Skip to main content

TFHE Parameter Setup for Effective and Error-Free Neural Network Prediction on Encrypted Data

  • Conference paper
  • First Online:
Intelligent Computing

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 285))

  • 1683 Accesses

Abstract

With the rise of Cloud and Big Data technologies, Machine Learning as a Service (MLaaS) receives much attention, too. However, in some sense, the current situation resembles the era of wild digitalization, where security was pushed to the sideline. Back then, the problem was mostly about misunderstanding of severe consequences that insecure digitalization might bring. To date, common awareness of security has improved significantly, however, currently we are facing rather a technological challenge. Indeed, we are still missing a competitive and satisfactory solution that would secure MLaaS. In this paper, we contribute to the very recent line of research, which utilizes a Fully Homomorphic Encryption (FHE) scheme by Chillotti et al. named TFHE. It has been shown that TFHE is particularly suitable for securing MLaaS. In addition, its security relies on the famous LWE problem, which is considered quantum-proof. However, it has not been studied yet how all the TFHE parameters are to be set. Hence we provide a thorough analysis of error propagation through TFHE homomorphic computations, based on which we derive constraints on the parameters as well as we suggest a convenient representation of internal objects. We particularly focus on effective resource utilization in order to achieve the best performance of any prospective implementation.

This work was supported by the Grant Agency of CTU in Prague, grant No. SGS19/109/OHK3/2T/13.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    N.b., we extended and updated our original text from [10], including figures.

References

  1. Bourse, F., Minelli, M., Minihold, M., Paillier, P.: Fast homomorphic evaluation of deep discretized neural networks. In: Annual International Cryptology Conference, pp. 483–512. Springer, New York (2018). https://doi.org/10.1007/978-3-319-96878-0_17

  2. Carpov, S., Izabachène, M., Mollimard, V.: New techniques for multi-value input homomorphic evaluation and applications. In: Matsui, M. (eds.) Topics in Cryptology – CT-RSA 2019. CT-RSA 2019. Lecture Notes in Computer Science, vol. 11405. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12612-4_6

  3. Chillotti, I., Gama, N., Georgieva, M., Izabachène, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34–91 (2020)

    Article  MathSciNet  Google Scholar 

  4. Google Cloud. AI Platform. https://cloud.google.com/ai-platform

  5. European Commission: General Data Protection Regulation. https://eur-lex.europa.eu/eli/reg/2016/679

  6. Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. 9(3–4), 211–407 (2014)

    Google Scholar 

  7. Ersatzlabs. AI & Deep Learning. http://www.ersatzlabs.com/

  8. Gentry, C., Boneh, D.: A Fully Homomorphic Encryption Scheme, vol. 20. Stanford University (2009)

    Google Scholar 

  9. Graepel, T., Lauter, K., Naehrig, M.: ML confidential: machine learning on encrypted data. In: Kwon, T., Lee, M.K., Kwon, D. (eds.) Information Security and Cryptology – ICISC 2012. ICISC 2012. Lecture Notes in Computer Science, vol. 7839. Springer, Berlin, Heidelberg (2012). https://doi.org/10.1007/978-3-642-37682-5_1

  10. Klemsa, J., Novotný, M.: WTFHE: neural-netWork-ready Torus Fully Homomorphic Encryption. In: 2020 9th Mediterranean Conference on Embedded Computing (MECO). IEEE (2020)

    Google Scholar 

  11. Microsoft. Azure Machine Learning. http://azure.microsoft.com/en-us/services/machine-learning/

  12. Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1–40 (2009)

    Article  MathSciNet  Google Scholar 

  13. Rothblum, R.D.: On the circular security of bit-encryption. In: Sahai, A. (eds.) Theory of Cryptography. TCC 2013. Lecture Notes in Computer Science, vol. 7785. Springer, Berlin, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36594-2_32

  14. Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533–536 (1986)

    Google Scholar 

  15. Tillem, G., Bozdemir, B., Önen, M.: Switching among cryptographic tools for privacy-preserving neural network predictions. Preprint, Swann (2020)

    Google Scholar 

  16. Turi. Graphlab Createâ„¢. https://turi.com/

  17. Xie, P., Bilenko, M., Finley, T., Gilad-Bachrach, R., Lauter, K., Naehrig, M.: Crypto-nets: neural networks over encrypted data. arXiv:1412.6181 (2014)

  18. Zhou, T., Yang, X., Liu, L., Zhang, W., Li, N.: Faster bootstrapping with multiple addends. IEEE Access 6, 49868–49876 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jakub Klemsa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Klemsa, J. (2021). TFHE Parameter Setup for Effective and Error-Free Neural Network Prediction on Encrypted Data. In: Arai, K. (eds) Intelligent Computing. Lecture Notes in Networks and Systems, vol 285. Springer, Cham. https://doi.org/10.1007/978-3-030-80129-8_49

Download citation

Publish with us

Policies and ethics