2018
DOI: 10.1109/tetc.2018.2794611
|View full text |Cite
|
Sign up to set email alerts
|

Private machine learning classification based on fully homomorphic encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 83 publications
(69 citation statements)
references
References 34 publications
0
62
0
1
Order By: Relevance
“…x 3 + 2x 2 + 3x + 4 can be further represented by a vector (9,5,15,4). Next, we have (x 3 + 2x 2 + 3x + 4)…”
Section: Plaintext Encodingmentioning
confidence: 99%
See 1 more Smart Citation
“…x 3 + 2x 2 + 3x + 4 can be further represented by a vector (9,5,15,4). Next, we have (x 3 + 2x 2 + 3x + 4)…”
Section: Plaintext Encodingmentioning
confidence: 99%
“…When compared with non-homomorphic encryptions, it removes the trust on the device and makes us ease to use the computing power of the device. Hence, homomorphic encryption has broad application prospects [5][6][7][8][9][10][11]. In a breakthrough work [12], Gentry demonstrated that fully homomorphic encryption was theoretically possible based on ideal lattices.…”
Section: Introductionmentioning
confidence: 99%
“…In cloud-based architectures, HE enables performing powerful data analytics in the cloud (Figure 4 (2)) and remote monitoring (Figure 4 (3)) while maintaining data privacy, for example, regarding sensitive medical data [52,53]. It also allows executing ML algorithms in a confidential manner [54]. For example, the authors of [40] presented a multi-key FHE scheme to apply deep learning over data stored in multiple third-party clouds without compromising the confidentiality.…”
Section: Sensor and Actuator Nodes User And Client Platformsmentioning
confidence: 99%
“…Many studies on encrypted machine learning have emerged, where homomorphic encryption schemes are adopted for computation on encrypted data. Xiaoqiang Sun et al implemented three private classification algorithms based on homomorphic encryption [42], which were hyperplane decision-based classification, Naïve Bayes classification, and decision tree classification. M Kim et al proposed secure logistic regression for biomedical data [43].…”
Section: Applications Of Homomorphic Encryption Schemesmentioning
confidence: 99%
“…In order to lower the error rate of our scheme, 1 , 2 are set to be as small as possible under the constraints in (35) and (40). Thus 1 is made larger under the constraint (42), which promotes the probability 3 . As discussed in the end of Section 5.1, the error rate of our scheme is…”
Section: Dmmentioning
confidence: 99%