Affiliation:
1. Princeton University & UC Berkeley
2. Microsoft Research
3. Algorand Foundation
4. Technion
5. Princeton University
Abstract
Abstract
We propose Falcon, an end-to-end 3-party protocol for efficient private training and inference of large machine learning models. Falcon presents four main advantages – (i) It is highly expressive with support for high capacity networks such as VGG16 (ii) it supports batch normalization which is important for training complex networks such as AlexNet (iii) Falcon guarantees security with abort against malicious adversaries, assuming an honest majority (iv) Lastly, Falcon presents new theoretical insights for protocol design that make it highly efficient and allow it to outperform existing secure deep learning solutions. Compared to prior art for private inference, we are about 8× faster than SecureNN (PETS’19) on average and comparable to ABY3 (CCS’18). We are about 16 − 200× more communication efficient than either of these. For private training, we are about 6× faster than SecureNN, 4.4× faster than ABY3 and about 2−60× more communication efficient. Our experiments in the WAN setting show that over large networks and datasets, compute operations dominate the overall latency of MPC, as opposed to the communication.
Reference56 articles.
1. [1] E. Bursztein, E. Clarke, M. DeLaune, D. M. Elifff, N. Hsu, L. Olson, J. Shehan, M. Thakur, K. Thomas, and T. Bright, “Rethinking the detection of child sexual abuse imagery on the internet,” in The World Wide Web Conference. ACM, 2019, pp. 2601–2607.
2. [2] “Child Abusers Run Rampant as Tech Companies Look the Other Way,” https://www.nytimes.com/interactive/2019/11/09/us/internet-child-sex-abuse.html, 2019.
3. [3] H. Cho, D. J. Wu, and B. Berger, “Secure genome-wide association analysis using multiparty computation,” in Nature biotechnology, vol. 36, no. 6, 2018, p. 547.
4. [4] P. Mohassel and Y. Zhang, “SecureML: A system for scalable privacy-preserving machine learning,” in IEEE Symposium on Security and Privacy (S&P), 2017.
5. [5] M. S. Riazi, C. Weinert, O. Tkachenko, E. M. Songhori, T. Schneider, and F. Koushanfar, “Chameleon: A hybrid secure computation framework for machine learning applications,” in ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2018.
Cited by
89 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献