Private-Key Fully Homomorphic Encryption for Private Classification

被引:4
|
作者
Wood, Alexander [1 ,2 ,3 ,4 ]
Shpilrain, Vladimir [5 ,6 ]
Najarian, Kayvan [2 ,3 ,4 ]
Mostashari, Ali [7 ]
Kahrobaei, Delaram [1 ,8 ]
机构
[1] CUNY, Grad Ctr, Dept Comp Sci, New York, NY 10016 USA
[2] Univ Michigan, Dept Computat Med & Bioinformat, Ann Arbor, MI 48109 USA
[3] Univ Michigan, Ctr Integrat Res Crit Care, Ann Arbor, MI 48109 USA
[4] Univ Michigan, Emergency Med Dept, Ann Arbor, MI 48109 USA
[5] CUNY, Grad Ctr, Dept Math, New York, NY USA
[6] CUNY City Coll, Dept Math, New York, NY USA
[7] LifeNome Inc, New York, NY USA
[8] NYU, Tandon Sch Engn, Dept Comp Sci, New York, NY USA
来源
关键词
Fully homomorphic encryption; Data privacy; Machine learning;
D O I
10.1007/978-3-319-96418-8_56
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Fully homomophic encryption enables private computation over sensitive data, such as medical data, via potentially quantum-safe primitives. In this extended abstract we provide an overview of an implementation of a private-key fully homomorphic encryption scheme in a protocol for private Naive Bayes classification. This protocol allows a data owner to privately classify her data point without direct access to the learned model. We implement this protocol by performing privacy-preserving classification of breast cancer data as benign or malignant.
引用
收藏
页码:475 / 481
页数:7
相关论文
共 50 条
  • [31] Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
    Komargodski, Ilan
    Segev, Gil
    Yogev, Eylon
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 352 - 377
  • [32] Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
    Komargodski, Ilan
    Segev, Gil
    Yogev, Eylon
    JOURNAL OF CRYPTOLOGY, 2018, 31 (01) : 60 - 100
  • [33] Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
    Komargodski, Ilan
    Segev, Gil
    Yogev, Eylon
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9015 : 352 - 377
  • [34] Registration-Based Encryption: Removing Private-Key Generator from IBE
    Garg, Sanjam
    Hajiabadi, Mohammad
    Mahmoody, Mohammad
    Rahimi, Ahmadreza
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 689 - 718
  • [35] Private-key cryptosystem for CD and DVD
    Jiawook, RN
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION, 1998, 3456 : 45 - 50
  • [36] Single-Database Private Information Retrieval from Fully Homomorphic Encryption
    Yi, Xun
    Kaosar, Mohammed Golam
    Paulet, Russell
    Bertino, Elisa
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (05) : 1125 - 1134
  • [37] KEY MATRICES IN FULLY HOMOMORPHIC ENCRYPTION
    Habri, Hakim
    Chillali, Abdelhakim
    Boua, Abdelkarim
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2022, 54 : 35 - 50
  • [38] PRIVATE-KEY ALGEBRAIC-CODED CRYPTOSYSTEMS
    RAO, TRN
    NAM, KH
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 35 - 48
  • [39] PRIVATE-KEY ALGEBRAIC-CODE ENCRYPTIONS
    RAO, TRN
    NAM, KH
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1989, 35 (04) : 829 - 833
  • [40] Forward-security in private-key cryptography
    Bellare, M
    Yee, B
    TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 1 - 18