FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing

. This Paper proposes FssNN, a communication-efficient secure two-party computation framework for evaluating privacy-preserving neural network via function secret sharing (FSS) in semi-honest adversary setting. In FssNN, two parties with input data in secret sharing form perform secure linear computations using additive secret haring and non-linear computations using FSS, and obtain secret shares of model parameters without disclosing their input data. To decrease communication cost, we split the protocol into online and offline phases where input-independent correlated randomness is generated in offline phase while only lightweight “non-cryptographic” computations are executed in online phase. Specifically, we propose BitXA to reduce online communication in linear computation, DCF to reduce key size of the FSS scheme used in offline phase for nonlinear computation. To further support neural network training, we enlarge the input size of neural network to 2 32 via “MPC-friendly” PRG. We implement the framework in Python and evaluate the end-to-end system for private training between two parties on standard neural networks. FssNN achieves on MNIST dataset an accuracy of 98.0%, with communication cost of 27 . 52GB and runtime of 0 . 23h per epoch in the LAN settings. That shows our work advances the state-of-the-art secure computation protocol for neural networks

[1]  Nishanth Chandran,et al.  LLAMA: A Low Latency Math Library for Secure Inference , 2022, IACR Cryptol. ePrint Arch..

[2]  Sameer Wagh Pika: Secure Computation using Function Secret Sharing over Rings , 2022, IACR Cryptol. ePrint Arch..

[3]  Aseem Rastogi,et al.  SiRnn: A Math Library for Secure RNN Inference , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[4]  F. Bach,et al.  AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing , 2020, Proc. Priv. Enhancing Technol..

[5]  Yuval Ishai,et al.  Secure Computation with Preprocessing via Function Secret Sharing , 2019, IACR Cryptol. ePrint Arch..

[6]  Matt J. Kusner,et al.  QUOTIENT: Two-Party Secure Neural Network Training and Prediction , 2019, CCS.

[7]  Sameer Wagh,et al.  SecureNN: 3-Party Secure Computation for Neural Network Training , 2019, Proc. Priv. Enhancing Technol..

[8]  Daniel Rueckert,et al.  A generic framework for privacy preserving deep learning , 2018, ArXiv.

[9]  Abhi Shelat,et al.  Scaling ORAM for Secure Computation , 2017, IACR Cryptol. ePrint Arch..

[10]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[11]  Yuval Ishai,et al.  Function Secret Sharing: Improvements and Extensions , 2016, CCS.

[12]  Yuval Ishai,et al.  Function Secret Sharing , 2015, EUROCRYPT.

[13]  Ivan Damgård,et al.  Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[14]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[15]  Donald Beaver,et al.  Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.

[16]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[17]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[18]  Zhicong Huang,et al.  Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference , 2022, IACR Cryptol. ePrint Arch..

[19]  Yuval Ishai,et al.  MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications , 2021, IACR Cryptol. ePrint Arch..

[20]  Mariana Raykova,et al.  Secure Poisson Regression , 2021, IACR Cryptol. ePrint Arch..

[21]  Yuval Ishai,et al.  Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation , 2020, IACR Cryptol. ePrint Arch..

[22]  Arpita Patra,et al.  ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation , 2020, IACR Cryptol. ePrint Arch..

[23]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.