2019
DOI: 10.1007/978-3-030-31578-8_2
|View full text |Cite
|
Sign up to set email alerts
|

Practical Fully Homomorphic Encryption for Fully Masked Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…We can evaluate some other functions by just adjusting the value of µ. For example, the sign function, as used in FHE-DiNN [BMMP18] and by Izabachène et al [ISZ19]. To evaluate an arbitrary LUT (with more than one value and its negative), we need to increase the size of the LUT, to discretize the function according to this size, and to work only with the positive half of the Torus, since the negacyclic property can only be explored by anti-symmetric functions.…”
Section: Functional Bootstrap In Tfhementioning
confidence: 99%
See 3 more Smart Citations
“…We can evaluate some other functions by just adjusting the value of µ. For example, the sign function, as used in FHE-DiNN [BMMP18] and by Izabachène et al [ISZ19]. To evaluate an arbitrary LUT (with more than one value and its negative), we need to increase the size of the LUT, to discretize the function according to this size, and to work only with the positive half of the Torus, since the negacyclic property can only be explored by anti-symmetric functions.…”
Section: Functional Bootstrap In Tfhementioning
confidence: 99%
“…For example, with B = 4, the size of each Torus slice is 0.125 and the map of integers is (0, 1, 2, 3) → (0, 0.125, 0.25, 0.375). This approach has been extensively used to represent bounded integers in the Torus [BMMP18,CIM19,ISZ19]. To represent unbounded integers, we decompose them in digits of the base B and encrypt each digit in a TLWE sample.…”
Section: Functional Bootstrap In Tfhementioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, any datadriving mechanism heavily relies on the quantity and quality of information, which brings about the conflict between data usability and data confidentiality. Fortunately, secure multiparty computation (SMC) [5][6][7] and homomorphic encryption (HE) [8,9] provide us powerful tools to process data in a concealed manner.…”
Section: Introductionmentioning
confidence: 99%