Private-Key Fully Homomorphic Encryption for Private Classification

被引:4
|
作者
Wood, Alexander [1 ,2 ,3 ,4 ]
Shpilrain, Vladimir [5 ,6 ]
Najarian, Kayvan [2 ,3 ,4 ]
Mostashari, Ali [7 ]
Kahrobaei, Delaram [1 ,8 ]
机构
[1] CUNY, Grad Ctr, Dept Comp Sci, New York, NY 10016 USA
[2] Univ Michigan, Dept Computat Med & Bioinformat, Ann Arbor, MI 48109 USA
[3] Univ Michigan, Ctr Integrat Res Crit Care, Ann Arbor, MI 48109 USA
[4] Univ Michigan, Emergency Med Dept, Ann Arbor, MI 48109 USA
[5] CUNY, Grad Ctr, Dept Math, New York, NY USA
[6] CUNY City Coll, Dept Math, New York, NY USA
[7] LifeNome Inc, New York, NY USA
[8] NYU, Tandon Sch Engn, Dept Comp Sci, New York, NY USA
来源
关键词
Fully homomorphic encryption; Data privacy; Machine learning;
D O I
10.1007/978-3-319-96418-8_56
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Fully homomophic encryption enables private computation over sensitive data, such as medical data, via potentially quantum-safe primitives. In this extended abstract we provide an overview of an implementation of a private-key fully homomorphic encryption scheme in a protocol for private Naive Bayes classification. This protocol allows a data owner to privately classify her data point without direct access to the learned model. We implement this protocol by performing privacy-preserving classification of breast cancer data as benign or malignant.
引用
收藏
页码:475 / 481
页数:7
相关论文
共 50 条
  • [1] Practical private-key fully homomorphic encryption in rings
    Gribov, Alexey
    Kahrobaei, Delaram
    Shpilrain, Vladimir
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2018, 10 (01) : 17 - 27
  • [2] Homomorphic Encryption: From Private-Key to Public-Key
    Rothblum, Ron
    [J]. THEORY OF CRYPTOGRAPHY, 2011, 6597 : 219 - 234
  • [3] ARRAY CODES FOR PRIVATE-KEY ENCRYPTION
    DESOUZA, RMC
    DESOUZA, JC
    [J]. ELECTRONICS LETTERS, 1994, 30 (17) : 1394 - 1396
  • [4] Function-Private Functional Encryption in the Private-Key Setting
    Zvika Brakerski
    Gil Segev
    [J]. Journal of Cryptology, 2018, 31 : 202 - 225
  • [5] Function-Private Functional Encryption in the Private-Key Setting
    Brakerski, Zvika
    Segev, Gil
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 306 - 324
  • [6] Private Machine Learning Classification Based on Fully Homomorphic Encryption
    Sun, Xiaoqiang
    Zhang, Peng
    Liu, Joseph K.
    Yu, Jianping
    Xie, Weixin
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 352 - 364
  • [7] Function-private functional encryption in the private-key setting
    Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot
    76100, Israel
    不详
    91904, Israel
    [J]. Lect. Notes Comput. Sci., (306-324):
  • [8] Function-Private Functional Encryption in the Private-Key Setting
    Brakerski, Zvika
    Segev, Gil
    [J]. JOURNAL OF CRYPTOLOGY, 2018, 31 (01) : 202 - 225
  • [9] On private-key encryption using product codes
    Sun, HM
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (06) : 439 - 450
  • [10] PRIVATE-KEY ENCRYPTION BASED ON CONCATENATION OF CODES
    ALJABRI, AK
    ALTHUKAIR, F
    MIRZA, A
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 1994, 141 (03): : 105 - 110