From: Confidential machine learning on untrusted platforms: a survey
Framework | Primitive Switch | Operation Switch | Justification |
---|---|---|---|
SHE → GC | Matrix vector multiplication → Sign Check | Sign checking is impractically expensive with SHE whereas tolerable with GC. | |
AHE → GC | Matrix Additions → Cholesky’s decomposition | The operations of division and square root in Cholesky’s decomposition were not feasible with the AHE scheme. | |
AHE → GC | Matrix Additions → Gradient Descent | Gradient descent involved multiplications, additions, and subtractions not entirely feasible with the AHE scheme. | |
SecSh → GC | Matrix-vector multiplication → Comparison | Comparison is impossible over randomly shared secrets leading the switch to the garbled circuits. | |
GC → SecSh | Comparison → Vector Subtraction | Use of garbled circuits for comparison was unavoidable however continuing GC on to vector subtraction would result in excessive cost overhead. | |
SecSh → AHE/OT | Data at rest → Multiplication | Multiplication with random shares required switching to either AHE or OT protocol involving the two parties in the frameworks. | |
SecSh → GC | Matrix matrix multiplication → ReLu computation | Sign checking is impossible over randomly shared secrets leading the switch to garbled circuits. | |
GC →SecSh | ReLu → Matrix vector multiplication | Use of garbled circuits for matrix vector multiplication is impractical. |