IEEE Computational Intelligence Magazine - August 2022 - 25

models. The next challenge to address is the training of
machine and deep learning models directly on encrypted
data. The main issue to be addressed here is to manage the
NB consumption not only during the inference, but also
during the training of the privacy-preserving model.
Having outlined the main challenges to be addressed in this
research area, the next section presents a collection of useful
resources for privacy-preserving deep learning with HE.
VI. Available Resources for Privacy-Preserving Deep
Learning With Homomorphic Encryption
Two main frameworks for HE, which can be used to facilitate
the design of privacy-preserving deep learning solutions, are
available in the literature: SEAL and HElib. SEAL [19] is a
Microsoft C++ library that implements the BFV and CKKS
schemes. It offers helper functions for selecting the encryption
parameters as well as provides support for basic HE operations
(e.g., encrypting and decrypting values). Python users may refer
to Pyfhel [27] and TenSEAL [28], which are Python wrappers
for SEAL. The code used in the present study relies on SEAL
and Pyfhel, while Torch [29] was used for the training of the
plain-version of the CNNs. HElib [30] is a C++ library that
implements the CKKS scheme, among others. HElib also
includes optimization mechanisms for efficient homomorphic
evaluation, focusing on the effective use of ciphertext packing
techniques and Gentry-Halevi-Smart optimizations.
Concrete [31] is a Rust implementation of the TFHE
scheme, while a few examples of software libraries specifically
intended for HE-based machine and deep learning are available,
such as PyCrCNN [32], nGraph-HE [9], and CHET [33].
VII. Conclusions
The aim of this study was to explore the promising but highly
challenging research area of privacy-preserving deep learning
based on HE. Specifically, the BFV scheme and its privacy-preserving
operations were introduced both theoretically and algorithmically
through Python code examples. A methodology for
designing privacy-preserving CNNs was also proposed, which
was applied to the design of a privacy-preserving version of the
well-known LeNet-1. Experimental results on two datasets highlighted
that it is possible to design privacy-preserving CNNs
with HE, which are characterized by a negligible loss in accuracy
(w.r.t. the original version) and relevant increases in memory and
computational demand. Finally, this paper described the research
challenges to be addressed in this field as well as the available
software resources for privacy-preserving deep learning.
The path toward privacy-preserving deep learning with HE
has now been traced. Over the next few years, great advances
will be made in this direction.
Acknowledgment
This work was partially funded by the CATCH 4.0 project
within the Italian Programma Operativo Nazionale (PON)
" Imprese e competitività " FESR 2014/2020, and by Dhiria
S.r.l., a spin-off of Politecnico di Milano.
References
[1] L. Cai and Y. Zhu, " The challenges of data quality and data quality assessment in the
big data era, " Data Sci. J., vol. 14, 2015, doi: 10.5334/dsj-2015-002.
[2] S. Cass, " The age of the zettabyte cisco: The future of internet traffic is video [dataflow], "
IEEE Spectr., vol. 51, no. 3, pp. 68-68, Mar. 2014, doi: 10.1109/MSPEC.2014.
6745894.
[3] Y. Yao, Z. Xiao, B. Wang, B. Viswanath, H. Zheng, and B. Y. Zhao, " Complexity vs.
performance: empirical analysis of machine learning as a service, " in Proc. 2017 Internet
Meas. Conf., 2017, pp. 384-397.
[4] E. P. Council of European Union, " Regulation (EU) no 2016/679, article 4(1), " 2016.
[5] B. C. Stahl and D. Wright, " Ethics and privacy in ai and big data: Implementing responsible
research and innovation, " IEEE Security Privacy, vol. 16, no. 3, pp. 26-33, May/Jun.
2018, doi: 10.1109/MSP.2018.2701164.
[6] H. C. Tanuwidjaja, R. Choi, S. Baek, and K. Kim, " Privacy-preserving deep learning
on machine learning as a service-A comprehensive survey, " IEEE Access, vol. 8, pp.
167,425-167,447, 2020.
[7] B. Pulido-Gaytan et al., " Privacy-preserving neural networks with homomorphic
encryption: Challenges and opportunities, " Peer-to-Peer Netw. Appl., vol. 14, no. 3, pp.
1666-1691, 2021, doi: 10.1007/s12083-021-01076-8.
[8] E. P. Council of European Union, " Regulation laying down harmonised rules on
artificial intelligence (artificial intelligence act), com/2021/206, " 2021.
[9] F. Boemer, Y. Lao, R. Cammarota, and C. Wierzynski, " nGraph-HE: A graph compiler
for deep learning on homomorphically encrypted data, " in Proc. 16th ACM Int. Conf.
Comput. Frontiers, 2019, pp. 3-13.
[10] R. Gilad-Bachrach, N. Dowlin, K. Laine, K. Lauter, M. Naehrig, and J. Wernsing,
" Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy, "
in Proc. Int. Conf. Mach. Learn., PMLR, 2016, pp. 201-210.
[11] Y. LeCun et al., " Backpropagation applied to handwritten zip code recognition, "
Neural Comput., vol. 1, no. 4, pp. 541-551, 1989, doi: 10.1162/neco.1989.1.4.541.
[12] L. Morris, " Analysis of partially and fully homomorphic encryption, " Rochester Inst.
Technol., pp. 1-5, 2013.
[13] D. Boneh, E.-J. Goh, and K. Nissim, " Evaluating 2-DNF formulas on ciphertexts, "
in Proc. Theory Cryptography Conf., Springer-Verlag, 2005, pp. 325-341.
[14] J. Fan and F. Vercauteren, " Somewhat practical fully homomorphic encryption. "
IACR Cryptol. ePrint Arch., vol. 2012, p. 144, 2012.
[15] J. H. Cheon, A. Kim, M. Kim, and Y. Song, " Homomorphic encryption for arithmetic
of approximate numbers, " in Proc. Adv. Cryptol. - ASIACRYPT 2017, Cham, Switzerland:
Springer Int. Publishing, 2017, pp. 409-437.
[16] I. Chillotti, N. Gama, M. Georgieva, and M. Izabachène, " TFHE: Fast fully homomorphic
encryption over the torus, " J. Cryptol., vol. 33, no. 1, pp. 34-91, Jan. 2020, doi:
10.1007/s00145-019-09319-x.
[17] V. Lyubashevsky, C. Peikert, and O. Regev, " On ideal lattices and learning with
errors over rings, " in Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn., SpringerVerlag,
http://yann.lecun.com/exdb/mnist/ https://www.github.com/ibarrond/Pyfhel

IEEE Computational Intelligence Magazine - August 2022

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - August 2022

Contents
IEEE Computational Intelligence Magazine - August 2022 - Cover1
IEEE Computational Intelligence Magazine - August 2022 - Cover2
IEEE Computational Intelligence Magazine - August 2022 - Contents
IEEE Computational Intelligence Magazine - August 2022 - 2
IEEE Computational Intelligence Magazine - August 2022 - 3
IEEE Computational Intelligence Magazine - August 2022 - 4
IEEE Computational Intelligence Magazine - August 2022 - 5
IEEE Computational Intelligence Magazine - August 2022 - 6
IEEE Computational Intelligence Magazine - August 2022 - 7
IEEE Computational Intelligence Magazine - August 2022 - 8
IEEE Computational Intelligence Magazine - August 2022 - 9
IEEE Computational Intelligence Magazine - August 2022 - 10
IEEE Computational Intelligence Magazine - August 2022 - 11
IEEE Computational Intelligence Magazine - August 2022 - 12
IEEE Computational Intelligence Magazine - August 2022 - 13
IEEE Computational Intelligence Magazine - August 2022 - 14
IEEE Computational Intelligence Magazine - August 2022 - 15
IEEE Computational Intelligence Magazine - August 2022 - 16
IEEE Computational Intelligence Magazine - August 2022 - 17
IEEE Computational Intelligence Magazine - August 2022 - 18
IEEE Computational Intelligence Magazine - August 2022 - 19
IEEE Computational Intelligence Magazine - August 2022 - 20
IEEE Computational Intelligence Magazine - August 2022 - 21
IEEE Computational Intelligence Magazine - August 2022 - 22
IEEE Computational Intelligence Magazine - August 2022 - 23
IEEE Computational Intelligence Magazine - August 2022 - 24
IEEE Computational Intelligence Magazine - August 2022 - 25
IEEE Computational Intelligence Magazine - August 2022 - 26
IEEE Computational Intelligence Magazine - August 2022 - 27
IEEE Computational Intelligence Magazine - August 2022 - 28
IEEE Computational Intelligence Magazine - August 2022 - 29
IEEE Computational Intelligence Magazine - August 2022 - 30
IEEE Computational Intelligence Magazine - August 2022 - 31
IEEE Computational Intelligence Magazine - August 2022 - 32
IEEE Computational Intelligence Magazine - August 2022 - 33
IEEE Computational Intelligence Magazine - August 2022 - 34
IEEE Computational Intelligence Magazine - August 2022 - 35
IEEE Computational Intelligence Magazine - August 2022 - 36
IEEE Computational Intelligence Magazine - August 2022 - 37
IEEE Computational Intelligence Magazine - August 2022 - 38
IEEE Computational Intelligence Magazine - August 2022 - 39
IEEE Computational Intelligence Magazine - August 2022 - 40
IEEE Computational Intelligence Magazine - August 2022 - 41
IEEE Computational Intelligence Magazine - August 2022 - 42
IEEE Computational Intelligence Magazine - August 2022 - 43
IEEE Computational Intelligence Magazine - August 2022 - 44
IEEE Computational Intelligence Magazine - August 2022 - 45
IEEE Computational Intelligence Magazine - August 2022 - 46
IEEE Computational Intelligence Magazine - August 2022 - 47
IEEE Computational Intelligence Magazine - August 2022 - 48
IEEE Computational Intelligence Magazine - August 2022 - 49
IEEE Computational Intelligence Magazine - August 2022 - 50
IEEE Computational Intelligence Magazine - August 2022 - 51
IEEE Computational Intelligence Magazine - August 2022 - 52
IEEE Computational Intelligence Magazine - August 2022 - 53
IEEE Computational Intelligence Magazine - August 2022 - 54
IEEE Computational Intelligence Magazine - August 2022 - 55
IEEE Computational Intelligence Magazine - August 2022 - 56
IEEE Computational Intelligence Magazine - August 2022 - 57
IEEE Computational Intelligence Magazine - August 2022 - 58
IEEE Computational Intelligence Magazine - August 2022 - 59
IEEE Computational Intelligence Magazine - August 2022 - 60
IEEE Computational Intelligence Magazine - August 2022 - 61
IEEE Computational Intelligence Magazine - August 2022 - 62
IEEE Computational Intelligence Magazine - August 2022 - 63
IEEE Computational Intelligence Magazine - August 2022 - 64
IEEE Computational Intelligence Magazine - August 2022 - 65
IEEE Computational Intelligence Magazine - August 2022 - 66
IEEE Computational Intelligence Magazine - August 2022 - 67
IEEE Computational Intelligence Magazine - August 2022 - 68
IEEE Computational Intelligence Magazine - August 2022 - Cover3
IEEE Computational Intelligence Magazine - August 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com