PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System

被引:14
作者
Chen, Yange [1 ,2 ]
Wang, Baocang [1 ,2 ,3 ]
Zhang, Zhili [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
[3] Xidian Univ, Cryptog Res Ctr, Xian 710071, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2022年 / 16卷 / 02期
基金
中国国家自然科学基金;
关键词
Deep learning; Cryptography; Robots; Training; Neurons; Computational modeling; Encryption; multiple keys; privacy-preserving; re-encryption; robot system; SECURITY;
D O I
10.1109/JSYST.2021.3078637
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The robot system is a significant application that has attracted great attention, and deep learning is a powerful feature extraction technology that has achieved significant breakthroughs in many fields, especially in robot systems. However, the required massive dataset for a deep learning model in a robot system easily leads to privacy leakage. There have been few reports on privacy-preserving deep learning models, and none on multikeys, in robot systems. Existing privacy-preserving deep learning schemes in multiple keys have low efficiency and high interactions in non-robotic environments. To address these issues, this article proposes a privacy-preserving deep learning model with homomorphic re-encryption (PDLHR) and secure calculation tools in a robot system. The proposed re-encryption scheme is based on the Bresson-Catalano-Pointcheval (BCP) cryptosystem, which solves the multiple keys question, keeps the homomorphic nature, and is more simplified than the existing re-encryption scheme based on the BCP cryptosystem. The secure calculation tools are designed to realize efficient ciphertext computations. Compared to the previous work, PDLHR decreases the interactions in the decryption process, improves the ciphertext training efficiency, and preserves the privacy of input data, training model, and inference results. Security analysis and performance evaluations demonstrate that the proposed scheme realizes security, efficiency, and effectiveness with low communication and computation costs.
引用
收藏
页码:2032 / 2043
页数:12
相关论文
共 50 条
  • [41] Lightweight Privacy-Preserving Scheme Using Homomorphic Encryption in Industrial Internet of Things
    Li, Shancang
    Zhao, Shanshan
    Min, Geyong
    Qi, Lianyong
    Liu, Gang
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14542 - 14550
  • [42] Privacy-Preserving Association Rule Mining Using Homomorphic Encryption in a Multikey Environment
    Pang, Hongping
    Wang, Baocang
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 3131 - 3141
  • [43] Privacy-Preserving Deep Learning
    Shokri, Reza
    Shmatikov, Vitaly
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1310 - 1321
  • [44] Lightweight and Dynamic Privacy-Preserving Federated Learning via Functional Encryption
    Yu, Boan
    Zhao, Jun
    Zhang, Kai
    Gong, Junqing
    Qian, Haifeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2496 - 2508
  • [45] Privacy-Preserving Search in Data Clouds Using Normalized Homomorphic Encryption
    Dawoud, Mohanad
    Altilar, D. Turgay
    EURO-PAR 2014: PARALLEL PROCESSING WORKSHOPS, PT II, 2014, 8806 : 62 - 72
  • [46] BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
    Wibawa, Febrianti
    Catak, Ferhat Ozgur
    Sarp, Salih
    Kuzlu, Murat
    CRYPTOGRAPHY, 2022, 6 (03)
  • [47] Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption
    Xu, Kexin
    Tan, Benjamin Hong Meng
    Wang, Li-Ping
    Aung, Khin Mi Mi
    Wang, Huaxiong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77
  • [48] Privacy-preserving biometrics authentication systems using fully homomorphic encryption
    Torres, Wilson Abel Alberto
    Bhattacharjee, Nandita
    Srinivasan, Bala
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2015, 11 (02) : 151 - 168
  • [49] Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
    Rabieh, Khaled
    Mercan, Suat
    Akkaya, Kemal
    Baboolal, Vashish
    Aygun, Ramazan S.
    2020 IEEE 21ST INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2020), 2020, : 45 - 52
  • [50] Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services
    Shi, Yang
    Fan, Hongfei
    Xiong, Guoyue
    TECHNOLOGY AND HEALTH CARE, 2015, 23 : S139 - S145