We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Fusion: Efficient and Secure Inference Resilient to Malicious Servers

Abstract: In secure machine learning inference, most of the schemes assume that the server is semi-honest (honestly following the protocol but attempting to infer additional information). However, the server may be malicious (e.g., using a low-quality model or deviating from the protocol) in the real world. Although a few studies have considered a malicious server that deviates from the protocol, they ignore the verification of model accuracy (where the malicious server uses a low-quality model) meanwhile preserving the privacy of both the server's model and the client's inputs. To address these issues, we propose \textit{Fusion}, where the client mixes the public samples (which have known query results) with their own samples to be queried as the inputs of multi-party computation to jointly perform the secure inference. Since a server that uses a low-quality model or deviates from the protocol can only produce results that can be easily identified by the client, \textit{Fusion} forces the server to behave honestly, thereby addressing all those aforementioned issues without leveraging expensive cryptographic techniques. Our evaluation indicates that \textit{Fusion} is 48.06$\times$ faster and uses 30.90$\times$ less communication than the existing maliciously secure inference protocol (which currently does not support the verification of the model accuracy). In addition, to show the scalability, we conduct ImageNet-scale inference on the practical ResNet50 model and it costs 8.678 minutes and 10.117 GiB of communication in a WAN setting, which is 1.18$\times$ faster and has 2.64$\times$ less communication than those of the semi-honest protocol.
Comments: 19 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
DOI: 10.14722/ndss.2023.23199
Cite as: arXiv:2205.03040 [cs.CR]
  (or arXiv:2205.03040v5 [cs.CR] for this version)

Submission history

From: Caiqin Dong [view email]
[v1] Fri, 6 May 2022 06:42:48 GMT (319kb,D)
[v2] Thu, 2 Jun 2022 01:50:52 GMT (0kb,I)
[v3] Tue, 7 Jun 2022 02:03:48 GMT (622kb,D)
[v4] Sun, 30 Oct 2022 04:33:37 GMT (1336kb,D)
[v5] Sat, 10 Jun 2023 17:25:58 GMT (499kb,D)

Link back to: arXiv, form interface, contact.