2018
DOI: 10.48550/arxiv.1812.10659
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Low Latency Privacy Preserving Inference

Abstract: When applying machine learning to sensitive data, one has to find a balance between accuracy, information security, and computational-complexity. Recent studies combined Homomorphic Encryption with neural networks to make inferences while protecting against information leakage. However, these methods are limited by the width and depth of neural networks that can be used (and hence the accuracy) and exhibit high latency even for relatively simple networks. In this study we provide two solutions that address the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…logistic regression [1,2,8,13,15], decision tree [11] and clustering [14,24]. As for the recent popularized deep models, there is effort on making inference over the private data [6,20,26], but not much on training. The major difficulty comes from the high complexity.…”
Section: Related Workmentioning
confidence: 99%
“…logistic regression [1,2,8,13,15], decision tree [11] and clustering [14,24]. As for the recent popularized deep models, there is effort on making inference over the private data [6,20,26], but not much on training. The major difficulty comes from the high complexity.…”
Section: Related Workmentioning
confidence: 99%
“…With the power of LHE, a two-party protocol is devised where interactions between the server and the client are minimized. However, due to the fact that HE parameters scale with the number of network layers, one of the most recent work [4] still requires more than 700 seconds to evaluate a relatively shallow neural network.…”
Section: Related Workmentioning
confidence: 99%
“…Recent advances in cryptographic primitives [14] and adversary models [19,21] have brought input-hiding SI into practical domain, where 32 × 32 image datasets can be classified within seconds [19,25]. Meanwhile, from a learning perspective, alternative feature representations are discussed to reduce the computational complexity of SI [4]. We also observe that hardware-friendly network architectures [8,9] can be adopted in a secure setting to reduce the computational and communicational overheads [25].…”
Section: Introductionmentioning
confidence: 99%