2021 IEEE Symposium on Security and Privacy (SP) 2021
DOI: 10.1109/sp40001.2021.00086
|View full text |Cite
|
Sign up to set email alerts
|

SiRnn: A Math Library for Secure RNN Inference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
36
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 51 publications
(44 citation statements)
references
References 86 publications
1
36
0
Order By: Relevance
“…It is an interesting future work to construct concretely efficient FSSbased MPC protocols with optimal online communication and rounds for multiple parties (i.e., n ≥ 3). While prior work uses a uniform bitwidth for the whole ML inference, the recent work by Rathee et al [27] proposed the mixed bitwidths approach, i.e., operating in low bitwidths and going to high bitwidths only when necessary. They designed new protocols to switch between bitwidths and operations on values of differing bitwidths.…”
Section: Mpc Application To Machine Learningmentioning
confidence: 99%
See 2 more Smart Citations
“…It is an interesting future work to construct concretely efficient FSSbased MPC protocols with optimal online communication and rounds for multiple parties (i.e., n ≥ 3). While prior work uses a uniform bitwidth for the whole ML inference, the recent work by Rathee et al [27] proposed the mixed bitwidths approach, i.e., operating in low bitwidths and going to high bitwidths only when necessary. They designed new protocols to switch between bitwidths and operations on values of differing bitwidths.…”
Section: Mpc Application To Machine Learningmentioning
confidence: 99%
“…Their approach is interesting and able to obtain better efficiency. While the work [27] only considers private ML inference in the two-party setting, it is worth further developing the mixed bitwidths approach to private ML training and the multi-party setting.…”
Section: Mpc Application To Machine Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…Bakshi and Last propose CryptoRNN; it employs HE but requires interaction between the client and the server in order to refresh the ciphertexts [12]. Rathee et al propose SiRNN that relies on novel two-party computation (2PC) protocols and lookup tables, combined with an iterative algorithm, to approximate non-linear math functions [105]. Feng et al tackle privacy-preserving natural language processing [38] by relying on MPC.…”
Section: Privacy-preserving Prediction On Machine Learning Modelsmentioning
confidence: 99%
“…Further, inference algorithms that contain mathematical functions such as sigmoid and tanh are more expensive to compute securely; e.g. running a recurrent neural network (RNN) [26] on the standard Google-30 dataset [40] to identify commands, directions, and digits from speech costs 415 MB, ≈ 60,000 rounds, and ≈ 37 seconds [30].…”
Section: Introductionmentioning
confidence: 99%