ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction

12/05/2019
by   Harsh Chaudhari, et al.
0

The concrete efficiency of secure computation has been the focus of many recent works. In this work, we present concretely-efficient protocols for secure 3-party computation (3PC) over a ring of integers modulo 2^ℓ tolerating one corruption, both with semi-honest and malicious security. Owing to the fact that computation over ring emulates computation over the real-world system architectures, secure computation over ring has gained momentum of late. Cast in the offline-online paradigm, our constructions present the most efficient online phase in concrete terms. In the semi-honest setting, our protocol requires communication of 2 ring elements per multiplication gate during the online phase, attaining a per-party cost of less than one element. This is achieved for the first time in the regime of 3PC. In the malicious setting, our protocol requires communication of 4 elements per multiplication gate during the online phase, beating the state-of-the-art protocol by 5 elements. Realized with both the security notions of selective abort and fairness, the malicious protocol with fairness involves slightly more communication than its counterpart with abort security for the output gates alone. We apply our techniques from 3PC in the regime of secure server-aided machine-learning (ML) inference for a range of prediction functions– linear regression, linear SVM regression, logistic regression, and linear SVM classification. Our setting considers a model-owner with trained model parameters and a client with a query, with the latter willing to learn the prediction of her query based on the model parameters of the former. The inputs and computation are outsourced to a set of three non-colluding servers. Our constructions catering to both semi-honest and the malicious world, invariably perform better than the existing constructions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/08/2022

Communication Efficient Semi-Honest Three-Party Secure Multiparty Computation with an Honest Majority

In this work, we propose a novel protocol for secure three-party computa...
research
09/15/2021

MPC-Friendly Commitments for Publicly Verifiable Covert Security

We address the problem of efficiently verifying a commitment in a two-pa...
research
10/16/2022

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder

In this paper, we present VerifyML, the first secure inference framework...
research
06/06/2023

Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding

Secure computation often benefits from the use of correlated randomness ...
research
04/06/2020

BLAZE: Blazing Fast Privacy-Preserving Machine Learning

Machine learning tools have illustrated their potential in many signific...
research
07/11/2022

SIMC 2.0: Improved Secure ML Inference Against Malicious Clients

In this paper, we study the problem of secure ML inference against a mal...
research
05/29/2020

SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning

Performing ML computation on private data while maintaining data privacy...

Please sign up or login with your details

Forgot password? Click here to reset