Secure multiparty computations in floating-point arithmetic

01/09/2020
by   Chuan Guo, et al.
0

Secure multiparty computations enable the distribution of so-called shares of sensitive data to multiple parties such that the multiple parties can effectively process the data while being unable to glean much information about the data (at least not without collusion among all parties to put back together all the shares). Thus, the parties may conspire to send all their processed results to a trusted third party (perhaps the data provider) at the conclusion of the computations, with only the trusted third party being able to view the final results. Secure multiparty computations for privacy-preserving machine-learning turn out to be possible using solely standard floating-point arithmetic, at least with a carefully controlled leakage of information less than the loss of accuracy due to roundoff, all backed by rigorous mathematical proofs of worst-case bounds on information loss and numerical stability in finite-precision arithmetic. Numerical examples illustrate the high performance attained on commodity off-the-shelf hardware for generalized linear models, including ordinary linear least-squares regression, binary and multinomial logistic regression, probit regression, and Poisson regression.

READ FULL TEXT

page 8

page 9

research
10/02/2022

pMPL: A Robust Multi-Party Learning Framework with a Privileged Party

In order to perform machine learning among multiple parties while protec...
research
06/30/2023

Multigrid Methods using Block Floating Point Arithmetic

Block Floating Point (BFP) arithmetic is currently seeing a resurgence i...
research
09/20/2021

Solving systems of inequalities in two variables with floating point arithmetic

From a theoretical point of view, finding the solution set of a system o...
research
12/04/2018

Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation

In several settings of practical interest, two parties seek to collabora...
research
08/15/2023

A Floating-Point Secure Implementation of the Report Noisy Max with Gap Mechanism

The Noisy Max mechanism and its variations are fundamental private selec...
research
05/09/2020

Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development

The big data industry is facing new challenges as concerns about privacy...
research
07/21/2021

Secure Random Sampling in Differential Privacy

Differential privacy is among the most prominent techniques for preservi...

Please sign up or login with your details

Forgot password? Click here to reset