Encrypted Value Iteration and Temporal Difference Learning over Leveled Homomorphic Encryption

03/20/2021
by   Jihoon Suh, et al.
0

We consider an architecture of confidential cloud-based control synthesis based on Homomorphic Encryption (HE). Our study is motivated by the recent surge of data-driven control such as deep reinforcement learning, whose heavy computational requirements often necessitate an outsourcing to the third party server. To achieve more flexibility than Partially Homomorphic Encryption (PHE) and less computational overhead than Fully Homomorphic Encryption (FHE), we consider a Reinforcement Learning (RL) architecture over Leveled Homomorphic Encryption (LHE). We first show that the impact of the encryption noise under the Cheon-Kim-Kim-Song (CKKS) encryption scheme on the convergence of the model-based tabular Value Iteration (VI) can be analytically bounded. We also consider secure implementations of TD(0), SARSA(0) and Z-learning algorithms over the CKKS scheme, where we numerically demonstrate that the effects of the encryption noise on these algorithms are also minimal.

READ FULL TEXT
research
02/02/2020

SARSA(0) Reinforcement Learning over Fully Homomorphic Encryption

We consider a cloud-based control architecture in which the local plants...
research
01/01/2023

Encrypted Data-driven Predictive Cloud Control with Disturbance Observer

In data-driven predictive cloud control tasks, the privacy of data store...
research
11/04/2021

Secure Machine Learning in the Cloud Using One Way Scrambling by Deconvolution

Cloud-based machine learning services (CMLS) enable organizations to tak...
research
05/01/2018

Secure Face Matching Using Fully Homomorphic Encryption

Face recognition technology has demonstrated tremendous progress over th...
research
02/15/2023

Similarity Calculation Based on Homomorphic Encryption

In recent years, although some homomorphic encryption algorithms have be...
research
06/07/2023

High-Performance Caching of Homomorphic Encryption for Cloud Databases

While homomorphic encryption (HE) has garnered significant research inte...
research
10/08/2018

Fully Homomorphic Image Processing

Fully homomorphic encryption has allowed devices to outsource computatio...

Please sign up or login with your details

Forgot password? Click here to reset