[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2022/826

Pika: Secure Computation using Function Secret Sharing over Rings

Sameer Wagh, University of California, Berkeley
Abstract

Machine learning algorithms crucially depend on non-linear mathematical functions such as division (for normalization), exponentiation (for softmax and sigmoid), tanh (as an activation function), logarithm (for cross-entropy loss), and square root (for back-propagation of normalization layers). However, when machine learning is performed over secure computation, these protocols incur a large communication overhead and high round complexity. In this work, we propose new multi-party computation (MPC) protocols for such functions. Our protocols achieve constant round complexity (3 for semi-honest, 4 for malicious), an order of magnitude lower communication (54-121x lower than prior art), and high concrete efficiency (2-1163x faster runtime). We rely on recent advances in function secret sharing (FSS) to construct these protocols. Our contributions can be summarized as follows: (1) A constant round protocol to securely evaluate non-linear functions such as division, exponentiation, logarithm, and tanh (in comparison to prior art which uses round complexity proportional to the rounds of iterative methods/required precision) with high accuracy. This construction largely follows prior work in look-up style secure computation. (2) Our main contribution is the extension of the above protocol to be secure in the presence of malicious adversaries in the honest majority setting. We provide a malicious sketching protocol for FSS schemes that works over rings and in order to prove its security, we extend (and prove) a corresponding form of Schwartz-Zippel lemma over rings. This is the first such extension of the lemma and it can be of independent interest in other domains of secure computation. (3) We implement our protocol and showcase order of magnitude improvements in runtime and communication. Given the low round complexity and substantially lower communication, our protocols achieve even better performance over network constrained environments such as WAN. Finally, we showcase how such functions can lead to scalability in machine learning. Note that techniques presented are applicable beyond the application of machine learning as the protocols effectively present an efficient 1-out-of-N oblivious transfer or an efficient private information retrieval protocol.

Note: Minor title case edits and publication details added

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Privacy Enhancing Techologies Symposium
Keywords
Multi-party computation Function Secret Sharing Distributed Point Function Schwartz Zippel Lemma Rings
Contact author(s)
swagh @ alumni princeton edu
History
2022-07-05: revised
2022-06-23: received
See all versions
Short URL
https://ia.cr/2022/826
License
Creative Commons Attribution-NonCommercial-NoDerivs
CC BY-NC-ND

BibTeX

@misc{cryptoeprint:2022/826,
      author = {Sameer Wagh},
      title = {Pika: Secure Computation using Function Secret Sharing over Rings},
      howpublished = {Cryptology {ePrint} Archive, Paper 2022/826},
      year = {2022},
      url = {https://eprint.iacr.org/2022/826}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.