A Study on a DDH-Based Keyed Homomorphic Encryption Suitable to Machine Learning in the Cloud

被引:0
|
作者
Tsuruta, Takuya [1 ]
Araki, Shunsuke [1 ]
Miyazaki, Takeru [2 ]
Uehara, Satoshi [3 ]
Kakizaki, Ken'ichi [1 ]
机构
[1] Kyushu Inst Technol, Fukuoka, Japan
[2] Kyushu Inst Informat Sci, Fukuoka, Japan
[3] Univ Kitakyushu, Fukuoka, Japan
关键词
keyed homomorphic public key encryption; machine learning;
D O I
10.1109/ICCE-TAIWAN55306.2022.9869098
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Homomorphic encryption is suitable for a machine learning in the cloud such as a privacy-preserving machine learning. However, ordinary homomorphic public key encryption has a problem that public key holders can generate ciphertexts and anyone can execute homomorphic operations. In this paper, we will propose a solution based on the Keyed Homomorphic-Public Key Encryption proposed by Emura et al.
引用
收藏
页码:167 / 168
页数:2
相关论文
共 50 条
  • [31] A Federated Learning Framework Based on CSP Homomorphic Encryption
    Zeng, Ran
    Mi, Bo
    Huang, Darong
    2023 IEEE 12TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE, DDCLS, 2023, : 196 - 201
  • [32] Privacy Preserving Extreme Learning Machine Using Additively Homomorphic Encryption
    Kuri, Shohei
    Hayashi, Takuya
    Omori, Toshiaki
    Ozawa, Seiichi
    Aono, Yoshinori
    Le Trieu Phong
    Wang, Lihua
    Moriai, Shiho
    2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, : 1350 - 1357
  • [33] The adaptive distributed learning based on homomorphic encryption and blockchain
    杨睿哲
    ZHAO Xuehui
    ZHANG Yanhua
    SI Pengbo
    TENG Yinglei
    High Technology Letters, 2022, 28 (04) : 337 - 344
  • [34] Flexible privacy-preserving machine learning: When searchable encryption meets homomorphic encryption
    Jia, Haixin
    Aldeen, Mohammed S.
    Zhao, Chuan
    Jing, Shan
    Chen, Zhenxiang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (11) : 9173 - 9191
  • [35] Assessment of Cloud-based Health Monitoring using Homomorphic Encryption
    Kocabas, Ovunc
    Soyata, Tolga
    Couderc, Jean-Philippe
    Aktas, Mehmet
    Xia, Jean
    Huang, Michael
    2013 IEEE 31ST INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2013, : 443 - 446
  • [36] Cloud-based Private Querying of Databases by Means of Homomorphic Encryption
    Abbar, Yassine
    Aubry, Pascal
    Barry, Thierno
    Carpov, Sergiu
    Mallick, Sayanta
    Krichen, Mariem
    Ligier, Damien
    Shpak, Sergey
    Sirdey, Renaud
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 123 - 131
  • [37] A Secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing
    Zhang, Yan
    Zhuo, Li
    Peng, Yuanfan
    Zhang, Jing
    2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 269 - 274
  • [38] Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
    Wang, Na
    Zhou, Wen
    Wang, Jingjing
    Guo, Yifan
    Fu, Junsong
    Liu, Jianwei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2454 - 2469
  • [39] Cloud-based Full Homomorphic Encryption Algorithm by Gene Matching
    Li, Pingping
    Zhang, Feng
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2024, 20 (04): : 432 - 441
  • [40] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,