CrypTFlow - Secure TensorFlow Inference
Offered By: IEEE via YouTube
Course Description
Overview
Explore a groundbreaking system for secure TensorFlow inference in this IEEE conference talk. Dive into CRYPTFLOW, a pioneering solution that automatically converts TensorFlow inference code into Secure Multi-party Computation (MPC) protocols. Learn about the three key components: Athos, an end-to-end compiler; Porthos, an improved semi-honest 3-party protocol; and Aramis, a novel technique for malicious secure MPC protocols. Discover how CRYPTFLOW achieves secure inference of complex neural networks like RESNET50 and DENSENET121 over the ImageNet dataset, outperforming prior work in both semi-honest and malicious security scenarios. Gain insights into the system's architecture, its components, and the innovative approach to malicious security using hardware with integrity guarantees.
Syllabus
Introduction
The Problem
What is MPC
Prior work
Goal
Components
Compilation
Malicious Security
Aramis
Summary
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Secure Computation: Part INPTEL via Swayam Secure Computation: Part II
NPTEL via Swayam Don't Eject the Impostor: Fast Three-Party Computation with a Known Cheater
IEEE via YouTube Advanced Cryptography: Promise and Challenges
Association for Computing Machinery (ACM) via YouTube Combiners for Functional Encryption, Unconditionally
TheIACR via YouTube