Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3417274
|View full text |Cite
|
Sign up to set email alerts
|

CrypTFlow2: Practical 2-Party Secure Inference

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
124
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 181 publications
(136 citation statements)
references
References 23 publications
1
124
0
2
Order By: Relevance
“…Note that, while the client can use the server's prediction service as a blackbox oracle to extract the model [66], [69], or even infer the training set [26], [50], [61], GALA does not aim to protect against the black-box attack. Instead, it focuses on protecting the input data and the model parameters during the inference process, which stays in line with the threat model of GAZELLE [38], SecureML [48], DELPHI [46], CrytoFlow2 [54], etc., the output of neural network model is returned to the client which decrypts the result and gets the plaintext prediction.…”
Section: B Threat Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Note that, while the client can use the server's prediction service as a blackbox oracle to extract the model [66], [69], or even infer the training set [26], [50], [61], GALA does not aim to protect against the black-box attack. Instead, it focuses on protecting the input data and the model parameters during the inference process, which stays in line with the threat model of GAZELLE [38], SecureML [48], DELPHI [46], CrytoFlow2 [54], etc., the output of neural network model is returned to the client which decrypts the result and gets the plaintext prediction.…”
Section: B Threat Modelmentioning
confidence: 99%
“…In addition, Differential Privacy (DP) [60], [7], [53] and Secure Enclave (SE) [45], [51], [10], [75] are also explored to protect data security and privacy in neural networks. In order to deal with different properties of linearity (weighted sum and convolution functions) and nonlinearity (activation and pooling functions) in neural network computations, several efforts have been made to orchestrate multiple cryptographic techniques to achieve better performance [74], [43], [38], [48], [56], [44], [76], [18], [73], [47], [71], [16], [12], [41], [54], [46]. Among them, the schemes with HE-based linear computations and GC-based nonlinear computations (called the HE-GC neural network framework hereafter) demonstrate superior performance [43], [38], [44], [46].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For division over the secret-shared data, we invoke a state-ofthe-art cryptographic protocol [43], denoted as SecDiv(). On input x and y , SecDiv outputs secret shares of x/y with the required accuracy.…”
Section: B Additive Secret Sharingmentioning
confidence: 99%
“…On input x and y , SecDiv outputs secret shares of x/y with the required accuracy. We only introduce the function of this protocol; readers may refer to the original study [43] for details.…”
Section: B Additive Secret Sharingmentioning
confidence: 99%