Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model

被引:21
|
作者
Aliasgari, Mehrdad [1 ]
Blanton, Marina [2 ]
Bayatbabolghani, Fattaneh [2 ]
机构
[1] Calif State Univ Long Beach, Dept Comp Engn & Comp Sci, Long Beach, CA 90840 USA
[2] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
基金
美国国家科学基金会;
关键词
Secure computation; Floating point; Hidden Markov models; Gaussian mixture models;
D O I
10.1007/s10207-016-0350-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hidden Markov model (HMM) is a popular statistical tool with a large number of applications in pattern recognition. In some of these applications, such as speaker recognition, the computation involves personal data that can identify individuals and must be protected. We thus treat the problem of designing privacy-preserving techniques for HMM and companion Gaussian mixture model computation suitable for use in speaker recognition and other applications. We provide secure solutions for both two-party and multi-party computation models and both semi-honest and malicious settings. In the two-party setting, the server does not have access in the clear to either the user-based HMM or user input (i.e., current observations) and thus the computation is based on threshold homomorphic encryption, while the multi-party setting uses threshold linear secret sharing as the underlying data protection mechanism. All solutions use floating-point arithmetic, which allows us to achieve high accuracy and provable security guarantees, while maintaining reasonable performance. A substantial part of this work is dedicated to building secure protocols for floating-point operations in the two-party setting, which are of independent interest.
引用
收藏
页码:577 / 601
页数:25
相关论文
共 50 条
  • [1] Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model
    Mehrdad Aliasgari
    Marina Blanton
    Fattaneh Bayatbabolghani
    International Journal of Information Security, 2017, 16 : 577 - 601
  • [2] Secure multiparty computations in floating-point arithmetic
    Guo, Chuan
    Hannun, Awni
    Knott, Brian
    van der Maaten, Laurens
    Tygert, Mark
    Zhu, Ruiyu
    INFORMATION AND INFERENCE-A JOURNAL OF THE IMA, 2022, 11 (01) : 103 - 135
  • [3] Secure Computation of Hidden Markov Models
    Aliasgari, Mehrdad
    Blanton, Marina
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 242 - 253
  • [4] Secure Floating-Point Training
    Rathee, Deevashwer
    Bhattacharya, Anwesh
    Gupta, Divya
    Sharma, Rahul
    Song, Dawn
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6329 - 6346
  • [5] OPTIMIZING SECURE FLOATING-POINT ARITHMETIC: SUMS, DOT PRODUCTS, AND POLYNOMIALS
    Catrina, Octavian
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 21 - 28
  • [6] Efficient Secure Floating-point Arithmetic using Shamir Secret Sharing
    Catrina, Octavian
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 49 - 60
  • [7] Optimization and Tradeoffs in Secure Floating-Point Computation: Products, Powers, and Polynomials
    Catrina, Octavian
    PROCEEDINGS OF THE 6TH CONFERENCE ON THE ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS 2019), 2020,
  • [8] SECFLOAT: Accurate Floating-Point meets Secure 2-Party Computation
    Rathee, Deevashwer
    Bhattacharya, Anwesh
    Sharma, Rahul
    Gupta, Divya
    Chandran, Nishanth
    Rastogi, Aseem
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 576 - 595
  • [9] Efficient Secure Arithmetic on Floating Point Numbers
    Omori, Wakana
    Kanaoka, Akira
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 924 - 934
  • [10] MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
    Keller, Marcel
    Orsini, Emmanuela
    Scholl, Peter
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 830 - 842