2020
DOI: 10.1155/2020/5328059
|View full text |Cite
|
Sign up to set email alerts
|

SecureBP from Homomorphic Encryption

Abstract: We present a secure backpropagation neural network training model (SecureBP), which allows a neural network to be trained while retaining the confidentiality of the training data, based on the homomorphic encryption scheme. We make two contributions. The first one is to introduce a method to find a more accurate and numerically stable polynomial approximation of functions in a certain interval. The second one is to find a strategy of refreshing ciphertext during training, which keeps the order of magnitude of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…In the context of NN there are two MLaaS variations; Training as a Service (TaaS) and Prediction as a Service (PaaS). In TaaS, a cloud provider sells services that allow data owners to upload their encrypted data and receive a trained NN model [18], [33], [35], [36], [38], [39]. For preserving data privacy, the trained model weights, biases and intermediate calculations as activation functions are encrypted.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In the context of NN there are two MLaaS variations; Training as a Service (TaaS) and Prediction as a Service (PaaS). In TaaS, a cloud provider sells services that allow data owners to upload their encrypted data and receive a trained NN model [18], [33], [35], [36], [38], [39]. For preserving data privacy, the trained model weights, biases and intermediate calculations as activation functions are encrypted.…”
Section: Related Workmentioning
confidence: 99%
“…Secure PaaS mechanisms that do not require recourse to clients, as in the case of [14], [30], typically work by using some form of alternative activation functions that can operate in encrypted form. A popular choice here is a quadratic activation function, f (x ) = x 2 , that can be evaluated using FHE multiplication properties as presented in [18], [37], [40]. However, the quadratic function results in accuracy loss [41].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations