BLAZE: BLAZING FAST PRIVACY-PRESERVING MACHINE LEARNING ARPITA PATRA AND AJITH SURESH Ajith Suresh CrIS Lab, IISc https://www.csa.iisc.ac.in/~cris
Outline q Secure Multi-party Computation (MPC) q MPC for small number of parties (3PC) q Our Efficient BLAZE Protocol (Results) q Privacy Preserving Machine Learning (PPML) AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Secure Multi-party Computation (MPC) [Yao’82] ü A set of parties with private inputs wish to compute some joint function of their inputs. ü Goals of MPC: Correctness – Parties should correctly evaluate the function § output. Privacy – Nothing more than the function output should be § revealed AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Secure Multi-party Computation (MPC) [Yao’82] ü A set of parties with private inputs wish to compute some joint function of their inputs. ü Goals of MPC: Correctness – Parties should correctly evaluate the function § Trusted output. Third Party Privacy – Nothing more than the function output should be § revealed AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Secure Multi-party Computation (MPC) [Yao’82] ü A set of parties with private inputs wish to compute some joint function of their inputs. ü Goals of MPC: Correctness – Parties should correctly evaluate the function § Trusted output. Third Party Privacy – Nothing more than the function output should be § revealed AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Secure Multi-party Computation (MPC) [Yao’82] ü A set of parties with private inputs wish to compute some joint function of their inputs. ü Goals of MPC: Correctness – Parties should correctly evaluate the function § MPC output. Privacy – Nothing more than the function output should be § revealed AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Secure Multi-party Computation (MPC) [Yao’82] ADVERSARY • Semi – honest: • Follows the protocol but tries to learn more MPC • Malicious: • Can arbitrarily deviate from the protocol AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Secure Multi-party Computation (MPC) [Yao’82] ADVERSARY • Semi – honest: • Follows the protocol but tries to learn more MPC • Malicious: • Can arbitrarily deviate from the protocol Malicious Corruption AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] Ø Our focus: MPC with 3 parties AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] Ø Our focus: MPC with 3 parties Ø Corruption : honest majority AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] Ø Our focus: MPC with 3 parties Ø Corruption : honest majority q Majority of the parties are honest q 3PC – at most 1 corruption AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] Ø Our focus: MPC with 3 parties Ø Corruption : honest majority Ø Outsourced Computation AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] Ø Our focus: MPC with 3 parties Ø Corruption : honest majority Ø Outsourced Computation Ø Pre-processing Model AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] Ø Our focus: MPC with 3 parties Ø Corruption : honest majority Ø Outsourced Computation Ø Pre-processing Model Pre-processing phase § AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] Ø Our focus: MPC with 3 parties Ø Corruption : honest majority Ø Outsourced Computation Ø Pre-processing Model Pre-processing phase § q Data-independent Computation q Relatively slow and expensive AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] Ø Our focus: MPC with 3 parties Ø Corruption : honest majority Ø Outsourced Computation Ø Pre-processing Model Pre-processing phase § Online Phase § AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC for small number of parties Ø Efficiency and Simplicity [MRZ15,AFLNO16,FLNW17,CGMV17] Ø Our focus: MPC with 3 parties Ø Corruption : honest majority Ø Outsourced Computation Ø Pre-processing Model Pre-processing phase § q Minimized communication Online Phase § q Blazing fast AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE PROTOCOL AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol S 0 S 1 S 2 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol S 0 S 1 S 2 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol S 0 S 1 S 2 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol S 0 S 1 S 2 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol S 0 S 1 S 2 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol S 0 S 1 S 2 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol Communication Cost per !"#$: &. ( Multiplication Gate (malicious) BLAZE : https://eprint.iacr.org/2020/042 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 12 9 Abort Communication Cost per !"#$: &. ( Multiplication Gate (malicious) BLAZE : https://eprint.iacr.org/2020/042 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 12 9 Abort ASTRA 21 4 Fair Communication Cost per !"#$: &. ( Multiplication Gate (malicious) BLAZE : https://eprint.iacr.org/2020/042 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 12 9 Abort ASTRA 21 4 Fair Boneh et al’19 0 3 Abort Communication Cost per !"#$: &. ( Multiplication Gate (malicious) BLAZE : https://eprint.iacr.org/2020/042 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
BLAZE Protocol Pre-processing Online Ref Security (#elements) (#elements) Araki et al’17 12 9 Abort ASTRA 21 4 Fair Boneh et al’19 0 3 Abort BLAZE 3 3 Fair Communication Cost per !"#$: &. ( Multiplication Gate (malicious) BLAZE : https://eprint.iacr.org/2020/042 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Privacy Preserving Machine Learning (PPML) Model Query Parameters Result ML Algorithm Alice Bob (Model Owner) (Client) Privacy ?? AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Privacy Preserving Machine Learning (PPML) Model Query Parameters Result ML Algorithm Alice Bob (Model Owner) (Client) Query AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Privacy Preserving Machine Learning (PPML) Model Query Parameters Result ML Algorithm Alice Bob (Model Owner) (Client) Model Parameters AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Solution ?? MPC ML AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MPC MEETS ML AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Privacy Preserving Machine Learning (PPML) Model Query MPC Parameters Result ML Algorithm Alice Bob (Model Owner) (Client) Use MPC to achieve privacy AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
MLaaS (3PC Servers) Query Model Parameters Result Alice Bob (Model Owner) (Client) SECURE OUTSOURCED SETTING (SOC) 26-02-2020 AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC
Logistic Regression Neural Networks Linear Regression ML ALGORITHMS CONSIDERED AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
PPML using MPC: Hurdles to Clear Secure Dot Product AJITH SURESH | CRYPTOGRAPHY AND INFORMATION SECURITY LAB ,CSA, IISC 26-02-2020
Recommend
More recommend