Abstract
In this paper we present a new class of protocols for the secure computation of the sine and cosine functions. The precision for the underlying secure fixed-point arithmetic is parametrized by the number of fractional bits f and can be set to any desired value. We perform a rigorous error analysis to provide an exact bound for the absolute error of \(2^{-f}\) in the worst case. Existing methods rely on polynomial approximations of the sine and cosine, whereas our approach relies on the random self-reducibility of the problem, using efficiently generated solved instances for uniformly random angles. As a consequence, most of the \(O(f^2)\) secure multiplications can be done in preprocessing, leaving only O(f) work for the online part. The overall round complexity can be limited to O(1) using standard techniques. We have integrated our solution in MPyC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Probabilistic (or, stochastic) rounding is applied in various areas of research, including machine learning, ODEs/PDEs, quantum mechanics/computing, and digital signal processing, usually in combination with a severe limitation on numerical precision (see, for instance, [7, 14, 16, 19]). The latter condition makes probabilistic rounding desirable in these cases, because it ensures zero-mean rounding errors and avoids the problem of stagnation, where small values are lost to rounding when they are added to an increasingly large accumulator [8]. However, the use of a randomness source may be expensive, where the number of random bits (entropy) varies with the probability distribution required for the rounding errors.
References
SCALE-MAMBA v1.14 (2021). https://github.com/KULeuven-COSIC/SCALE-MAMBA
Aly, A., Smart, N.P.: Benchmarking privacy preserved scientific operations. In: Applied Cryptography and Network Security, pp. 509–529 (2019)
Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing (PODC 1989), pp. 201–209 (1989)
Bayatbabolghani, F., Blanton, M., Aliasgari, M., Goodrich, M.T.: Secure fingerprint alignment and matching protocols. ar**v preprint ar**v:1702.03379 (2017)
Catrina, O., de Hoogh, S.: Secure multiparty linear programming using fixed-point arithmetic. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 134–150. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15497-3_9
Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 35–50. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14577-3_6
Croci, M., Giles, M.B.: Effects of round-to-nearest and stochastic rounding in the numerical solution of the heat equation in low precision. IMA J. Numer. Anal. (2022)
Croci, M., Fasi, M., Higham, N.J., Mary, T., Mikaitis, M.: Stochastic rounding: implementation, error analysis and applications. R. Soc. Open Sci. 9, 211631 (2022)
Damgård, I., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285–304. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_15
Feigenbaum, J., Fortnow, L.: On the random-self-reducibility of complete sets. SIAM J. Comput. 22, 994–1005 (1993)
Guajardo, J., Mennink, B., Schoenmakers, B.: Modulo reduction for Paillier encryptions and application to secure statistical analysis. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 375–382. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14577-3_32
Hart, J.F.: Computer Approximations. Krieger Publishing Co., Inc., Malabar (1978)
Kerik, L., Laud, P., Randmets, J.: Optimizing MPC for robust and scalable integer and floating-point arithmetic. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 271–287. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_18
Na, T., Ko, J.H., Kung, J., Mukhopadhyay, S.: On-chip training of recurrent neural networks with limited numerical precision. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 3716–3723 (2017)
Naveh, A., Tromer, E.: PhotoProof: cryptographic image authentication for any set of permissible transformations. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 255–271 (2016)
Paxton, E.A., Chantry, M., Klöwer, M., Saffin, L., Palmer, T.: Climate modeling in low precision: effects of both deterministic and stochastic rounding. J. Clim. 35(4), 1215–1229 (2022)
Schoenmakers, B: MPyC package for secure multiparty computation in Python. GitHub github.com/lschoe/mpyc (2018)
Volder, J.E.: The CORDIC trigonometric computing technique. IRE Trans. Electron. Comput. 8, 330–334 (1959)
Wang, N., Choi, J., Brand, D., Chen, C.Y., Gopalakrishnan, K.: Training deep neural networks with 8-bit floating point numbers. In: Advances in Neural Information Processing Systems, vol. 31. Curran Associates, Inc. (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Korzilius, S., Schoenmakers, B. (2023). New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic. In: Dolev, S., Gudes, E., Paillier, P. (eds) Cyber Security, Cryptology, and Machine Learning. CSCML 2023. Lecture Notes in Computer Science, vol 13914. Springer, Cham. https://doi.org/10.1007/978-3-031-34671-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-031-34671-2_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34670-5
Online ISBN: 978-3-031-34671-2
eBook Packages: Computer ScienceComputer Science (R0)