Computer Science ›› 2018, Vol. 45 ›› Issue (4): 46-52.doi: 10.11896/j.issn.1002-137X.2018.04.006

Previous Articles     Next Articles

Survey on Application of Homomorphic Encryption in Encrypted Machine Learning

CUI Jian-jing, LONG Jun, MIN Er-xue, YU Yang and YIN Jian-ping   

  • Online:2018-04-15 Published:2018-05-11

Abstract: Nowadays,the existing machine learning algorithms can not analyze and calculate the encrypted data,at the same time,many areas(such as medical industry,financial industry) strongly require data to keep private and secure while analyzed and calculated by untrusted person or company.All these lead to the generation and development of encrypted machine learning.Homomorphic encryption is the primary idea of solving this problem by ensuring that calculations on the cipher text without decrypting,which can result in the same result of the same calculations on the plain text.This paper conducted a survey on application of homomorphic encryption in encrypted machine learning.This work mainly introduced three kinds of algorithms(encrypted neural network,encrypted K-nearest Neighbor,encrypted decision tree and completely random forest) which are used to realize encrypted machine learning with homomorphic encryption,and also analyzed the scheme design from the aspects of correctness,security and efficiency.This paper summarized the construction of different encrypted machine learning algorithms,pointed out the key problems of homomorphic encryption for encrypted machine learning and the content that needs to be focused on in further studies,and provided some referen-ces for homomorphic encryption and encrypted machine learning.

Key words: Homomorphic encryption,Encrypted machine learning,Privacy preserving data mining

[1] LIU Q,ZHOU S,ZHU C,et al.MI-ELM[J].Neurocomputing,2016,173(3):1044-1053.
[2] LIU X,ZHOU L,WANG L,et al.An efficient radius-incorporated MKL algorithm for Alzheimer’s disease prediction[J].Pattern Recognition,2015,48(7):2141-2150.
[3] RIVEST R L,ADLEMAN L,DERTOUZOS M L.On databanks and privacy homomorphisms[J].Foundations of Secure Computation,1978,4(11):169-180.
[4] GENTRY C.Fully homomorphic encryption using ideal lattices[C]∥ACM Symposium on Theory of Computing(STOC 2009).Bethesda,MD,USA,BLP,2009:169-178.
[5] BRAKERSKI Z,VAIKUNTANATHAN V.Fully homomorphicencryption from ring-LWE and security for key dependent messages[C]∥Annual Cryptology Conference.Springer,Berlin,Heidelberg,2011:505-524.
[6] CORON J S,BASTIEN,MANDAL A,et al.Fully homomorphic encryption over the integers with shorter public keys[C]∥Conference on Advances in Cryptology.Springer-Verlag,2011:487-504.
[7] BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V.(Le-veled) fully homomorphic encryption without bootstrapping[C]∥Innovations in Theoretical Computer Science Conference.ACM,2012:309-325.
[8] ZHANG W K,YANG Y,YANG Y.Research of Secure Multi-party Computation [J].Information Security and Communications Privacy,2014(1):97-99.(in Chinese) 张文科,杨勇,杨宇.安全多方计算研究[J].信息安全与通信保密,2014(1):97-99.
[9] BARNI M,ORLANDI C,PIVA A.A privacy-preserving protocol for neural-network-based computation[C]∥Proceedings of the 8th Workshop on Multimedia and Security.ACM,2006:146-151.
[10] ORLANDI C,PIVA A,BARNI M.Oblivious neural network computing via homomorphic encryption[J].EURASIP Journal on Information Security,2007,7(1):037343.
[11] BARNI M,FAILLA P,LAZZERETTI R,et al.Privacy-Preserving ECG Classification With Branching Programs and Neural Networks[J].IEEE Transactions on Information Forensics & Security,2011,6(2):452-468.
[12] DOWLIN N,GILAD-BACHRACH R,LAINE K,et al.Cryp-tonets:Applying neural networks to encrypted data with high throughput and accuracy[C]∥International Conference on Machine Learning(ICML).2016:201-210.
[13] PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[C]∥International Conference on the Theory and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,1999:223-238.
[14] DAMG,RD I,JURIK M.A Generalisation,a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System[C]∥International Workshop on Practice and Theory in Public Key Cryptography:Public Key Cryptography.Springer-Verlag,2001:119-136.
[15] BOS J W,LAUTER K,LOFTUS J,et al.Improved security for a ring-based fully homomorphic encryption scheme[C]∥IMA International Conference on Cryptography and Coding.Sprin-ger,Berlin,Heidelberg,2013:45-64.
[16] GOLDREICH O.Secure multi-party computation(working draft) version 1[J].Multimodal Output Generation,2008,2(3):1-10.
[17] LIVNI R,SHALEV-SHWARTZ S,SHAMIR O.On the computational efficiency of training neural networks[C]∥Advances in Neural Information Processing Systems.2014:855-863.
[18] QI Y,ATALLAH M J.Efficient Privacy-Preserving k-Nearest Neighbor Search[C]∥International Conference on Distributed Computing Systems.IEEE,2008:311-319.
[19] ZHAN J Z,CHANG L W,MATWIN S.Privacy preserving k-nearest neighbor classification[J].IJ Network Security,2005,1(1):46-51.
[20] KUMAR P,SINGH M D,SAXENA A.HEMIN:A crypto-graphic approach for private k-NN classification[C]∥International Conference on Data Mining.Las Vegas,USA,2008:500-505.
[21] ZHU J.A New Scheme to Privacy-Preserving Collaborative Data Mining[C]∥International Conference on Information Assurance and Security.IEEE,2009:468-471.
[22] UTSUNOMIYA Y,TOYODA K,SASASE I.LPCQP:Light-weight Private Circular Query Protocol with Divided POI-table and Somewhat Homomorphic Encryption for Privacy-Preserving k-NN Search[J].Journal of Information Processing,2016,24(1):109-122.
[23] BREIMAN L.Random Forests[J].Machine Learning,2001,45(1):5-32.
[24] GEURTS P,ERNST D,WEHENKEL L.Extremely randomized trees[J].Machine Cncrypted Data,2006,63(1):3-42.
[25] CUTLER A,ZHAO G.Pert-perfect random tree ensembles[J].Computing Science and Statistics,2001,3:490-497.
[26] ZHAN J.Using Homomorphic Encryption For Privacy-Preser-ving Collaborative Decision Tree Classification[C]∥IEEE Symposium on Computational Intelligence and Data Mining,2007(CIDM 2007).IEEE,2007:637-645.
[27] ZHAN J.Privacy-preserving collaborative data mining[J].IEEE Computational Intelligence Magazine,2008,3(2):31-41.
[28] BARNI M,FAILLA P,LAZZERETTI R,et al.Privacy-Preserving ECG Classification with Branching Programs and Neural Networks[J].IEEE Transactions on Information Forensics & Security,2011,6(2):452-468.
[29] BOST R,POPA R A,TU S,et al.Machine Learning Classification over Encrypted Data[C]∥Network and Distributed System Security Symposium.2014.
[30] ASLETT L J M,ESPERANCA P M,HOLMES C C.Encrypted statistical machine learning:new privacy preserving methods[J].arXiv preprint arXiv:1508.06845,5.
[31] FAN J,VERCAUTEREN F.Somewhat Practical Fully Homomorphic Encryption[J].IACR Cryptology ePrint Archive,2012,2:144.
[32] GOLDWASSER S,MICALI S.Probabilistic encryption & how to play mental poker keeping secret all partial information[C]∥Fourteenth ACM Symposium on Theory of Computing.ACM,1982:365-377.
[33] SHAI HALEVI.Helib-an implementation of homomorphicencryption.https://github.com/shaih/HElib.
[34] RAJU R,KOMALAVALLI R,KESAVAKUMAR V.Privacymaintenance collaborative data mining-a practical approach[C]∥2009 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET).IEEE,2009:307-311.
[35] LIU X H,Research on Algorithms for privacy-preserving Support Vector Machines[D].Qingdao:University of Science and Technology in Shandong Province,2011.(in Chinese) 刘晓红.隐私保护支持向量机的算法研究[D].青岛:山东科技大学,2011.
[36] GRAEPEL T,LAUTER K,NAEHRIG M.ML confidential:machine learning on encrypted data[C]∥International Con-ference on Information Security and Cryptology.Springer-Verlag,2012:1-21.
[37] YAO Y C,SONG L,E C.Research on Homomorphic Encryption based distributed K-means Clustering Algorithm[J].Computer Technology and Development,2017,27(2):81-85.(in Chinese) 姚禹丞,宋玲,鄂驰.同态加密的分布式K均值聚类算法研究[J].计算机技术与发展,2017,27(2):81-85.
[38] LI S D,DOU J W,WANG D S.Homomorphic Encryption Algorithm and its Application in Cloud Security[J].Journal of Computer Research and Development,2015,52(6):1378-1388.(in Chinese) 李顺东,窦家维,王道顺.同态加密算法及其在云安全中的应用[J].计算机研究与发展,2015,52(6):1378-1388.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .