We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: pMPL: A Robust Multi-Party Learning Framework with a Privileged Party

Abstract: In order to perform machine learning among multiple parties while protecting the privacy of raw data, privacy-preserving machine learning based on secure multi-party computation (MPL for short) has been a hot spot in recent. The configuration of MPL usually follows the peer-to-peer architecture, where each party has the same chance to reveal the output result. However, typical business scenarios often follow a hierarchical architecture where a powerful, usually privileged party, leads the tasks of machine learning. Only the privileged party can reveal the final model even if other assistant parties collude with each other. It is even required to avoid the abort of machine learning to ensure the scheduled deadlines and/or save used computing resources when part of assistant parties drop out.
Motivated by the above scenarios, we propose pMPL, a robust MPL framework with a privileged part}. pMPL supports three-party training in the semi-honest setting. By setting alternate shares for the privileged party, pMPL is robust to tolerate one of the rest two parties dropping out during the training. With the above settings, we design a series of efficient protocols based on vector space secret sharing for pMPL to bridge the gap between vector space secret sharing and machine learning. Finally, the experimental results show that the performance of pMPL is promising when we compare it with the state-of-the-art MPL frameworks. Especially, in the LAN setting, pMPL is around $16\times$ and $5\times$ faster than TF-encrypted (with ABY3 as the back-end framework) for the linear regression, and logistic regression, respectively. Besides, the accuracy of trained models of linear regression, logistic regression, and BP neural networks can reach around 97%, 99%, and 96% on MNIST dataset respectively.
Comments: This paper is the full version of a paper to appear in CCS 2022
Subjects: Cryptography and Security (cs.CR)
Journal reference: 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS'22)
DOI: 10.1145/3548606.3560697
Cite as: arXiv:2210.00486 [cs.CR]
  (or arXiv:2210.00486v4 [cs.CR] for this version)

Submission history

From: Lushan Song [view email]
[v1] Sun, 2 Oct 2022 11:13:14 GMT (223kb,D)
[v2] Tue, 4 Oct 2022 08:15:52 GMT (446kb,D)
[v3] Thu, 6 Oct 2022 12:32:13 GMT (446kb,D)
[v4] Wed, 16 Nov 2022 11:07:41 GMT (223kb,D)

Link back to: arXiv, form interface, contact.