2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00092
|View full text |Cite
|
Sign up to set email alerts
|

CrypTFlow: Secure TensorFlow Inference

Abstract: We present CRYPTFLOW, a first of its kind system that converts TensorFlow inference code into Secure Multi-party Computation (MPC) protocols at the push of a button. To do this, we build three components. Our first component, Athos, is an end-to-end compiler from TensorFlow to a variety of semihonest MPC protocols. The second component, Porthos, is an improved semi-honest 3-party protocol that provides significant speedups for TensorFlow like applications. Finally, to provide malicious secure MPC protocols, ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
149
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 148 publications
(157 citation statements)
references
References 58 publications
0
149
0
1
Order By: Relevance
“…The MPC protocols for text classification with CNNs that we use in this paper, are very similar to existing MPC protocols for image classification with CNNs (Agrawal et al, 2019;Dalskov et al, 2020;Juvekar et al, 2018;Kumar et al, 2020;Mishra et al, 2020). The main distinguishing aspect is that image classification is based on 2-dimensional (2D) CNNs, while for text classification it is common to use 1-dimensional (1D) CNNs in which the filters move in only one direction.…”
Section: Introductionmentioning
confidence: 72%
“…The MPC protocols for text classification with CNNs that we use in this paper, are very similar to existing MPC protocols for image classification with CNNs (Agrawal et al, 2019;Dalskov et al, 2020;Juvekar et al, 2018;Kumar et al, 2020;Mishra et al, 2020). The main distinguishing aspect is that image classification is based on 2-dimensional (2D) CNNs, while for text classification it is common to use 1-dimensional (1D) CNNs in which the filters move in only one direction.…”
Section: Introductionmentioning
confidence: 72%
“…Furthermore, GALA's deep optimization of the HE-based linear computation can be integrated as a plug-and-play module into these systems to further improve their overall efficiency. For example, GALA can serve as a computing module in the privacy-preserved DL platforms, MP2ML [12] and CrypTFlow [41], which are compatible with the user-friendly TensorFlow [6] DL framework. Our experiments show that GALA achieves a significant speedup up to 700× for the dot product and 14× for the convolution computation under various data dimensions.…”
Section: At the Same Time CImentioning
confidence: 99%
“…In addition, Differential Privacy (DP) [60], [7], [53] and Secure Enclave (SE) [45], [51], [10], [75] are also explored to protect data security and privacy in neural networks. In order to deal with different properties of linearity (weighted sum and convolution functions) and nonlinearity (activation and pooling functions) in neural network computations, several efforts have been made to orchestrate multiple cryptographic techniques to achieve better performance [74], [43], [38], [48], [56], [44], [76], [18], [73], [47], [71], [16], [12], [41], [54], [46]. Among them, the schemes with HE-based linear computations and GC-based nonlinear computations (called the HE-GC neural network framework hereafter) demonstrate superior performance [43], [38], [44], [46].…”
Section: Introductionmentioning
confidence: 99%
“…It is worth mentioning that, malicious adversary model [40] is a stronger threat model where the adversary is able to launch an attack actively to break secure multiparty computation (MPC) protocols. Although there are some general techniques [40], [41] to convert any semi-honest secure MPC protocol into a secure MPC protocol against malicious attacks, these methods introduce a large amount of overhead or the trusted computing base. Designing tailored MPC protocols under the malicious adversary model for the double cloud auctions is an interesting research direction, and we leave this as future work.…”
Section: B Threat Model and Design Goalsmentioning
confidence: 99%