Abstract
Due to legal restrictions or restrictions related to companies' internal information policies, businesses often do not trust sensitive information to public cloud providers. One of the mechanisms to ensure the security of sensitive data in clouds is homomorphic encryption. Privacy-preserving neural networks are used to design solutions that utilize neural networks under these conditions. They exploit the homomorphic encryption mechanism, thus enabling the security of commercial information in the cloud. The main deterrent to the use of privacy-preserving neural networks is the large computational and spatial complexity of the scalar multiplication algorithm, which is the basic algorithm for computing mathematical convolution. In this paper, we propose a scalar multiplication algorithm that reduces the spatial complexity from quadratic to linear, and reduces the computation time of scalar multiplication by a factor of 1.38.





Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.REFERENCES
Hunt, E.B., Artificial Intelligence, Academic, 2014.
Radford, A., et al., Improving Language Understanding by Generative Pre-Training, OpenAI, 2018.
Wamser, F. et al., Traffic characterization of a residential wireless internet access, in Telecommunication Systems, Springer, 2011, vol. 48, pp. 5–17.
Sagiroglu, S. and Sinanc, D., Big data: A review, Proc. IEEE Int. Conf. on Collaboration Technologies and Systems (CTS), Atlanta, 2013, pp. 42–47.
On Personal Data. http://pravo.gov.ru/proxy/ips/?docbody&nd=102108261. Accessed 16.06.2024.
Gentry, C., A Fully Homomorphic Encryption Scheme, Stanford Univ., 2009.
Yegnanarayana, B., Artificial Neural Networks, PHI Learning Pvt. Ltd., 2009.
Pratiwi, H. et al., Sigmoid activation function in selecting the best model of artificial neural networks, J. Phys.: Conf. Ser., 2020, vol. 1471, no. 1, p. 012010.
Rivest, R.L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 1978, vol. 21, no. 2, pp. 120–126.
ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inf. Theory, 1985, vol. 31, no. 4, pp. 469–472.
Gentry, C., Fully homomorphic encryption using ideal lattices, in Proc. 41st Annu. ACM Symp. on Theory of Computing, Bethesda, MD: ACM, 2009, pp. 169–178.
Van Dijk, M. et al., Fully homomorphic encryption over the integers, in Proc. Conf. Advances in Cryptology – Eurocrypt 2010, Gilbert, H., Ed., Berlin: Springer, 2010.
Gentry, C. and Halevi, S., Implementing Gentry’s fully-homomorphic encryption scheme, in Proc. 30th Annul. Int. Conf. on the Theory and Applications of Crypto-graphic Techniques “Advances in Cryptology – Eurocrypt 2011,” Tallin, Estonia, May 15–19, 2011, Springer, 2011, pp. 129–148.
Brakerski, Z., Fully homomorphic encryption without modulus switching from classical GapSVP, in Proc. Annu. Cryptology Conf., Springer, 2012, pp. 868–886.
Brakerski, Z. and Vaikuntanathan, V., Fully homomorphic encryption from ring-LWE and security for key dependent messages, in Proc. Conf. Advances in Cryptology – Crypto 2011, Rogaway, P., Ed., Berlin, Heidelberg: Springer, 2011.
Brakerski, Z., Gentry, C., and Vaikuntanathan, V., (Leveled) fully homomorphic encryption without bootstrapping, ACM Trans. Comput. Theory, 2014, vol. 6, no. 3, pp. 1–36.
van Dijk, M., et al., Fully homomorphic encryption over the integers, in Proc. Annu. Int. Conf. on the Theory and Applications of Cryptographic Techniques, Springer, 2010, pp. 24–43.
Cheon, J.H., et al., Homomorphic encryption for arithmetic of approximate numbers, in Proc. Int. Conf. on the Theory and Application of Cryptology and Information Security, Springer, 2017, pp. 409–437.
Homomorphic Encryption Standardization – an Open Industry / Government / Academic Consortium to Advance Secure Computation. https://homomorphicencryption.org/. Accessed 10.12.2022.
Pulido-Gaytan, B., et al., Privacy-preserving neural networks with homomorphic encryption: challenges and opportunities, Peer-to-Peer Networking Appl., 2021, vol. 14, no. 3, pp. 1666–1691.
Ribeiro, M., Grolinger, K., and Capretz, M.A., Mlaas: machine learning as a service, Proc. 14th IEEE Int. Conf. on Machine Learning and Applications (ICMLA), Miami, FL, 2015, pp. 896–902.
Manvi, S.S. and Shyam, G.K., Resource management for infrastructure as a service (IaaS) in cloud computing: a survey, J. Network Comput. Appl., 2014, vol. 41, pp. 424–440.
Rodero-Merino, L. et al., Building safe PaaS clouds: a survey on security in multitenant software platforms, in Computers & Security, Elsevier, 2012, vol. 31, no. 1, pp. 96–108.
Cusumano, M., Cloud computing and saas as new computing platforms, Commun. ACM, 2010, vol. 53, no. 4, pp. 27–29.
Chen, H., Chillotti, I., and Song, Y., Improved bootstrapping for approximate homomorphic encryption, in Proc. 38th Annu. Int. Conf. on the Theory and Applications of Cryptographic Techniques “Advances in Cryptology – Eurocrypt 2019,” Darmstadt, Germany, May 19–23, 2019, Springer, 2019, part II.
Microsoft SEAL: C++, Microsoft, 2023.
OpenFHE.org – OpenFHE – Open-Source Fully Homomorphic Encryption Library. https://www.openfhe.org/. Accessed April 1, 2024.
Dai, W. and Sunar, B., Cuhe: a homomorphic encryption accelerator library, in Proc. Int. Conf. on Cryptography and Information Security in the Balkans, Springer, 2015, pp. 169–186.
Benaissa, A., et al., TenSEAL: A library for encrypted tensor operations using homomorphic encryption, 2021. arXiv: 2104.03152.
Lee, J.-W. et al., Privacy-preserving machine learning with fully homomorphic encryption for deep neural network, IEEE Access., 2022, vol. 10, pp. 30039–30054.
Halevi, S. and Shoup, V., Algorithms in helib, in Proc. Annu. Cryptology Conf., Springer, 2014, pp. 554–571.
Özerk, Ö., et al., Efficient number theoretic transform implementation on GPU for homomorphic encryption, J. Supercomput., 2022, vol. 78, no. 2, pp. 2840–2872.
Funding
The research was supported by the Russian Science Foundation grant no. 19-71-10033, https://rscf.ru/en/project/19-71-10033/.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors of this work declare that they have no conflicts of interest.
Additional information
Publisher’s Note.
Pleiades Publishing remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
AI tools may have been used in the translation or editing of this article.
Rights and permissions
About this article
Cite this article
Lapina, M.A., Shiriaev, E.M., Babenko, M.G. et al. High-Speed Convolution Core Architecture for Privacy-Preserving Neural Networks. Program Comput Soft 50, 417–424 (2024). https://doi.org/10.1134/S0361768824700282
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1134/S0361768824700282