Privacy Preserving Data Classification using Inner-product Functional Encryption

被引:11
作者
Ligier, Damien [1 ,2 ,3 ,4 ]
Carpov, Sergiu [1 ]
Fontaine, Caroline [2 ,3 ]
Sirdey, Renaud [1 ]
机构
[1] CEA, LIST, Point Courrier 172, F-91191 Gif Sur Yvette, France
[2] CNRS, Lab STICC, Brest, France
[3] Telecom Bretagne, Brest, France
[4] UBL, Rennes, France
来源
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2017年
关键词
Functional Encryption; Inner-Product Encryption; Classification; Linear Classification;
D O I
10.5220/0006206704230430
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of data outsourcing more and more concerns raise about the privacy of user's data. Simultaneously, cryptographers are designing schemes enabling computation on ciphertexts (homomorphic encryption, functional encryption, etc.). Their use in real world applications is difficult. In this work we focus on functional encryption schemes enabling computation of inner-product on encrypted vectors and their use in real world scenarios. We propose a protocol combining such type of functional encryption schemes with machine learning algorithms. Indeed, we think that being able to perform classification over encrypted data is useful in many scenarios, in particular when the owners of the data are not ready to share it. After explaining our protocol, we detail the implemented handwritten digit recognition use case, and then, we study its security.
引用
收藏
页码:423 / 430
页数:8
相关论文
共 20 条
  • [1] Simple Functional Encryption Schemes for Inner Products
    Abdalla, Michel
    Bourse, Florian
    De Caro, Angelo
    Pointcheval, David
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 733 - 751
  • [2] Agrawal S., 2015, FULLY SECURE FUNCTIO
  • [3] [Anonymous], P 5 SIAM INT C DAT M
  • [4] [Anonymous], 2013, FLINT FAST LIB NUMBE
  • [5] [Anonymous], 1989, GEN LINEAR MODELS
  • [6] Function-Hiding Inner Product Encryption
    Bishop, Allison
    Jain, Abhishek
    Kowalczyk, Lucas
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 470 - 491
  • [7] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
  • [8] Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
  • [9] BOTTOU L, 1994, INT C PATT RECOG, P77, DOI 10.1109/ICPR.1994.576879
  • [10] Brakerski Z, 2015, LECT NOTES COMPUT SC, V9015, P306, DOI 10.1007/978-3-662-46497-7_12