• Skip to main content
  • Skip to primary navigation
  • Departments
    • Bioengineering
    • Civil and Environmental Engineering
    • Electrical Engineering and Computer Sciences
    • Industrial Engineering and Operations Research
    • Materials Science and Engineering
    • Mechanical Engineering
    • Nuclear Engineering
    • Aerospace program
    • Engineering Science program
  • News
    • Berkeley Engineer magazine
    • Social media
    • News videos
    • News digest (email)
    • Press kit
  • Events
    • Events calendar
    • Commencement
    • Homecoming
    • Cal Day
    • View from the Top
    • Kuh Lecture Series
    • Minner Lecture
  • College directory
  • For staff & faculty
Berkeley Engineering

Educating leaders. Creating knowledge. Serving society.

  • About
    • Facts & figures
    • Rankings
    • Mission & values
    • Equity & inclusion
    • Voices of Berkeley Engineering
    • Leadership team
    • Milestones
    • Facilities
    • Maps
  • Admissions
    • Undergraduate admissions
    • Graduate admissions
    • New students
    • Visit
    • Maps
    • Admissions events
    • K-12 outreach
  • Academics
    • Undergraduate programs
    • Majors & minors
    • Undergraduate Guide
    • Graduate programs
    • Graduate Guide
    • Innovation & entrepreneurship
    • Kresge Engineering Library
    • International programs
    • Executive education
  • Students
    • New students
    • Advising & counseling
    • ESS programs
    • CAEE academic support
    • Student life
    • Wellness & inclusion
    • Undergraduate Guide
    • > Degree requirements
    • > Policies & procedures
    • Forms & petitions
    • Resources
  • Research & faculty
    • Centers & institutes
    • Undergrad research
    • Faculty
  • Connect
    • Alumni
    • Industry
    • Give
    • Stay in touch
Home > News > For your eyes only
stock image of padlock with binary digits in repeating patternBerkeley researchers have devised a practical way to keep data secure while training neural networks. (Photo by iStock)

For your eyes only

A faster, more secure approach to machine learning helps safeguard private information
August 10, 2022 by Marni Ellery

Keeping sensitive data safe has sometimes come at the expense of speed when training machines to perform automated tasks like biometric authentication and financial fraud detection. Now, Berkeley researchers have solved this issue by devising a practical way to keep data secure while training neural networks.

In a study presented at the 2022 USENIX Security Symposium, Raluca Ada Popa, associate professor of electrical engineering and computer sciences, and her Ph.D. student, Jean-Luc Watson, described their innovative privacy-preserving approach to machine learning. They introduced a new platform, dubbed Piranha, that harnesses the speed of graphics processing units (GPUs) to train a realistic neural network on encrypted data for the first time.

Raluca Ada Popa, associate professor of electrical engineering and computer sciences

Raluca Ada Popa, associate professor of electrical engineering and computer sciences (Photo by Adam Lau/Berkeley Engineering)

Neural networks make good machine-learning models because they act like neurons in our brains to recognize patterns in data. But neural networks are very complex and, until now, training them with encrypted data would require an unfeasible amount of computing power.

“Even though people have wanted to do this for at least 20 years, training a realistic neural network model while keeping the data encrypted has not been practical,” said Popa. “The key was to make GPUs work with encrypted computation.”

GPUs can process large amounts of data simultaneously, making them ideal for high-performance computing and deep-learning applications. While they can be used to quickly train neural networks on plain text, they do not work with encrypted data. Encrypted data is incompatible with GPUs because it uses integers instead of floats — another kind of numerical data — and accesses memory in non-standard ways.

Piranha addresses these issues with a three-layer architecture that allows applications to interoperate with any cryptographic protocol.

The researchers showed that they could train a realistic neural network, end to end, on encrypted data in a little over a day, a significant performance gain over previous approaches. They estimated that accomplishing the same task on Falcon, a state-of-the-art predecessor to Piranha, would have required 14 days, making it prohibitively expensive and impractical.

Jean Luc Watson

Jean-Luc Watson (Photo courtesy Jean-Luc Watson)

“With Piranha, we not only trained a realistic network for the first time with encrypted data, but we also improved performance by 16 to 48 times,” said Popa.

According to Watson, lead author of the study, Piranha delivers another advantage in addition to speed: Users do not need GPU expertise.

“All you have to do is bring your cryptographic protocols to Piranha and then program on top of it. That’s why we say it’s really a platform,” said Watson. “In this study, we implemented three protocols on top of Piranha to show that it works, but you could implement any protocols you wanted on top of it and still get the same acceleration benefits.”

For Popa and her team, which also included co-author and postdoctoral researcher Sameer Wagh, Piranha is the first step toward making secure computation accessible to a host of applications that involve training machines on sensitive data, from healthcare to cryptocurrency.

“Our contribution goes even beyond training the first realistic network more than an order of magnitude faster,” said Popa. “We showed how encrypted computation in general can take advantage of GPUs, which unlock faster encrypted computation for many other use cases.”

Topics: Electrical engineering, AI & robotics, Security & privacy
  • Contact
  • Give
  • Privacy
  • UC Berkeley
  • Accessibility
  • Nondiscrimination
  • instagram
  • X logo
  • linkedin
  • facebook
  • youtube
© 2025 UC Regents