Oblivious Neural Network Computing via Homomorphic Encryption

被引:61
作者
Orlandi, C. [1 ]
Piva, A. [1 ]
Barni, M. [2 ]
机构
[1] Univ Florence, Dept Elect & Telecommun, Via S Marta 3, I-50139 Florence, Italy
[2] Univ Siena, Dept Informat Engn, I-53100 Siena, Italy
关键词
D O I
10.1155/2007/37343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of secure data processing by means of a neural network (NN) is addressed. Secure processing refers to the possibility that the NN owner does not get any knowledge about the processed data since they are provided to him in encrypted format. At the same time, the NN itself is protected, given that its owner may not be willing to disclose the knowledge embedded within it. The considered level of protection ensures that the data provided to the network and the network weights and activation functions are kept secret. Particular attention is given to prevent any disclosure of information that could bring a malevolent user to get access to the NN secrets by properly inputting fake data to any point of the proposed protocol. With respect to previous works in this field, the interaction between the user and the NN owner is kept to a minimum with no resort to multiparty computation protocols. Copyright (C) 2007 C. Orlandi et al.
引用
收藏
页数:11
相关论文
共 50 条
[31]   Homomorphic encryption for data protection in cloud computing [J].
Epishkina, Anna ;
Ermakov, Vladislav .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2025, 21 (01)
[32]   FULLY HOMOMORPHIC ENCRYPTION APPLICATION IN CLOUD COMPUTING [J].
Chen, Baohua ;
Zhao, Na .
2014 11TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2014, :471-474
[33]   New Fully Homomorphic Encryption Scheme Based On Multistage Partial Homomorphic Encryption Applied In Cloud Computing [J].
Mahmood, Zainab Hikmat ;
Ibrahem, Mahmood Khalel .
2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, :182-186
[34]   Latency-Aware Inference on Convolutional Neural Network Over Homomorphic Encryption [J].
Ishiyama, Takumi ;
Suzuki, Takuya ;
Yamana, Hayato .
INFORMATION INTEGRATION AND WEB INTELLIGENCE, IIWAS 2022, 2022, 13635 :324-337
[35]   Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption [J].
Alsaedi, Emad M. ;
Farhan, Alaa Kadhim .
BAGHDAD SCIENCE JOURNAL, 2023, 20 (01) :206-220
[36]   Fully Homomorphic Encryption with AES in Cloud Computing Security [J].
Alkady, Yasmin ;
Farouk, Fifi ;
Rizk, Rawya .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2018, 2019, 845 :370-382
[37]   A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption [J].
Shih, Cheng-Jhih ;
Hung, Shih-Hao ;
Chen, Ching-Wen ;
Perng, Chiy-Ferng ;
Kao, Meng-Chao ;
Shih, Chi-Sheng ;
Kuo, Tei-Wei .
MOBILE INTERNET SECURITY, MOBISEC 2023, 2024, 2095 :121-135
[38]   Challenges of Using Homomorphic Encryption to Secure Cloud Computing [J].
El Makkaoui, Khalid ;
Ezzati, Abdellah ;
Beni Hssane, Abderrahim .
2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, :343-349
[39]   Empirical Analysis of the Impact of Homomorphic Encryption on Cloud Computing [J].
Rout, Chinmayee ;
Sethi, Srinivas ;
Sahoo, Ramesh Kumar ;
Badajena, J. Chandrakanta .
INTELLIGENT SYSTEMS AND APPLICATIONS, ICISA 2022, 2023, 959 :107-120
[40]   Computing Blindfolded: New Developments in Fully Homomorphic Encryption [J].
Vaikuntanathan, Vinod .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :5-16