Private-Key Fully Homomorphic Encryption for Private Classification

被引:4
|
作者
Wood, Alexander [1 ,2 ,3 ,4 ]
Shpilrain, Vladimir [5 ,6 ]
Najarian, Kayvan [2 ,3 ,4 ]
Mostashari, Ali [7 ]
Kahrobaei, Delaram [1 ,8 ]
机构
[1] CUNY, Grad Ctr, Dept Comp Sci, New York, NY 10016 USA
[2] Univ Michigan, Dept Computat Med & Bioinformat, Ann Arbor, MI 48109 USA
[3] Univ Michigan, Ctr Integrat Res Crit Care, Ann Arbor, MI 48109 USA
[4] Univ Michigan, Emergency Med Dept, Ann Arbor, MI 48109 USA
[5] CUNY, Grad Ctr, Dept Math, New York, NY USA
[6] CUNY City Coll, Dept Math, New York, NY USA
[7] LifeNome Inc, New York, NY USA
[8] NYU, Tandon Sch Engn, Dept Comp Sci, New York, NY USA
来源
关键词
Fully homomorphic encryption; Data privacy; Machine learning;
D O I
10.1007/978-3-319-96418-8_56
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Fully homomophic encryption enables private computation over sensitive data, such as medical data, via potentially quantum-safe primitives. In this extended abstract we provide an overview of an implementation of a private-key fully homomorphic encryption scheme in a protocol for private Naive Bayes classification. This protocol allows a data owner to privately classify her data point without direct access to the learned model. We implement this protocol by performing privacy-preserving classification of breast cancer data as benign or malignant.
引用
收藏
页码:475 / 481
页数:7
相关论文
共 50 条
  • [41] Private genome analysis through homomorphic encryption
    Miran Kim
    Kristin Lauter
    BMC Medical Informatics and Decision Making, 15
  • [42] Private genome analysis through homomorphic encryption
    Kim, Miran
    Lauter, Kristin
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2015, 15
  • [43] A Fully Homomorphic Encryption scheme with Symmetric Keys with Application to Private Data Processing in Clouds
    Gupta, C. P.
    Sharma, Iti
    2013 FOURTH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2013,
  • [44] You Had to Be There: Private Video Sharing for Mobile Phones using Fully Homomorphic Encryption
    Lagesse, Brent
    Nguyen, Gabriel
    Goswami, Utsav
    Wu, Kevin
    2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2021, : 730 - 735
  • [45] Private-key algebraic-code encryption with errors up to (d(min)-1) of the code
    AlJabri, AK
    CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 1997, 22 (01): : 25 - 28
  • [46] Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function
    Tseng, Yi-Fan
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tso, Raylin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [47] Fully Homomorphic Encryption for Classification in Machine Learning
    Arita, Seiko
    Nakasato, Shota
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 435 - 438
  • [48] Fast Private Set Intersection from Homomorphic Encryption
    Chen, Hao
    Laine, Kim
    Rindal, Peter
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1243 - 1255
  • [49] Homomorphic Encryption atWork for Private Analysis of Security Logs
    Boudguiga, Aymen
    Stan, Oana
    Sedjelmaci, Hichem
    Carpov, Sergiu
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 515 - 523
  • [50] Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
    Brakerski, Zvika
    Komargodski, Ilan
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 852 - 880