Privacy-preserving machine learning using functional encryption: Opportunities and challenges

P Panzade, D Takabi, Z Cai - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the advent of functional encryption (FE), new possibilities for the computation of
encrypted data have arisen. FE enables data owners to grant third-party access to perform …

Privacy-preserving deep learning based on multiparty secure computation: A survey

Q Zhang, C **n, H Wu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Deep learning (DL) has demonstrated superior success in various of applications, such as
image classification, speech recognition, and anomalous detection. The unprecedented …

Survey and open problems in privacy-preserving knowledge graph: merging, query, representation, completion, and applications

C Chen, F Zheng, J Cui, Y Cao, G Liu, J Wu… - International Journal of …, 2024 - Springer
Abstract Knowledge Graph (KG) has attracted more and more companies' attention for its
ability to connect different types of data in meaningful ways and support rich data services …

Privacy-preserving cloud-edge collaborative learning without trusted third-party coordinator

X Yu, D Tang, W Zhao - Journal of Cloud Computing, 2023 - Springer
Cloud-edge collaborative learning has received considerable attention recently, which is an
emerging distributed machine learning (ML) architecture for improving the performance of …

Towards faster functional encryption for privacy-preserving machine learning

P Panzade, D Takabi - … on Trust, Privacy and Security in …, 2021 - ieeexplore.ieee.org
Machine learning has become ubiquitous technology and is being used in many aspects of
our daily lives. However, as machine learning works with a huge amount of data, many …

Leaking secrets in homomorphic encryption with side-channel attacks

F Aydin, A Aysu - Journal of Cryptographic Engineering, 2024 - Springer
Homomorphic encryption (HE) allows computing encrypted data in the ciphertext domain
without knowing the encryption key. It is possible, however, to break fully homomorphic …

Reveal: Single-trace side-channel leakage of the seal homomorphic encryption library

F Aydin, E Karabulut, S Potluri… - … Design, Automation & …, 2022 - ieeexplore.ieee.org
This paper demonstrates the first side-channel attack on homomorphic encryption (HE),
which allows computing on encrypted data. We reveal a power-based side-channel leakage …

I can't see it but I can Fine-tune it: On Encrypted Fine-tuning of Transformers using Fully Homomorphic Encryption

P Panzade, D Takabi, Z Cai - arxiv preprint arxiv:2402.09059, 2024 - arxiv.org
In today's machine learning landscape, fine-tuning pretrained transformer models has
emerged as an essential technique, particularly in scenarios where access to task-aligned …

Crypto makes AI evolve

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Adopting cryptography has given rise to a significant? evolution in AI. This chapter studies
the path and stages of this evolution. We start with reviewing existing relevant surveys …

L-secnet: Towards secure and lightweight deep neural network inference

A Song, J Fu, X Mu, XH Zhu, K Cheng - Journal of Networking and …, 2024 - iecscience.org
The advances in machine learning technology has promoted its great potential for deep
neural network (DNN) inference powered applications of Internet of Things (IoT), such as …