Statistical learning based fully homomorphic encryption on encrypted data

被引:13
|
作者
Jiang, Linzhi [1 ,2 ]
Xu, Chunxiang [1 ]
Wang, Xiaofang [3 ]
Lin, Chao [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
[2] West AnHui Univ, Sch Finance & Math, Lu An 237012, Peoples R China
[3] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[4] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Statistic learning; Comparison on encrypted data; Fully homomorphic encryption; RLWE;
D O I
10.1007/s00500-016-2296-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Statistical learning has been widely used in many fields, such as science, engineering and finance, to extract important patterns, trends, and understand "what the data say". Privacy of statistical learning, i.e., user and sensitive data, is significant problem of performing computation, especially outsourcing cloud computing. Some fully homomorphic encryption schemes can achieve computation on the encrypted data, but most of them are lack of efficiency. Fully homomorphic encryption based on learning with errors over rings (RLWE) supports a finite number of addition and multiplication on the encrypted data, thus can be viewed as the polynomial computation in cyclotomic fields. Computation on the encrypted data can be converted into computation associated with polynomial. So, fully homomorphic encryption from RLWE is very efficient relative to other schemes. Our contribution includes two aspects. Firstly, we show a scheme to represent the training and testing data for statistical learning. The proposed scheme firstly transforms the data into integer and then encodes them into polynomial so that the encryption, decryption and homomorphic operation can be performed efficiently. We also carefully choose the parameters of fully homomorphic encryption from RLWE to meet the requirement of efficiency. User only needs to upload the encrypted data to cloud server, and then the server trains and tests the encrypted data, returns the analysis and prediction results to user. Secondly, we present a comparison scheme on the encrypted data for statistical learning algorithms, which is security on the known plain-text attack and ciphertext only attack model.
引用
收藏
页码:7473 / 7483
页数:11
相关论文
共 50 条
  • [31] Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain
    Li, Jingxuan
    Liang, Xingyuan
    Dai, Ceyu
    Xiang, Shijun
    ENTROPY, 2019, 21 (07)
  • [32] Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud
    Chatterjee, Ayantika
    Sengupta, Indranil
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (01) : 287 - 300
  • [33] Fully Homomorphic Encryption Based On the Parallel Computing
    Tan, Delin
    Wang, Huajun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 497 - 522
  • [34] Fully-homomorphic Encryption Based SPIR
    Zhong, Hong
    Yi, Lei
    Zhao, Yu
    Yuan, Xianping
    Sha, Xianjun
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [35] On Compare-and-Swap Optimization for Fully Homomorphic Encrypted Data
    Huang, Chien-Chih
    Ji, Jyun-Neng
    Shieh, Ming-Der
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [36] A Faster Fully Homomorphic Encryption Scheme in Big Data
    Wang, Dan
    Guo, Bing
    Shen, Yan
    Cheng, Shun-Jun
    Lin, Yong-Hong
    2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2017, : 350 - 354
  • [37] Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs
    Al Badawi, Ahmad
    Jin, Chao
    Lin, Jie
    Mun, Chan Fook
    Jie, Sim Jun
    Tan, Benjamin Hong Meng
    Nan, Xiao
    Aung, Khin Mi Mi
    Chandrasekhar, Vijay Ramaseshan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (03) : 1330 - 1343
  • [38] Identity-based fully homomorphic encryption from learning with error problem
    Guang, Yan
    Zhu, Yue-Fei
    Fei, Jin-Long
    Gu, Chun-Xiang
    Zheng, Yong-Hui
    Guang, Y., 1600, Editorial Board of Journal on Communications (35): : 111 - 117
  • [39] High Payload Reversible Data Hiding for Encrypted Image with Homomorphic Encryption
    LI Xinyan
    MOU Huajian
    WuhanUniversityJournalofNaturalSciences, 2020, 25 (05) : 445 - 451
  • [40] Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering
    Ren, Fang
    Hao, Yanli
    Pang, Kexin
    Wu, Ziyi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 40607 - 40627