Proceedings 2022 Network and Distributed System Security Symposium 2022
DOI: 10.14722/ndss.2022.24058
|View full text |Cite
|
Sign up to set email alerts
|

Tetrad: Actively Secure 4PC for Secure Training and Inference

Abstract: Mixing arithmetic and boolean circuits to perform privacy-preserving machine learning has become increasingly popular. Towards this, we propose a framework for the case of four parties with at most one active corruption called Tetrad.Tetrad works over rings and supports two levels of security, fairness and robustness. The fair multiplication protocol costs 5 ring elements, improving over the state-of-the-art Trident (Chaudhari et al. NDSS'20). A key feature of Tetrad is that robustness comes for free over fair… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 45 publications
0
17
0
Order By: Relevance
“…While there exists a plethora of such PPML techniques utilizing PETs (cf. §A.1), we resort to PPML training and inference using MPC techniques in HyFL (Mohassel & Zhang, 2017;Koti et al, 2022b). In particular, most of these works employ 2-4 MPC servers (Mohassel & Rindal, 2018;Byali et al, 2020;Koti et al, 2021;2022b), while recent works started focusing on more servers (Koti et al, 2022a).…”
Section: A13 Differential Privacy (Dp)mentioning
confidence: 99%
See 1 more Smart Citation
“…While there exists a plethora of such PPML techniques utilizing PETs (cf. §A.1), we resort to PPML training and inference using MPC techniques in HyFL (Mohassel & Zhang, 2017;Koti et al, 2022b). In particular, most of these works employ 2-4 MPC servers (Mohassel & Rindal, 2018;Byali et al, 2020;Koti et al, 2021;2022b), while recent works started focusing on more servers (Koti et al, 2022a).…”
Section: A13 Differential Privacy (Dp)mentioning
confidence: 99%
“…§A.1), we resort to PPML training and inference using MPC techniques in HyFL (Mohassel & Zhang, 2017;Koti et al, 2022b). In particular, most of these works employ 2-4 MPC servers (Mohassel & Rindal, 2018;Byali et al, 2020;Koti et al, 2021;2022b), while recent works started focusing on more servers (Koti et al, 2022a). We refer to Cabrero-Holgueras & Pastrana for an overview of various PPML approaches.…”
Section: A13 Differential Privacy (Dp)mentioning
confidence: 99%
“…In this case, the PPML protocols in the four-party setting have a better performance than those in the three-party setting, but require a stronger assumption about the number of honest parties. Among these PPML protocols achieving fairness or GOD, Tetrad [294] has the best efficiency for now. Particularly, Tetrad takes 183 s and 35 GB of communication to train a VGG-16 model over a small dataset CIFAR-10 that includes 50,000 training samples and 10 different classes.…”
Section: Mpc Application To Machine Learningmentioning
confidence: 99%
“…It is an interesting open problem to construct a concretely efficient edaBits protocol with malicious security, which achieves an overhead of 2 or even smaller. In the honest-majority setting, the protocols against malicious adversaries, which allow to convert between the arithmetic, Boolean, and garbling worlds, can be constructed more efficiently [19,294], where the techniques underlying the constant-round MPC protocols (e.g., [236,239]) can be used and adapted.…”
Section: Mpc Application To Machine Learningmentioning
confidence: 99%
“…These advancements significantly enhance the efficiency of MPC making it more and more practical for real-world applications. Due to the practical efficiency it can provide, various works [9,21,26,74,75,102] have recently concentrated on MPC for a small number of parties, especially in the three and four party honest majority setting tolerating one corruption. In RIPPLE, we employ MPC techniques across three servers to enable an anonymous communication channel (cf.…”
Section: Garbled Cuckoo Table (Gct)mentioning
confidence: 99%