A Study on a DDH-Based Keyed Homomorphic Encryption Suitable to Machine Learning in the Cloud

被引:0
|
作者
Tsuruta, Takuya [1 ]
Araki, Shunsuke [1 ]
Miyazaki, Takeru [2 ]
Uehara, Satoshi [3 ]
Kakizaki, Ken'ichi [1 ]
机构
[1] Kyushu Inst Technol, Fukuoka, Japan
[2] Kyushu Inst Informat Sci, Fukuoka, Japan
[3] Univ Kitakyushu, Fukuoka, Japan
关键词
keyed homomorphic public key encryption; machine learning;
D O I
10.1109/ICCE-TAIWAN55306.2022.9869098
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Homomorphic encryption is suitable for a machine learning in the cloud such as a privacy-preserving machine learning. However, ordinary homomorphic public key encryption has a problem that public key holders can generate ciphertexts and anyone can execute homomorphic operations. In this paper, we will propose a solution based on the Keyed Homomorphic-Public Key Encryption proposed by Emura et al.
引用
收藏
页码:167 / 168
页数:2
相关论文
共 50 条
  • [21] Private pathological assessment via machine learning and homomorphic encryption
    Al Badawi, Ahmad
    Bin Yusof, Mohd Faizal
    BIODATA MINING, 2024, 17 (01):
  • [22] Parallel Speech Encryption Method Based on BGN Homomorphic Encryption in Cloud Computing
    Zhang, Qiu-yu
    Wang, Kai
    International Journal of Network Security, 2024, 26 (06): : 943 - 956
  • [23] Recent advances of privacy-preserving machine learning based on(Fully) Homomorphic Encryption
    Cheng Hong
    Security and Safety, 2025, 4 (01) : 49 - 55
  • [24] Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
    Ding, Yong
    Li, Xiumin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 568 - 571
  • [25] Ciphertext Retrieval Technology of Homomorphic Encryption Based on Cloud Pretreatment
    Gong, Changqing
    Xiao, Yun
    Li, Mengfei
    Han, Shoufei
    Lin, Na
    Guo, Zhenzhou
    NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 741 - 751
  • [26] Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption
    Mohammed, Mohammed A.
    Abed, Fadhil S.
    ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2020, 8 (02): : 40 - 47
  • [27] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488
  • [28] SeCPlat: A Secure Computation Platform Based on Homomorphic Encryption in Cloud
    Zhao, Fanyou
    Teng, Yiping
    Yang, Zheng
    Xie, Yuyang
    Liu, Jiayv
    Qi, Jiawei
    WEB AND BIG DATA, PT IV, APWEB-WAIM 2023, 2024, 14334 : 513 - 518
  • [29] SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME
    Li, Jian
    Chen, Sicong
    Song, Danjie
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 224 - 227
  • [30] Cloud-Based Quadratic Optimization With Partially Homomorphic Encryption
    Alexandru, Andreea B.
    Gatsis, Konstantinos
    Shoukry, Yasser
    Seshia, Sanjit A.
    Tabuada, Paulo
    Pappas, George J.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) : 2357 - 2364