CrypTFlow2: Practical 2-Party Secure Inference

10/13/2020
by   Deevashwer Rathee, et al.
0

We present CrypTFlow2, a cryptographic framework for secure inference over realistic Deep Neural Networks (DNNs) using secure 2-party computation. CrypTFlow2 protocols are both correct – i.e., their outputs are bitwise equivalent to the cleartext execution – and efficient – they outperform the state-of-the-art protocols in both latency and scale. At the core of CrypTFlow2, we have new 2PC protocols for secure comparison and division, designed carefully to balance round and communication complexity for secure inference tasks. Using CrypTFlow2, we present the first secure inference over ImageNet-scale DNNs like ResNet50 and DenseNet121. These DNNs are at least an order of magnitude larger than those considered in the prior work of 2-party DNN inference. Even on the benchmarks considered by prior work, CrypTFlow2 requires an order of magnitude less communication and 20x-30x less time than the state-of-the-art.

READ FULL TEXT
research
07/08/2019

QUOTIENT: Two-Party Secure Neural Network Training and Prediction

Recently, there has been a wealth of effort devoted to the design of sec...
research
05/10/2021

SIRNN: A Math Library for Secure RNN Inference

Complex machine learning (ML) inference algorithms like recurrent neural...
research
09/16/2019

CrypTFlow: Secure TensorFlow Inference

We present CrypTFlow, a first of its kind system that converts TensorFlo...
research
04/03/2019

SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search

We present new secure protocols for approximate k-nearest neighbor searc...
research
06/06/2023

Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding

Secure computation often benefits from the use of correlated randomness ...
research
04/19/2021

Vectorized Secure Evaluation of Decision Forests

As the demand for machine learning-based inference increases in tandem w...
research
02/23/2023

A Survey of Secure Computation Using Trusted Execution Environments

As an essential technology underpinning trusted computing, the trusted e...

Please sign up or login with your details

Forgot password? Click here to reset