计算机科学 ›› 2018, Vol. 45 ›› Issue (4): 46-52.doi: 10.11896/j.issn.1002-137X.2018.04.006

• 2017年全国理论计算机科学学术年会 • 上一篇    下一篇

同态加密在加密机器学习中的应用研究综述

崔建京,龙军,闵尔学,于洋,殷建平   

  1. 国防科学技术大学计算机学院 长沙410073,国防科学技术大学计算机学院 长沙410073,国防科学技术大学计算机学院 长沙410073,国防科学技术大学计算机学院 长沙410073,国防科学技术大学计算机学院 长沙410073
  • 出版日期:2018-04-15 发布日期:2018-05-11
  • 基金资助:
    本文受国家自然科学基金项目(61105050)资助

Survey on Application of Homomorphic Encryption in Encrypted Machine Learning

CUI Jian-jing, LONG Jun, MIN Er-xue, YU Yang and YIN Jian-ping   

  • Online:2018-04-15 Published:2018-05-11

摘要: 现有的机器学习算法不能对加密后的数据进行分析计算,而很多领域如医疗、金融等又要求数据保持机密性和安全性,这促进了加密机器学习的产生和发展。同态加密技术是解决这一问题的主要思路,它可以保证在不解密的情况下对密文进行计算,使得解密后的结果与对明文执行相同计算得到的结果相同。文中对同态加密在加密机器学习中的 相关 应用研究进行了综述,主要介绍了目前用同态加密实现加密机器学习的3种算法(加密神经网络、加密k-NN、加密决策树和完全随机森林),并从正确性、安全性、执行效率方面分析了方案设计,总结并对比了不同加密机器学习算法的构造思路,指出了同态加密用于加密机器学习的关键问题和进一步研究需要关注的内容,为同态加密和加密机器学习提供参考。

关键词: 同态加密,加密机器学习,隐私保护数据挖掘

Abstract: Nowadays,the existing machine learning algorithms can not analyze and calculate the encrypted data,at the same time,many areas(such as medical industry,financial industry) strongly require data to keep private and secure while analyzed and calculated by untrusted person or company.All these lead to the generation and development of encrypted machine learning.Homomorphic encryption is the primary idea of solving this problem by ensuring that calculations on the cipher text without decrypting,which can result in the same result of the same calculations on the plain text.This paper conducted a survey on application of homomorphic encryption in encrypted machine learning.This work mainly introduced three kinds of algorithms(encrypted neural network,encrypted K-nearest Neighbor,encrypted decision tree and completely random forest) which are used to realize encrypted machine learning with homomorphic encryption,and also analyzed the scheme design from the aspects of correctness,security and efficiency.This paper summarized the construction of different encrypted machine learning algorithms,pointed out the key problems of homomorphic encryption for encrypted machine learning and the content that needs to be focused on in further studies,and provided some referen-ces for homomorphic encryption and encrypted machine learning.

Key words: Homomorphic encryption,Encrypted machine learning,Privacy preserving data mining

[1] LIU Q,ZHOU S,ZHU C,et al.MI-ELM[J].Neurocomputing,2016,173(3):1044-1053.
[2] LIU X,ZHOU L,WANG L,et al.An efficient radius-incorporated MKL algorithm for Alzheimer’s disease prediction[J].Pattern Recognition,2015,48(7):2141-2150.
[3] RIVEST R L,ADLEMAN L,DERTOUZOS M L.On databanks and privacy homomorphisms[J].Foundations of Secure Computation,1978,4(11):169-180.
[4] GENTRY C.Fully homomorphic encryption using ideal lattices[C]∥ACM Symposium on Theory of Computing(STOC 2009).Bethesda,MD,USA,BLP,2009:169-178.
[5] BRAKERSKI Z,VAIKUNTANATHAN V.Fully homomorphicencryption from ring-LWE and security for key dependent messages[C]∥Annual Cryptology Conference.Springer,Berlin,Heidelberg,2011:505-524.
[6] CORON J S,BASTIEN,MANDAL A,et al.Fully homomorphic encryption over the integers with shorter public keys[C]∥Conference on Advances in Cryptology.Springer-Verlag,2011:487-504.
[7] BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V.(Le-veled) fully homomorphic encryption without bootstrapping[C]∥Innovations in Theoretical Computer Science Conference.ACM,2012:309-325.
[8] ZHANG W K,YANG Y,YANG Y.Research of Secure Multi-party Computation [J].Information Security and Communications Privacy,2014(1):97-99.(in Chinese) 张文科,杨勇,杨宇.安全多方计算研究[J].信息安全与通信保密,2014(1):97-99.
[9] BARNI M,ORLANDI C,PIVA A.A privacy-preserving protocol for neural-network-based computation[C]∥Proceedings of the 8th Workshop on Multimedia and Security.ACM,2006:146-151.
[10] ORLANDI C,PIVA A,BARNI M.Oblivious neural network computing via homomorphic encryption[J].EURASIP Journal on Information Security,2007,7(1):037343.
[11] BARNI M,FAILLA P,LAZZERETTI R,et al.Privacy-Preserving ECG Classification With Branching Programs and Neural Networks[J].IEEE Transactions on Information Forensics & Security,2011,6(2):452-468.
[12] DOWLIN N,GILAD-BACHRACH R,LAINE K,et al.Cryp-tonets:Applying neural networks to encrypted data with high throughput and accuracy[C]∥International Conference on Machine Learning(ICML).2016:201-210.
[13] PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[C]∥International Conference on the Theory and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,1999:223-238.
[14] DAMG,RD I,JURIK M.A Generalisation,a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System[C]∥International Workshop on Practice and Theory in Public Key Cryptography:Public Key Cryptography.Springer-Verlag,2001:119-136.
[15] BOS J W,LAUTER K,LOFTUS J,et al.Improved security for a ring-based fully homomorphic encryption scheme[C]∥IMA International Conference on Cryptography and Coding.Sprin-ger,Berlin,Heidelberg,2013:45-64.
[16] GOLDREICH O.Secure multi-party computation(working draft) version 1[J].Multimodal Output Generation,2008,2(3):1-10.
[17] LIVNI R,SHALEV-SHWARTZ S,SHAMIR O.On the computational efficiency of training neural networks[C]∥Advances in Neural Information Processing Systems.2014:855-863.
[18] QI Y,ATALLAH M J.Efficient Privacy-Preserving k-Nearest Neighbor Search[C]∥International Conference on Distributed Computing Systems.IEEE,2008:311-319.
[19] ZHAN J Z,CHANG L W,MATWIN S.Privacy preserving k-nearest neighbor classification[J].IJ Network Security,2005,1(1):46-51.
[20] KUMAR P,SINGH M D,SAXENA A.HEMIN:A crypto-graphic approach for private k-NN classification[C]∥International Conference on Data Mining.Las Vegas,USA,2008:500-505.
[21] ZHU J.A New Scheme to Privacy-Preserving Collaborative Data Mining[C]∥International Conference on Information Assurance and Security.IEEE,2009:468-471.
[22] UTSUNOMIYA Y,TOYODA K,SASASE I.LPCQP:Light-weight Private Circular Query Protocol with Divided POI-table and Somewhat Homomorphic Encryption for Privacy-Preserving k-NN Search[J].Journal of Information Processing,2016,24(1):109-122.
[23] BREIMAN L.Random Forests[J].Machine Learning,2001,45(1):5-32.
[24] GEURTS P,ERNST D,WEHENKEL L.Extremely randomized trees[J].Machine Cncrypted Data,2006,63(1):3-42.
[25] CUTLER A,ZHAO G.Pert-perfect random tree ensembles[J].Computing Science and Statistics,2001,3:490-497.
[26] ZHAN J.Using Homomorphic Encryption For Privacy-Preser-ving Collaborative Decision Tree Classification[C]∥IEEE Symposium on Computational Intelligence and Data Mining,2007(CIDM 2007).IEEE,2007:637-645.
[27] ZHAN J.Privacy-preserving collaborative data mining[J].IEEE Computational Intelligence Magazine,2008,3(2):31-41.
[28] BARNI M,FAILLA P,LAZZERETTI R,et al.Privacy-Preserving ECG Classification with Branching Programs and Neural Networks[J].IEEE Transactions on Information Forensics & Security,2011,6(2):452-468.
[29] BOST R,POPA R A,TU S,et al.Machine Learning Classification over Encrypted Data[C]∥Network and Distributed System Security Symposium.2014.
[30] ASLETT L J M,ESPERANCA P M,HOLMES C C.Encrypted statistical machine learning:new privacy preserving methods[J].arXiv preprint arXiv:1508.06845,5.
[31] FAN J,VERCAUTEREN F.Somewhat Practical Fully Homomorphic Encryption[J].IACR Cryptology ePrint Archive,2012,2:144.
[32] GOLDWASSER S,MICALI S.Probabilistic encryption & how to play mental poker keeping secret all partial information[C]∥Fourteenth ACM Symposium on Theory of Computing.ACM,1982:365-377.
[33] SHAI HALEVI.Helib-an implementation of homomorphicencryption.https://github.com/shaih/HElib.
[34] RAJU R,KOMALAVALLI R,KESAVAKUMAR V.Privacymaintenance collaborative data mining-a practical approach[C]∥2009 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET).IEEE,2009:307-311.
[35] LIU X H,Research on Algorithms for privacy-preserving Support Vector Machines[D].Qingdao:University of Science and Technology in Shandong Province,2011.(in Chinese) 刘晓红.隐私保护支持向量机的算法研究[D].青岛:山东科技大学,2011.
[36] GRAEPEL T,LAUTER K,NAEHRIG M.ML confidential:machine learning on encrypted data[C]∥International Con-ference on Information Security and Cryptology.Springer-Verlag,2012:1-21.
[37] YAO Y C,SONG L,E C.Research on Homomorphic Encryption based distributed K-means Clustering Algorithm[J].Computer Technology and Development,2017,27(2):81-85.(in Chinese) 姚禹丞,宋玲,鄂驰.同态加密的分布式K均值聚类算法研究[J].计算机技术与发展,2017,27(2):81-85.
[38] LI S D,DOU J W,WANG D S.Homomorphic Encryption Algorithm and its Application in Cloud Security[J].Journal of Computer Research and Development,2015,52(6):1378-1388.(in Chinese) 李顺东,窦家维,王道顺.同态加密算法及其在云安全中的应用[J].计算机研究与发展,2015,52(6):1378-1388.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!