Oblivious Neural Network Computing via Homomorphic Encryption

被引:59
作者
Orlandi, C. [1 ]
Piva, A. [1 ]
Barni, M. [2 ]
机构
[1] Univ Florence, Dept Elect & Telecommun, Via S Marta 3, I-50139 Florence, Italy
[2] Univ Siena, Dept Informat Engn, I-53100 Siena, Italy
来源
EURASIP JOURNAL ON INFORMATION SECURITY | 2007年 / 01期
关键词
D O I
10.1155/2007/37343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of secure data processing by means of a neural network (NN) is addressed. Secure processing refers to the possibility that the NN owner does not get any knowledge about the processed data since they are provided to him in encrypted format. At the same time, the NN itself is protected, given that its owner may not be willing to disclose the knowledge embedded within it. The considered level of protection ensures that the data provided to the network and the network weights and activation functions are kept secret. Particular attention is given to prevent any disclosure of information that could bring a malevolent user to get access to the NN secrets by properly inputting fake data to any point of the proposed protocol. With respect to previous works in this field, the interaction between the user and the NN owner is kept to a minimum with no resort to multiparty computation protocols. Copyright (C) 2007 C. Orlandi et al.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Secure tumor classification by shallow neural network using homomorphic encryption
    Hong, Seungwan
    Park, Jai Hyun
    Cho, Wonhee
    Choe, Hyeongmin
    Cheon, Jung Hee
    [J]. BMC GENOMICS, 2022, 23 (01)
  • [22] WTFHE: neural-netWork-ready Torus Fully Homomorphic Encryption
    Klemsa, Jakub
    Novotny, Martin
    [J]. 2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 434 - 438
  • [23] Swift: Fast Secure Neural Network Inference With Fully Homomorphic Encryption
    Fu, Yu
    Tong, Yu
    Ning, Yijing
    Xu, Tianshi
    Li, Meng
    Lin, Jingqiang
    Feng, Dengguo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2793 - 2806
  • [24] (k - n) Oblivious Transfer Using Fully Homomorphic Encryption System
    Kaosar, Mohammed
    Mamun, Quazi
    Islam, Rafiqul
    Yi, Xun
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 380 - +
  • [25] Privacy preserving via multi-key homomorphic encryption in cloud computing
    Li, Xuelian
    Li, Hui
    Gao, Juntao
    Wang, Runsong
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [26] Oblivious Neural Network Predictions via MiniONN Transformations
    Liu, Jian
    Juuti, Mika
    Lu, Yao
    Asokan, N.
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 619 - 631
  • [27] Fully Homomorphic Encryption Based On the Parallel Computing
    Tan, Delin
    Wang, Huajun
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 497 - 522
  • [28] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    [J]. 2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [29] Towards Practical Homomorphic Encryption in Cloud Computing
    Bouti, Adil
    Keller, Joerg
    [J]. 2015 IEEE 4TH SYMPOSIUM ON NETWORK CLOUD COMPUTING AND APPLICATIONS - NCCA 2015, 2015, : 67 - 74
  • [30] Homomorphic encryption for data protection in cloud computing
    Anna Epishkina
    Vladislav Ermakov
    [J]. Journal of Computer Virology and Hacking Techniques, 21 (1)