ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2021, Vol. 58 ›› Issue (10): 2163-2186.doi: 10.7544/issn1000-1239.2021.20210626

Special Issue: 2021密码学与网络空间安全治理专题

Previous Articles     Next Articles

Secure Multiparty Computation and Application in Machine Learning

Guo Juanjuan1,2, Wang Qiongxiao1,2, Xu Xin1,2, Wang Tianyu3, Lin Jingqiang4   

  1. 1(State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100195);2(School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049);3(Huakong TsingJiao Information Science (Beijing) Limited, Beijing 100084);4(School of Cyber Security, University of Science and Technology of China, Hefei 230026)
  • Online:2021-10-01
  • Supported by: 
    This work was supported by the General Program of the National Natural Science Foundation of China (61772518).

Abstract: With the emergence and development of artificial intelligence and big data, large-scale data collection and analysis applications have been widely deployed, which introduces the concern of privacy leakage. This privacy concern further prevents data exchanges among originations and results in “data silos”. Secure multiparty computation (MPC) allows multiple originations to perform privacy-preserving collaborative data analytics, without leaking any plaintext data during the interactions, making the data “usable but not visible”. MPC technologies have been extensively studied in the academic and engineering fields, and derive various technical branches. Privacy-preserving machine learning (PPML) is becoming a typical and widely deployed application of MPC. And various PPML schemes have been proposed to perform privacy-preserving training and inference without leaking model parameters nor sensitive data. In this paper, we systematically analyze various MPC schemes and their applications in PPML. Firstly, we list various security models and objectives, and the development of MPC primitives (i.e., garble circuit, oblivious transfer, secret sharing and homomorphic encryption). Then, we summarize the strengths and weaknesses of these primitives, and list the corresponding appropriate usage scenarios, which is followed by the thorough analysis of their applications in PPML. Finally, we point out the further research direction on MPC and their applications in PPML.

Key words: secure multiparty computation (MPC), garbled circuit, oblivious transfer, secret sharing, homomorphic encryption, privacy-preserving machine learning

CLC Number: