Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining

被引:4
|
作者
Guo, Guanglai [1 ]
Zhu, Yan [1 ]
Chen, E. [1 ]
Yu, Ruyun [2 ]
Zhang, Lejun [3 ]
Lv, Kewei [4 ,5 ]
Feng, Rongquan [6 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Cyberspace Secur Co Ltd, China Elect Technol Res Inst, Beijing 10085, Peoples R China
[3] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[5] Chinese Acad Sci, Inst Informat Engn, Beijing 100193, Peoples R China
[6] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Protocols; Reliability; Privacy; Homomorphic encryption; Distributed databases; Computational modeling; Error detection; homomorphic encryption (HE); multisource data mining; privacy preservation; reliability; secure multiparty computation; ASSOCIATION RULES;
D O I
10.1109/TR.2023.3246563
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we address the problem of data privacy in multisource data mining. To do it, we present a new multiparty fully homomorphic encryption (MP-FHE) scheme, in which all participants are completely fair to perform the same computation. At first, the proposed MP-FHE scheme is divided into five stages (i.e., calculation, configuration, recombination, resharing, and reconstruction stage) to achieve the unified computation form of addition and multiplication. Meanwhile, random bivariate polynomials and commutative encryption are used to achieve the degree reduction of polynomials and the continuity of computation. Moreover, we prove that the scheme meets result consistency and program termination under the fail-stop adversary model. Especially, three kinds of error detection criteria are presented to find errors in three different stages (i.e., recombination, resharing, and reconstruction stage), which provides the monitor basis for the fail-stop adversary model. In addition, the MP-FHE scheme is applied into privacy preserving k-means clustering algorithm. Finally, we evaluate the computation and communication performance of our scheme from both theoretical and experimental aspects, and the evaluation results show that the scheme is efficient enough for multisource data mining.
引用
收藏
页码:1308 / 1323
页数:16
相关论文
共 50 条
  • [41] Effectiveness of Fully Homomorphic Encryption to Preserve the Privacy of Biometric Data
    Torres, Wilson Abel Alberto
    Bhattacharjee, Nandita
    Srinivasan, Bala
    16TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS 2014), 2014, : 152 - 158
  • [42] A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption
    Arazzi, Marco
    Nicolazzo, Serena
    Nocera, Antonino
    INFORMATION SYSTEMS FRONTIERS, 2023, 27 (1) : 367 - 390
  • [43] Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption
    Goswami, Utsav
    Wang, Kevin
    Nguyen, Gabriel
    Lagesse, Brent
    2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
  • [44] Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
    Ruixiao Li
    Ishimaki, Yu
    Yamana, Hayato
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), 2020, : 315 - 322
  • [45] Privacy-preserving biometrics authentication systems using fully homomorphic encryption
    Torres, Wilson Abel Alberto
    Bhattacharjee, Nandita
    Srinivasan, Bala
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2015, 11 (02) : 151 - 168
  • [46] smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
    Solomon, Ravital
    Weber, Rick
    Almashaqbeh, Ghada
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 309 - 331
  • [47] Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption
    Kim, Sangwook
    Omori, Masahiro
    Hayashi, Takuya
    Omori, Toshiaki
    Wang, Lihua
    Ozawa, Seiichi
    NEURAL INFORMATION PROCESSING (ICONIP 2018), PT IV, 2018, 11304 : 349 - 358
  • [48] Fully Homomorphic Encryption with Table Lookup for Privacy-Preserving Smart Grid
    Li, Ruixiao
    Ishimaki, Yu
    Yamana, Hayato
    2019 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2019), 2019, : 19 - 24
  • [49] Privacy-Preserving Blind Auction Protocol Using Fully Homomorphic Encryption
    Im, Jong-Hyuk
    Youn, Taek-Young
    Lee, Mun-Kyu
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2598 - 2600
  • [50] Privacy-Preserving Functional IP Verification utilizing Fully Homomorphic Encryption
    Konstantinou, Charalambos
    Keliris, Anastasis
    Maniatakos, Michail
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 333 - 338