SpyKing-Privacy-preserving framework for Spiking Neural Networks
- PMID: 40520505
- PMCID: PMC12162590
- DOI: 10.3389/fnins.2025.1551143
SpyKing-Privacy-preserving framework for Spiking Neural Networks
Abstract
Artificial intelligence (AI) models, frequently built using deep neural networks (DNNs), have become integral to many aspects of modern life. However, the vast amount of data they process is not always secure, posing potential risks to privacy and safety. Fully Homomorphic Encryption (FHE) enables computations on encrypted data while preserving its confidentiality, making it a promising approach for privacy-preserving AI. This study evaluates the performance of FHE when applied to DNNs and compares it with Spiking Neural Networks (SNNs), which more closely resemble biological neurons and, under certain conditions, may achieve superior results. Using the SpyKing framework, we analyze key challenges in encrypted neural computations, particularly the limitations of FHE in handling non-linear operations. To ensure a comprehensive evaluation, we conducted experiments on the MNIST, FashionMNIST, and CIFAR10 datasets while systematically varying encryption parameters to optimize SNN performance. Our results show that FHE significantly increases computational costs but remains viable in terms of accuracy and data security. Furthermore, SNNs achieved up to 35% higher absolute accuracy than DNNs on encrypted data with low values of the plaintext modulus t. These findings highlight the potential of SNNs in privacy-preserving AI and underscore the growing need for secure yet efficient neural computing solutions.
Keywords: Deep Neural Network (DNN); Homomorphic Encryption (HE); LeNet5; Spiking Neural Network (SNN); machine learning; privacy-preserving; safety; security.
Copyright © 2025 Nikfam, Marchisio, Martina and Shafique.
Conflict of interest statement
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Figures




















References
-
- Acar A., Aksu H., Uluagac A. S., Conti M. (2018). A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput. Surv. 51, 1–79. 10.1145/3214303 - DOI
-
- Amirsoleimani A., Ahmadi M., Ahmadi A., Boukadoum M. (2016). “Brain-inspired pattern classification with memristive neural network using the hodgkin-huxley neuron,” in 2016 IEEE International Conference on Electronics, Circuits and Systems, ICECS 2016 (Monte Carlo: IEEE; ), 81–84.
-
- Barni M., Orlandi C., Piva A. (2006). “A privacy-preserving protocol for neural-network-based computation,” in Proceedings of the 8th Workshop on Multimedia & Security, MM&Sec 2006, eds. S. Voloshynovskiy, J. Dittmann, and J. Fridrich (Geneva: ACM; ), 146–151.
-
- Bonnoron G., Fontaine C., Gogniat G., Herbert V., Lapôtre V., Migliore V., et al. (2017). “Somewhat/fully homomorphic encryption: Implementation progresses and challenges,” in Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, eds. S. E. Hajji, A. Nitaj, and E. M. Souidi (Rabat: Springer; ), 68–82.
-
- Bos J. W., Lauter K. E., Loftus J., Naehrig M. (2013). “Improved security for a ring-based fully homomorphic encryption scheme,” in IACR Cryptol. Arch, 75.