• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Bi, Renwan (Bi, Renwan.) [1] | Xiong, Jinbo (Xiong, Jinbo.) [2] | Luo, Changqing (Luo, Changqing.) [3] | Ning, Jianting (Ning, Jianting.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] (Scholars:刘西蒙) | Tian, Youliang (Tian, Youliang.) [6] | Zhang, Yan (Zhang, Yan.) [7]

Indexed by:

EI

Abstract:

Well-trained neural network models are deployed on edge servers to provide valuable inference services for clients. To protect data privacy, a promising way is to exploit various types of secret sharing to implement privacy-preserving neural network inference. However, existing schemes suffer high communication rounds and overhead, making them hardly practical. In this paper, we propose Cenia, a new communication-efficient privacy-preserving neural network inference model. Specifically, we exploit arithmetic secret sharing to develop low-interaction secure comparison protocols, that can be used to realize secure activation layers (e.g., ReLU) and secure pooling layers (e.g., max pooling) without expensive garbled circuit and oblivious transfer primitives. Besides, we also design secure exponent and division protocols to realize secure normalization layers (e.g., Sigmoid). Theoretical analysis demonstrates the security and low complexity of Cenia. Extensive experiments have also been conducted on benchmark datasets and classical models, and experimental results show that Cenia achieves privacy-preserving, accurate, and efficient neural network inference. Particularly, Cenia can achieve 37.5% and 60.76% of Sonic's communication rounds and overhead, respectively, compared to Sonic (i.e., the state-of-the-art scheme). 1556-6021 © 2024 IEEE.

Keyword:

Internet protocols Network security Neural networks Privacy-preserving techniques

Community:

  • [ 1 ] [Bi, Renwan]Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fuzhou; 350117, China
  • [ 2 ] [Bi, Renwan]Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an; 710071, China
  • [ 3 ] [Xiong, Jinbo]Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fuzhou; 350117, China
  • [ 4 ] [Xiong, Jinbo]Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an; 710071, China
  • [ 5 ] [Luo, Changqing]Virginia Commonwealth University, Department of Computer Science, Richmond; VA; 23284, United States
  • [ 6 ] [Ning, Jianting]Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fuzhou; 350117, China
  • [ 7 ] [Ning, Jianting]Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an; 710071, China
  • [ 8 ] [Liu, Ximeng]Fuzhou University, College of Computer and Data Science, Fuzhou; 350108, China
  • [ 9 ] [Tian, Youliang]Guizhou University, State Key Laboratory of Public Big Data, College of Big Data and Information Engineering, Guiyang; 550025, China
  • [ 10 ] [Zhang, Yan]University of Oslo, Department of Informatics, Oslo; 0316, Norway

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2024

Volume: 19

Page: 6722-6737

6 . 3 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Affiliated Colleges:

Online/Total:19/9910254
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1