Privacy-Preserving Verifiable CNNs

被引:0
|
作者
Attrapadung, Nuttapong [1 ]
Hanaoaka, Goichiro [1 ]
Hiromasa, Ryo [2 ]
Koseki, Yoshihiro [2 ]
Matsuda, Takahiro [1 ]
Nishida, Yutaro [2 ]
Sakai, Yusuke [1 ]
Schuldt, Jacob C. N. [1 ]
Yasuda, Satoshi [2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
[2] Mitsubishi Elect, Kamakura, Kanagawa, Japan
关键词
MULTIPARTY COMPUTATION;
D O I
10.1007/978-3-031-54773-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Convolutional neural networks (CNNs) have emerged as one of the most successful deep learning approaches to image recognition and classification. A recent line of research, which includes zkCNN (ACM CCS '21), vCNN (Cryptology ePrint Archive), and ZEN (Cryptology ePrint Archive), aims at protecting the privacy of CNN models by developing publicly verifiable proofs of correct classification which do not leak any information about the underlying CNN models themselves. A shared feature of these schemes is that they require the entity constructing the proof to have access to both the model and the input in the clear. In other words, a client holding a potentially sensitive input is required to reveal this input to the entity holding the CNN model, thereby sacrificing his privacy, to be able to obtain a verifiable proof of correct classification. This is in contrast to the security guarantees provided by secure classification considered in privacy-preserving machine learning, which does not require the client to reveal his input to obtain a (non-verifiable) classification. In this paper, we propose a privacy-preserving verifiable CNN scheme that overcomes this limitation of the previous schemes by allowing the client to obtain a classification proof without having to reveal his input. The obtained proof allows the client to selectively reveal properties of the obtained classification and his input, which will be verifiable to any third-party verifier. Our scheme is based on the recent notion of collaborative zk-SNARKs by Ozdemir and Boneh (USENIX '22). Specifically, we construct a new collaborative zk-SNARK based on Bulletproofs achieving an efficient maliciously secure proof generation protocol. Based on this, we then present an optimized approach to CNN evaluation. Finally, we demonstrate the feasibility of our approach by measuring the performance of our scheme on a CNN for classifying the MNIST dataset.
引用
收藏
页码:373 / 402
页数:30
相关论文
共 50 条
  • [1] Privacy-Preserving Publicly Verifiable Databases
    Wang, Qiang
    Zhou, Fucai
    Zhou, Boyang
    Xu, Jian
    Chen, Chunyu
    Wang, Qi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1639 - 1654
  • [2] Privacy-Preserving and Verifiable Data Aggregation
    Tran, Hieu N.
    Deng, Robert H.
    Pang, HweeHwa
    [J]. PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 115 - 122
  • [3] A Note on Verifiable Privacy-Preserving Tries
    Kissel, Zachary A.
    Wang, Jie
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 942 - 943
  • [4] Privacy-preserving Revocation of Verifiable Credentials with Verifiable Random Functions
    Papathanasiou, Athanasia Maria
    Polyzos, George C.
    [J]. 38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 391 - 394
  • [5] Verifiable Privacy-Preserving Data Aggregation Protocols
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Sakai, Yusuke
    Kitagawa, Fuyuki
    Kawai, Yutaka
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 183 - 194
  • [6] Privacy-Preserving and Publicly Verifiable Matrix Multiplication
    Liu, Jing
    Zhang, Liang Feng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2059 - 2071
  • [7] Practical Verifiable & Privacy-Preserving Double Auctions
    Zahedani, Armin Memar
    Vos, Jelle
    Erkin, Zekeriya
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [8] A Privacy-Preserving and Verifiable Federated Learning Scheme
    Zhang, Xianglong
    Fu, Anmin
    Wang, Huaqun
    Zhou, Chunyi
    Chen, Zhenzhu
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [9] Publicly Verifiable Privacy-Preserving Group Decryption
    Qin, Bo
    Wu, Qianhong
    Susilo, Willy
    Mu, Yi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 72 - +
  • [10] PVFL: Verifiable federated learning and prediction with privacy-preserving
    Yin, Benxin
    Zhang, Hanlin
    Lin, Jie
    Kong, Fanyu
    Yu, Leyun
    [J]. COMPUTERS & SECURITY, 2024, 139