高级检索
    郭娟娟, 王琼霄, 许新, 王天雨, 林璟锵. 安全多方计算及其在机器学习中的应用[J]. 计算机研究与发展, 2021, 58(10): 2163-2186. DOI: 10.7544/issn1000-1239.2021.20210626
    引用本文: 郭娟娟, 王琼霄, 许新, 王天雨, 林璟锵. 安全多方计算及其在机器学习中的应用[J]. 计算机研究与发展, 2021, 58(10): 2163-2186. DOI: 10.7544/issn1000-1239.2021.20210626
    Guo Juanjuan, Wang Qiongxiao, Xu Xin, Wang Tianyu, Lin Jingqiang. Secure Multiparty Computation and Application in Machine Learning[J]. Journal of Computer Research and Development, 2021, 58(10): 2163-2186. DOI: 10.7544/issn1000-1239.2021.20210626
    Citation: Guo Juanjuan, Wang Qiongxiao, Xu Xin, Wang Tianyu, Lin Jingqiang. Secure Multiparty Computation and Application in Machine Learning[J]. Journal of Computer Research and Development, 2021, 58(10): 2163-2186. DOI: 10.7544/issn1000-1239.2021.20210626

    安全多方计算及其在机器学习中的应用

    Secure Multiparty Computation and Application in Machine Learning

    • 摘要: 随着人工智能、大数据等技术的发展,数据采集、数据分析等应用日渐普及,隐私泄露问题越来越严重.数据保护技术的缺乏限制了企业之间数据的互通,导致形成“数据孤岛”.安全多方计算(secure multiparty computation, MPC)技术能够在不泄露明文的情况下实现多方参与的数据协同计算,实现安全的数据流通,达到数据“可用不可见”.隐私保护机器学习是当前MPC技术最典型也是最受关注的应用与研究领域,MPC技术的应用可以保证在不泄露用户数据隐私和服务商模型参数隐私的情况下进行训练和推理.针对MPC及其在隐私保护机器学习领域的应用进行全面的分析与总结,首先介绍了MPC的安全模型和安全目标;梳理MPC基础技术的发展脉络,包括混淆电路、不经意传输、秘密分享和同态加密;并对MPC基础技术的优缺点进行分析,提出不同技术方案的适用场景;进一步对基于MPC技术实现的隐私保护机器学习方案进行了介绍与分析;最后进行总结和展望.

       

      Abstract: With the emergence and development of artificial intelligence and big data, large-scale data collection and analysis applications have been widely deployed, which introduces the concern of privacy leakage. This privacy concern further prevents data exchanges among originations and results in “data silos”. Secure multiparty computation (MPC) allows multiple originations to perform privacy-preserving collaborative data analytics, without leaking any plaintext data during the interactions, making the data “usable but not visible”. MPC technologies have been extensively studied in the academic and engineering fields, and derive various technical branches. Privacy-preserving machine learning (PPML) is becoming a typical and widely deployed application of MPC. And various PPML schemes have been proposed to perform privacy-preserving training and inference without leaking model parameters nor sensitive data. In this paper, we systematically analyze various MPC schemes and their applications in PPML. Firstly, we list various security models and objectives, and the development of MPC primitives (i.e., garble circuit, oblivious transfer, secret sharing and homomorphic encryption). Then, we summarize the strengths and weaknesses of these primitives, and list the corresponding appropriate usage scenarios, which is followed by the thorough analysis of their applications in PPML. Finally, we point out the further research direction on MPC and their applications in PPML.

       

    /

    返回文章
    返回