Secure and Efficient -Norm Computation for Two-Party Learning Applications
Secure norm computation is becoming increasingly important in many real-world learning applications. However, existing cryptographic systems often lack a general framework for securely computing the -norm over private inputs held by different parties. These systems often treat secure norm computation as a black-box process, neglecting to design tailored cryptographic protocols that optimize performance. Moreover, they predominantly focus on the -norm, paying little attention to other popular -norms, such as and , which are commonly used in practice, such as machine learning tasks and location-based services.To our best knowledge, we propose the first comprehensive framework for secure two-party -norm computations (, , and ), denoted as \mbox{Crypto-}, designed to be versatile across various applications. We have designed, implemented, and thoroughly evaluated our framework across a wide range of benchmarking applications, state-of-the-art (SOTA) cryptographic protocols, and real-world datasets to validate its effectiveness and practical applicability. In summary, \mbox{Crypto-} outperforms prior works on secure -norm computation, achieving , , and improvements in runtime while reducing communication overhead by , , and for , , and , respectively. Furthermore, we take the first step in adapting our Crypto- framework for secure machine learning inference, reducing communication costs by compared to SOTA systems while maintaining comparable runtime and accuracy.
View on arXiv