可验证外包的二值神经网络隐私推理方案
Verifiable Privacy Inference Scheme for Binary Neural Networks Based on Outsourcing
DOI: 10.12677/csa.2026.164122, PDF,   
作者: 郭玉麒, 岳笑含:沈阳工业大学信息科学与工程学院,辽宁 沈阳
关键词: 二值神经网络同态加密可验证计算Binary Neural Network Homomorphic Encryption Verifiable Computation
摘要: 随着深度学习在移动终端与物联网场景中的广泛应用,资源受限设备对高效、安全模型推理的需求日益增强。二值神经网络(BNN)通过权重与激活二值化显著降低计算与存储开销,但在“机器学习即服务”模式下,推理外包至云端执行,如何兼顾输入隐私、模型机密性与结果可验证性成为关键问题。针对现有方案在效率、通信与可验证性之间难以平衡的不足,本文提出一种支持外包可验证的BNN隐私推理框架。该方案基于椭圆曲线ElGamal同态加密构建密文线性计算结构,引入“Ciphertext as Commitment”范式实现与Pedersen承诺的统一表达,并结合广义内积论证协议,实现线性层对数级通信验证。针对非线性层推理,设计同态置换与乘法掩码结合的交互式协议,实现符号激活函数的安全验证。安全性分析与实验结果表明,该方案在保障推理正确性的同时有效降低验证与通信开销,适用于资源受限环境下的安全外包推理。
Abstract: With the widespread application of deep learning in mobile terminals and IoT scenarios, the demand for efficient and secure model inference on resource-constrained devices is increasing day by day. Binary neural networks (BNN) significantly reduce computational and storage costs by binarizing weights and activations. However, in the “machine learning as a service” model, inference is outsourced to the cloud for execution. How to balance input privacy, model confidentiality, and result verifiability becomes a key issue. In response to the shortcomings of existing solutions in balancing efficiency, communication, and verifiability, this paper proposes a BNN privacy inference framework that supports outsourced verification. This scheme is built based on the elliptic curve ElGamal homomorphic encryption to construct a ciphertext linear computing structure. The “iphertext-as-Commitment” paradigm is introduced to achieve a unified expression with Pedersen commitment, and combined with the generalized inner product argument protocol, it realizes logarithmic-level communication verification for the linear layer. For non-linear layer inference, an interactive protocol combining homomorphic permutation and multiplication mask is designed to achieve secure verification of symbolic activation functions. Security analysis and experimental results show that this scheme effectively reduces verification and communication costs while ensuring the correctness of inference, and is suitable for secure outsourced inference in resource-constrained environments.
文章引用:郭玉麒, 岳笑含. 可验证外包的二值神经网络隐私推理方案[J]. 计算机科学与应用, 2026, 16(4): 195-204. https://doi.org/10.12677/csa.2026.164122

参考文献

[1] Menghani, G. (2023) Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better. ACM Computing Surveys, 55, 1-37. [Google Scholar] [CrossRef
[2] Fasfous, N., Vemparala, M., Frickenstein, A., Frickenstein, L., Badawy, M. and Stechele, W. (2021) Binarycop: Binary Neural Network-Based COVID-19 Face-Mask Wear and Positioning Predictor on Edge Devices. 2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Portland, 17-21 June 2021, 108-115. [Google Scholar] [CrossRef
[3] Qiu, H., Ma, H., Zhang, Z., Gao, Y., Zheng, Y., Fu, A., et al. (2023) RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 42, 1185-1198. [Google Scholar] [CrossRef
[4] General Data Protection Regulation (GDPR) (EU) 2016/679.
https://eur-lex.europa.eu/eli/reg/2016/679/oj/
[5] Kaissis, G.A., Makowski, M.R., Rückert, D. and Braren, R.F. (2020) Secure, Privacy-Preserving and Federated Machine Learning in Medical Imaging. Nature Machine Intelligence, 2, 305-311. [Google Scholar] [CrossRef
[6] Onoufriou, G., Hanheide, M. and Leontidis, G. (2022) EDLaaS: Fully Homomorphic Encryption over Neural Network Graphs for Vision and Private Strawberry Yield Forecasting. Sensors, 22, Article 8124. [Google Scholar] [CrossRef] [PubMed]
[7] Berry, C. and Komninos, N. (2022) Efficient Optimisation Framework for Convolutional Neural Networks with Secure Multiparty Computation. Computers & Security, 117, Article 102679. [Google Scholar] [CrossRef
[8] Riazi, M.S., Samragh, M., Chen, H., et al. (2019) {XONN}:{XNOR-Based} Oblivious Deep Neural Network Inference. 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, 14-16 August 2019, 1501-1518.
[9] Liu, T., Xie, X. and Zhang, Y. (2021) zKCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Seoul, 15-19 November 2021, 2968-2985.
[10] Feng, B., Wang, Z., Wang, Y., Yang, S. and Ding, Y. (2024) ZENO: A Type-Based Optimization Framework for Zero Knowledge Neural Network Inference. Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1, San Diego, 27 April-1 May 2024, 450-464.