Homomorphic encryption for machine learning in medicine and bioinformatics

A Wood, K Najarian, D Kahrobaei - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …

Privacy-preserving neural networks with homomorphic encryption: C hallenges and opportunities

B Pulido-Gaytan, A Tchernykh… - Peer-to-Peer Networking …, 2021 - Springer
Classical machine learning modeling demands considerable computing power for internal
calculations and training with big data in a reasonable amount of time. In recent years …

Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

HEAX: An architecture for computing on encrypted data

MS Riazi, K Laine, B Pelton, W Dai - Proceedings of the twenty-fifth …, 2020 - dl.acm.org
With the rapid increase in cloud computing, concerns surrounding data privacy, security, and
confidentiality also have been increased significantly. Not only cloud providers are …

Labeled PSI from fully homomorphic encryption with malicious security

H Chen, Z Huang, K Laine, P Rindal - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Private Set Intersection (PSI) allows two parties, the sender and the receiver, to compute the
intersection of their private sets without revealing extra information to each other. We are …

Towards deep neural network training on encrypted data

K Nandakumar, N Ratha… - Proceedings of the …, 2019 - openaccess.thecvf.com
While deep learning is a valuable tool for solving many tough problems in computer vision,
the success of deep learning models is typically determined by:(i) availability of sufficient …

Efficient and secure decision tree classification for cloud-assisted online diagnosis services

J Liang, Z Qin, S **ao, L Ou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Decision tree classification has become a prevailing technique for online diagnosis services.
By outsourcing computation intensive tasks to a cloud server, cloud-assisted online …

Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack

C Gao, Q Cheng, P He, W Susilo, J Li - Information Sciences, 2018 - Elsevier
Naive Bayes (NB) is a simple but highly practical classifier, with a wide range of applications
including spam filters, cancer diagnosis and face recognition, to name a few examples only …

A survey on fully homomorphic encryption: An engineering perspective

P Martins, L Sousa, A Mariano - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
It is unlikely that a hacker is able to compromise sensitive data that is stored in an encrypted
form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to …

Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression

A Canteaut, S Carpov, C Fontaine, T Lepoint… - Journal of …, 2018 - Springer
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …