Proceedings 2023 Network and Distributed System Security Symposium 2023
DOI: 10.14722/ndss.2023.24034
|View full text |Cite
|
Sign up to set email alerts
|

REDsec: Running Encrypted Discretized Neural Networks in Seconds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Recent works (Dowlin et al 2016;Folkerts, Gouert, and Tsoutsos 2021) have shown the potential of integrating HE with deep neural networks to devise both efficient and privacy-conscious machine learning models. Dowlin et al (Dowlin et al 2016) introduced CryptoNets, which showcases the adaptability of neural networks to encrypted data and underscores the alterations required for compatibility with HE.…”
Section: Fingerprint Authentication With Hementioning
confidence: 99%
See 1 more Smart Citation
“…Recent works (Dowlin et al 2016;Folkerts, Gouert, and Tsoutsos 2021) have shown the potential of integrating HE with deep neural networks to devise both efficient and privacy-conscious machine learning models. Dowlin et al (Dowlin et al 2016) introduced CryptoNets, which showcases the adaptability of neural networks to encrypted data and underscores the alterations required for compatibility with HE.…”
Section: Fingerprint Authentication With Hementioning
confidence: 99%
“…Dowlin et al (Dowlin et al 2016) introduced CryptoNets, which showcases the adaptability of neural networks to encrypted data and underscores the alterations required for compatibility with HE. Similarly, Folkerts et al (Folkerts, Gouert, and Tsoutsos 2021) proposed a framework that expanded the design of HE-driven private machine learning inference. However, their approaches fall short of accommodating CNN models with floating point parameters, which are essential for biometric verification.…”
Section: Fingerprint Authentication With Hementioning
confidence: 99%
“…q b and a ← 2n q a . 4 Initialize tv ∈ R n,Q and RNS representation of tv is (tv (0) , tv (1) , ..., tv k−1 ), where tv (i) = n−1 j=0 fj X j and fj = f j mod q i .…”
Section: Appendix a Manuscript Appendixmentioning
confidence: 99%
“…Fully homomorphic encryption (FHE) is a type of general secure multi-party computing (MPC) techniques that enable the participating parties to jointly evaluate arbitrary functions securely. Due to its low round complexity and low communication bandwidth, FHE finds applications in two-party secure function evaluation, such as privacy-preserving machine learning as a service [1][2][3][4][5][6], and secure computation outsourcing, e.g., secure database [7] and program outsourcing [8].…”
Section: Introductionmentioning
confidence: 99%
“…We evaluate the 𝜒 2 benchmark both using the EncInt and EncFP encodings. Machine Learning Inference: PPML is an emergent research area in encrypted computation [27,38]. The cloud can perform oblivious neural network inference procedures with its own proprietary model on sensitive user data for classification, and finally return a set of encrypted probability scores for each class.…”
Section: T2 Arithmetic Benchmarksmentioning
confidence: 99%