Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning

10/05/2022
by   Lijing Zhou, et al.
0

The overhead of non-linear functions dominates the performance of the secure multiparty computation (MPC) based privacy-preserving machine learning (PPML). This work introduces two sets of novel secure three-party computation (3PC) protocols, using additive and replicated secret sharing schemes respectively. We name the whole family of protocols as Bicoptor, its basis is a new sign determination protocol, which relies on a clever use of the truncation protocol proposed in SecureML (S P 2017). Our 3PC sign determination protocol only requires two communication rounds, and does not involve any preprocessing. Such sign determination protocol is well-suited for computing non-linear functions in PPML, e.g. the activation function ReLU, Maxpool, and their variants. We develop suitable protocols for these non-linear functions, which form a family of GPU-friendly protocols, Bicoptor. All Bicoptor protocols only require two communication rounds without preprocessing. We evaluate the protocols using additive secret sharing under a 3-party LAN network over a public cloud, and achieve 90,000 DReLU/ReLU or 3,200 Maxpool (find the maximum value of nine inputs) operations per second. Under the same settings and environment, our ReLU protocol has a one or even two order(s) of magnitude improvement to the state-of-the-art works, Edabits (CRYPTO 2020) or Falcon (PETS 2021), respectively without batch processing.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/11/2020

Efficient Privacy-Preserving Computation Based on Additive Secret Sharing

The emergence of cloud computing provides a new computing paradigm for u...
research
04/22/2021

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU

We introduce CryptGPU, a system for privacy-preserving machine learning ...
research
02/13/2022

Highly Scalable Beaver Triple Generator from Additive-only Homomorphic Encryption

In a convolution neural network, a composition of linear scalar product,...
research
01/28/2021

S++: A Fast and Deployable Secure-Computation Framework for Privacy-Preserving Neural Network Training

We introduce S++, a simple, robust, and deployable framework for trainin...
research
09/10/2023

Bicoptor 2.0: Addressing Challenges in Probabilistic Truncation for Enhanced Privacy-Preserving Machine Learning

This paper primarily focuses on analyzing the problems and proposing sol...
research
08/19/2023

East: Efficient and Accurate Secure Transformer Framework for Inference

Transformer has been successfully used in practical applications, such a...
research
09/28/2020

Secure Computation on Additive Shares

The rapid development of cloud computing has probably benefited each of ...

Please sign up or login with your details

Forgot password? Click here to reset