], [141]. However, as the correctness of the prediction can be tantamount to confidentiality, we apply VERITAS to an encrypted ML inference pipeline.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…However, as the correctness of the prediction can be tantamount to confidentiality, we apply VERITAS to an encrypted ML inference pipeline. Indeed, misclassification or malicious predictions could render the application pointless and have dire consequences, such as financial misprediction or cyberthreat misclassification, for the end users [63], [135], [97], [137].…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…Not at all. Indeed, with respect to Convolutional Neural Networks (CNN), starting with the work of Dowlin et al on CryptoNets [14], several works have investigated the application of various flavors of homomorphic encryption techniques to various flavors of neural networks with the long-term goal of achieving the above setup [7,6,21,2,19,24,1,10]. However, these works have so far achieved limited scaling (reaching throughputs ranging from a few hundred to a few thousand neurons per minute) and had to resort to simple activation functions (for instance square, Sign, or ReLU).…”
Section: Introductionmentioning
confidence: 99%