-
Notifications
You must be signed in to change notification settings - Fork 147
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: let's have compressed keys as an option [WIP] #519
Conversation
eg,
E AssertionError: Not equal to tolerance rtol=0, atol=0.001 |
d926f43
to
d3eb96e
Compare
please retry experiments with coming nightly (fixed in zama-ai/concrete#691) |
for now, I make it the default, but we can change that before merging.
d3eb96e
to
1c92647
Compare
Rebasing + using the new CP (which comes tomorrow, and has a fix for key compression) |
Can't test for now since concrete-python==2024.3.6 does not exist |
Trying to run https://github.com/zama-ai/concrete-ml/actions/workflows/update_licenses.yaml workflow even if Mac distribution is not there: I wonder if we need Mac for regular builds, I would say No |
The action fails because it tries to install CP for Mac |
At the same time, I have the impression that CP was not built for Linux as well, let's wait |
1c92647
to
553d995
Compare
553d995
to
0d332b4
Compare
Let's launch with the new nightly. |
Coverage passed ✅Coverage details
|
Tests are green now! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- I think we should only set "compress_keys" through the Configuration if that's possible
- We should find out if there is any runtime latency difference with / without compression
- We should set the proper default based on the previous question
@@ -632,6 +632,7 @@ def compile( | |||
global_p_error: Optional[float] = None, | |||
verbose: bool = False, | |||
inputs_encryption_status: Optional[Sequence[str]] = None, | |||
compress_evaluation_keys: bool = True, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would rather we set this through the configuration and keep only ML related params here
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
then, would be awesome to have a single place / class for crypto-related configs, and we would change just one place and it would apply to all models we support (linear, tree, qnn, torch). Maybe already the case!
As well there are runtime latency with compression, as you need to decompress on server side. You should have quicker key generation on client side but longest evaluation time on server side as the keys are decompressed on demand. |
Superseded by #726 |
[WIP for now]
let's check how it behaves, is there issues sometimes?