Statistical learning based fully homomorphic encryption on encrypted data

被引:13
|
作者
Jiang, Linzhi [1 ,2 ]
Xu, Chunxiang [1 ]
Wang, Xiaofang [3 ]
Lin, Chao [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
[2] West AnHui Univ, Sch Finance & Math, Lu An 237012, Peoples R China
[3] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[4] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Statistic learning; Comparison on encrypted data; Fully homomorphic encryption; RLWE;
D O I
10.1007/s00500-016-2296-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Statistical learning has been widely used in many fields, such as science, engineering and finance, to extract important patterns, trends, and understand "what the data say". Privacy of statistical learning, i.e., user and sensitive data, is significant problem of performing computation, especially outsourcing cloud computing. Some fully homomorphic encryption schemes can achieve computation on the encrypted data, but most of them are lack of efficiency. Fully homomorphic encryption based on learning with errors over rings (RLWE) supports a finite number of addition and multiplication on the encrypted data, thus can be viewed as the polynomial computation in cyclotomic fields. Computation on the encrypted data can be converted into computation associated with polynomial. So, fully homomorphic encryption from RLWE is very efficient relative to other schemes. Our contribution includes two aspects. Firstly, we show a scheme to represent the training and testing data for statistical learning. The proposed scheme firstly transforms the data into integer and then encodes them into polynomial so that the encryption, decryption and homomorphic operation can be performed efficiently. We also carefully choose the parameters of fully homomorphic encryption from RLWE to meet the requirement of efficiency. User only needs to upload the encrypted data to cloud server, and then the server trains and tests the encrypted data, returns the analysis and prediction results to user. Secondly, we present a comparison scheme on the encrypted data for statistical learning algorithms, which is security on the known plain-text attack and ciphertext only attack model.
引用
收藏
页码:7473 / 7483
页数:11
相关论文
共 50 条
  • [21] Fully Homomorphic Encryption for Classification in Machine Learning
    Arita, Seiko
    Nakasato, Shota
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 435 - 438
  • [22] Efficient Comparison and Swap on Fully Homomorphic Encrypted Data
    Ji, Jyun-Neng
    Shieh, Ming-Der
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [23] Enhancing Data Parallelism of Fully Homomorphic Encryption
    Martins, Paulo
    Sousa, Leonel
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 194 - 207
  • [24] An Encrypted Image Editing Scheme Based on Homomorphic Encryption
    Yang, Pan
    Gui, Xiaolin
    An, Jian
    Tian, Feng
    Wang, Jiachen
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2015, : 109 - 110
  • [25] Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
    Chan, Aldar C-F.
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 774 - 778
  • [26] An Efficient Search Algorithm for Large Encrypted Data by Homomorphic Encryption
    Kim, Pyung
    Jo, Eunji
    Lee, Younho
    ELECTRONICS, 2021, 10 (04) : 1 - 19
  • [27] Encrypted Image Classification with Low Memory Footprint Using Fully Homomorphic Encryption
    Rovida, Lorenzo
    Leporati, Alberto
    INTERNATIONAL JOURNAL OF NEURAL SYSTEMS, 2024, 34 (05)
  • [28] Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
    Alsaedi, Emad M.
    Farhan, Alaa Kadhim
    BAGHDAD SCIENCE JOURNAL, 2023, 20 (01) : 206 - 220
  • [29] Query based computations on encrypted data through homomorphic encryption in cloud computing security
    Biksham, V.
    Vasumathi, D.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3820 - 3825
  • [30] Deniable Fully Homomorphic Encryption from Learning with Errors
    Agrawal, Shweta
    Goldwasser, Shafi
    Mossel, Saleet
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 641 - 670