과제정보
이 논문은 2023 년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구이며 (IITP-2023-RS-2023-00256081), 2024 년도 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구이며 (RS-2023-00277326), 2024 년도 BK21 FOUR 정보기술 미래인재 교육연구단에 의하여 지원되었음. 본 연구는 반도체 공동연구소 지원의 결과물임을 밝힙니다. 이 연구를 위해 연구장비를 지원하고 공간을 제공한 서울대학교 컴퓨터 연구소에 감사드립니다.
참고문헌
- Gilad-Bachrach, Ran, et al. "Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy." International conference on machine learning. PMLR, 2016.
- Juvekar, Chiraag, Vinod Vaikuntanathan, and Anantha Chandrakasan. "{GAZELLE}: A low latency framework for secure neural network inference." 27th USENIX security symposium (USENIX security 18). 2018.
- Lee, Junghyun, et al. "Precise approximation of convolutional neural networks for homomorphically encrypted data." IEEE Access (2023).
- Cheon, Jung Hee, et al. "Numerical method for comparison on homomorphically encrypted numbers." International conference on the theory and application of cryptology and information security. Cham: Springer International Publishing, 2019.
- Cho, Jihoon, et al. "Transciphering framework for approximate homomorphic encryption." International Conference on the Theory and Application of Cryptology and Information Security. Cham: Springer International Publishing, 2021.
- Wang, Wenhao, et al. "Toward scalable fully homomorphic encryption through light trusted computing assistance." arXiv preprint arXiv:1905.07766 (2019).
- Drucker, Nir, and Shay Gueron. "Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment." J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9.1 (2018): 86-99.
- Y. Xu, W. Cui, and M. Peinado, "Controlled-channel attacks: Deterministic side channels for untrusted operating systems," in IEEE Symposium on Security and Privacy (SP). IEEE, 2015, pp. 640-656.
- W. Wang, G. Chen, X. Pan, Y. Zhang, X. Wang, V. Bindschaedler, H. Tang, and C. A. Gunter, "Leaky cauldron on the dark land: Understanding memory side-channel hazards in sgx," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017, pp. 2421-2434.
- M. Taassori, A. Shafiee, and R. Balasubramonian, "Vault: Reducing paging overheads in sgx with efficient integrity verification structures," in Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems. ACM, 2018, pp. 665-678.
- Cong, Kelong, et al. "Sortinghat: Efficient private decision tree evaluation via homomorphic encryption and transciphering." Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2022.
- Frery, Jordan, et al. "Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption." Cryptology ePrint Archive (2023).