Design method of secure computing protocol for deep neural network

Aiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function...

Full description

Saved in:
Bibliographic Details
Main Authors: Renwan BI, Qianxin CHEN, Jinbo XIONG, Ximeng LIU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2020-08-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020050
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529943055400960
author Renwan BI
Qianxin CHEN
Jinbo XIONG
Ximeng LIU
author_facet Renwan BI
Qianxin CHEN
Jinbo XIONG
Ximeng LIU
author_sort Renwan BI
collection DOAJ
description Aiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function cannot be split directly,a set of basic conversion protocols were proposed to realize the secure conversion of additive and multiplicative shares.After a few invokes,the power,comparison,exponential,logarithm,division and other low-level functions can be calculated securely.Due to the characteristics of data transfer and computation,the proposed protocols can be extended to array computation.Theoretical analysis ensures the correctness,efficiency and security of these protocols.The experimental results show that the error of these protocols is negligible,and the computational costs and communication overhead are better than the existing schemes.
format Article
id doaj-art-1aa39e70518e4ee2b57e298bf999f9ab
institution Kabale University
issn 2096-109X
language English
publishDate 2020-08-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-1aa39e70518e4ee2b57e298bf999f9ab2025-01-15T03:14:18ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2020-08-01613013959560444Design method of secure computing protocol for deep neural networkRenwan BIQianxin CHENJinbo XIONGXimeng LIUAiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function cannot be split directly,a set of basic conversion protocols were proposed to realize the secure conversion of additive and multiplicative shares.After a few invokes,the power,comparison,exponential,logarithm,division and other low-level functions can be calculated securely.Due to the characteristics of data transfer and computation,the proposed protocols can be extended to array computation.Theoretical analysis ensures the correctness,efficiency and security of these protocols.The experimental results show that the error of these protocols is negligible,and the computational costs and communication overhead are better than the existing schemes.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020050deep neural networkadditive secret sharingsecure computing protocoladd-multiply transformationarray unit
spellingShingle Renwan BI
Qianxin CHEN
Jinbo XIONG
Ximeng LIU
Design method of secure computing protocol for deep neural network
网络与信息安全学报
deep neural network
additive secret sharing
secure computing protocol
add-multiply transformation
array unit
title Design method of secure computing protocol for deep neural network
title_full Design method of secure computing protocol for deep neural network
title_fullStr Design method of secure computing protocol for deep neural network
title_full_unstemmed Design method of secure computing protocol for deep neural network
title_short Design method of secure computing protocol for deep neural network
title_sort design method of secure computing protocol for deep neural network
topic deep neural network
additive secret sharing
secure computing protocol
add-multiply transformation
array unit
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020050
work_keys_str_mv AT renwanbi designmethodofsecurecomputingprotocolfordeepneuralnetwork
AT qianxinchen designmethodofsecurecomputingprotocolfordeepneuralnetwork
AT jinboxiong designmethodofsecurecomputingprotocolfordeepneuralnetwork
AT ximengliu designmethodofsecurecomputingprotocolfordeepneuralnetwork