Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys

11/11/2019
by   Asma Aloufi, et al.
0

Homomorphic encryption (HE) is a promising cryptographic technique for enabling secure collaborative machine learning in the cloud. However, support for homomorphic computation on ciphertexts under multiple keys is inefficient. Current solutions often require key setup before any computation or incur large ciphertext size (at best, grow linearly to the number of involved keys). In this paper, we proposed a new approach that leverages threshold and multi-key HE to support computations on ciphertexts under different keys. Our new approach removes the need for key setup between each client and the set of model owners. At the same time, this approach reduces the number of encrypted models to be offloaded to the cloud evaluator, and the ciphertext size with a dimension reduction from (N+1)x2 to 2x2. We present the details of each step and discuss the complexity and security of our approach.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/17/2020

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

New cryptographic techniques such as homomorphic encryption (HE) allow c...
research
10/22/2017

Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture

In this paper a secure data-sharing protocol under blockchain-based dece...
research
07/20/2021

RansomClave: Ransomware Key Management using SGX

Modern ransomware often generate and manage cryptographic keys on the vi...
research
11/22/2020

Electt: running auditable and verifiable elections in untrusted environments

We present a system for running auditable and verifiable elections in un...
research
10/13/2022

Multi-recipient and threshold encryption based on hidden multipliers

In this paper, a scheme is proposed that allow the dealer to encrypt mes...
research
09/21/2021

Comparative Analysis of Cryptographic Key Management Systems

Managing cryptographic keys can be a complex task for an enterprise and ...
research
04/13/2023

Cryptanalysis of Random Affine Transformations for Encrypted Control

Cloud-based and distributed computations are of growing interest in mode...

Please sign up or login with your details

Forgot password? Click here to reset