Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model

被引:21
|
作者
Aliasgari, Mehrdad [1 ]
Blanton, Marina [2 ]
Bayatbabolghani, Fattaneh [2 ]
机构
[1] Calif State Univ Long Beach, Dept Comp Engn & Comp Sci, Long Beach, CA 90840 USA
[2] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
基金
美国国家科学基金会;
关键词
Secure computation; Floating point; Hidden Markov models; Gaussian mixture models;
D O I
10.1007/s10207-016-0350-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hidden Markov model (HMM) is a popular statistical tool with a large number of applications in pattern recognition. In some of these applications, such as speaker recognition, the computation involves personal data that can identify individuals and must be protected. We thus treat the problem of designing privacy-preserving techniques for HMM and companion Gaussian mixture model computation suitable for use in speaker recognition and other applications. We provide secure solutions for both two-party and multi-party computation models and both semi-honest and malicious settings. In the two-party setting, the server does not have access in the clear to either the user-based HMM or user input (i.e., current observations) and thus the computation is based on threshold homomorphic encryption, while the multi-party setting uses threshold linear secret sharing as the underlying data protection mechanism. All solutions use floating-point arithmetic, which allows us to achieve high accuracy and provable security guarantees, while maintaining reasonable performance. A substantial part of this work is dedicated to building secure protocols for floating-point operations in the two-party setting, which are of independent interest.
引用
收藏
页码:577 / 601
页数:25
相关论文
共 50 条
  • [21] ROUNDINGS IN FLOATING-POINT ARITHMETIC
    YOHE, JM
    IEEE TRANSACTIONS ON COMPUTERS, 1973, C 22 (06) : 577 - 586
  • [22] Hammering Floating-Point Arithmetic
    Torstensson, Olle
    Weber, Tjark
    FRONTIERS OF COMBINING SYSTEMS, FROCOS 2023, 2023, 14279 : 217 - 235
  • [23] FLOATING-POINT ARITHMETIC IN COBOL
    KESNER, O
    COMMUNICATIONS OF THE ACM, 1962, 5 (05) : 269 - 271
  • [24] Secure floating point arithmetic and private satellite collision analysis
    Liina Kamm
    Jan Willemson
    International Journal of Information Security, 2015, 14 : 531 - 548
  • [25] A SIMPLE BUT REALISTIC MODEL OF FLOATING-POINT COMPUTATION
    BROWN, WS
    ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE, 1981, 7 (04): : 445 - 480
  • [26] Secure floating point arithmetic and private satellite collision analysis
    Kamm, Liina
    Willemson, Jan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (06) : 531 - 548
  • [28] Correct Probabilistic Model Checking with Floating-Point Arithmetic
    Hartmanns, Arnd
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2022, PT II, 2022, 13244 : 41 - 59
  • [29] Enabling In-Network Floating-Point Arithmetic for Efficient Computation Offloading
    Cui, Penglai
    Pan, Heng
    Li, Zhenyu
    Zhang, Penghao
    Miao, Tianhao
    Zhou, Jianer
    Guan, Hongtao
    Xie, Gaogang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (12) : 4918 - 4934
  • [30] Taylor models and floating-point arithmetic: proof that arithmetic operations are validated in COSY
    Revol, N
    Makino, K
    Berz, A
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2005, 64 (01): : 135 - 154