Approximate homomorphic encryption based privacy-preserving machine learning: a survey

被引:2
作者
Yuan, Jiangjun [1 ]
Liu, Weinan [1 ]
Shi, Jiawen [1 ]
Li, Qingqing [2 ]
机构
[1] Hangzhou Vocat & Tech Coll, Business & Tourism Inst, Hangzhou 310018, Zhejiang, Peoples R China
[2] Hangzhou City Univ, Supercomp Ctr, Hangzhou 310000, Zhejiang, Peoples R China
关键词
Privacy-preserving machine learning; Machine learning; Homomorphic encryption; Privacy;
D O I
10.1007/s10462-024-11076-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine Learning (ML) is rapidly advancing, enabling various applications that improve people's work and daily lives. However, this technical progress brings privacy concerns, leading to the emergence of Privacy-Preserving Machine Learning (PPML) as a popular research topic. In this work, we investigate the privacy protection topic in ML, and showcase the advantages of Homomorphic Encryption (HE) among different privacy-preserving techniques. Additionally, this work presents an introduction of approximate HE, emphasizing its advantages and providing the detail of some representative schemes. Moreover, we systematically review the related works about approximate HE based PPML schemes from the four technical applications and three advanced applications, along with their application scenarios, models and datasets. Finally, we suggest some potential future directions to guide readers in extending the research of PPML.
引用
收藏
页数:49
相关论文
共 186 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[3]   Recent Advances in Homomorphic Encryption [J].
Aguilar-Melchor, Carlos ;
Fau, Simon ;
Fontaine, Caroline ;
Gogniat, Guy ;
Sirdey, Renaud .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) :108-117
[4]  
Ahmed D, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P2419
[5]   OpenFHE: Open-Source Fully Homomorphic Encryption Library [J].
Al Badawi, Ahmad ;
Bates, Jack ;
Bergamaschi, Flavio ;
Cousins, David Bruce ;
Erabelli, Saroja ;
Genise, Nicholas ;
Halevi, Shai ;
Hunt, Hamish ;
Kim, Andrey ;
Lee, Yongwoo ;
Liu, Zeyu ;
Micciancio, Daniele ;
Quah, Ian ;
Polyakov, Yuriy ;
Saraswathy, R. V. ;
Rohloff, Kurt ;
Saylor, Jonathan ;
Suponitsky, Dmitriy ;
Triplett, Matthew ;
Vaikuntanathan, Vinod ;
Zucca, Vincent .
PROCEEDINGS OF THE 10TH WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY, WAHC 2022, 2022, :53-63
[6]   PrivFT: Private and Fast Text Classification With Homomorphic Encryption [J].
Al Badawi, Ahmad ;
Hoang, Louie ;
Mun, Chan Fook ;
Laine, Kim ;
Aung, Khin Mi Mi .
IEEE ACCESS, 2020, 8 :226544-226556
[7]   Homomorphic encryption systems statement: Trends and challenges [J].
Alaya, Bechir ;
Laouamer, Lamri ;
Msilini, Nihel .
COMPUTER SCIENCE REVIEW, 2020, 36
[8]   On the concrete hardness of Learning with Errors [J].
Albrecht, Martin R. ;
Player, Rachel ;
Scott, Sam .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (03) :169-203
[9]  
Ali H, 2022, TechRxiv, DOI [10.36227/techrxiv.19351679.v1, DOI 10.36227/TECHRXIV.19351679.V1]
[10]  
[Anonymous], 1994, SAC 94