Experimenting with Zero-Knowledge Proofs of Training

被引:0
|
作者
Garg, Sanjam [1 ]
Goel, Aarushi [2 ]
Jha, Somesh [3 ]
Mahloujifar, Saeed [4 ]
Mahmoody, Mohammad [5 ]
Policharla, Guru-Vamsi [1 ]
Wang, Mingyuan [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] NTT Res, Palo Alto, CA USA
[3] Univ Wisconsin, Madison, WI 53706 USA
[4] Meta AI, New York, NY USA
[5] Univ Virginia, Charlottesville, VA 22903 USA
基金
美国国家科学基金会;
关键词
Proofs of training; zero-knowledge; logistic regression; SNARK; MPC-in-the-Head;
D O I
10.1145/3576915.3623202
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
How can a model owner prove they trained their model according to the correct specification? More importantly, how can they do so while preserving the privacy of the underlying dataset and the final model? We study this problem and formulate the notion of zero-knowledge proof of training (zkPoT), which formalizes rigorous security guarantees that should be achieved by a privacy-preserving proof of training. While it is theoretically possible to design zkPoT for any model using generic zero-knowledge proof systems, this approach results in extremely unpractical proof generation times. Towards designing a practical solution, we propose the idea of combining techniques from MPC-in-the-head and zkSNARKs literature to strike an appropriate trade-off between proof size and proof computation time. We instantiate this idea and propose a concretely efficient, novel zkPoT protocol for logistic regression. Crucially, our protocol is streaming-friendly and does not require RAM proportional to the size of the training circuit, hence, can be done without special hardware. We expect the techniques developed in this paper to also generally be useful for designing efficient zkPoT protocols for other, more sophisticated, ML models. We implemented and benchmarked prover/verifier running times and proof sizes for training a logistic regression model using mini-batch gradient descent on a 4 GB dataset of 262,144 records with 1024 features. We divide our protocol into three phases: (1) data-independent offline phase (2) data-dependent phase that is independent of the model (3) online phase that depends both on the data and the model. The total proof size (across all three phases) is less than 10% of the data set size (< 350 MB). In the online phase, the prover and verifier times are under 10 minutes and half a minute respectively, whereas in the data-dependent phase, they are close to one hour and a few seconds respectively.
引用
收藏
页码:1880 / 1894
页数:15
相关论文
共 50 条
  • [1] ZERO-KNOWLEDGE PROOFS
    MCGEOCH, CC
    [J]. AMERICAN MATHEMATICAL MONTHLY, 1993, 100 (07): : 682 - 685
  • [2] ZERO-KNOWLEDGE PROOFS
    WAYNER, P
    [J]. BYTE, 1987, 12 (11): : 149 - 152
  • [3] Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets
    Ozdemir, Alex
    Boneh, Dan
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 4291 - 4308
  • [4] ON THE KNOWLEDGE TIGHTNESS OF ZERO-KNOWLEDGE PROOFS
    ITOH, T
    KAWAKUBO, A
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1994, E77A (01) : 47 - 55
  • [5] Zero-knowledge proofs of retrievability
    Yan Zhu
    HuaiXi Wang
    ZeXing Hu
    Gail-Joon Ahn
    HongXin Hu
    [J]. Science China Information Sciences, 2011, 54 : 1608 - 1617
  • [6] Zero-knowledge proofs of retrievability
    Zhu Yan
    Wang HuaiXi
    Hu ZeXing
    Ahn, Gail-Joon
    Hu HongXin
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) : 1608 - 1617
  • [7] Unifying Zero-Knowledge Proofs of Knowledge
    Maurer, Ueli
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 272 - 286
  • [8] Zero-knowledge proofs of identity
    Feige, Uriel
    Fiat, Amos
    Shamir, Adi
    [J]. Journal of Cryptology, 1988, 1 (02) : 77 - 94
  • [9] Zero-knowledge proofs of retrievability
    AHN Gail-Joon
    [J]. Science China(Information Sciences), 2011, 54 (08) : 1608 - 1617
  • [10] A Survey on Zero-Knowledge Proofs
    Feng, Li
    McMillin, Bruce
    [J]. ADVANCES IN COMPUTERS, VOL 94, 2014, 94 : 25 - 69