Verifiable Encodings for Secure Homomorphic Analytics

07/28/2022
by   Sylvain Chatel, et al.
0

Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data. However, the correctness of the computation result is not ensured. We propose two error detection encodings and build authenticators that enable practical client-verification of cloud-based homomorphic computations under different trade-offs and without compromising on the features of the encryption algorithm. Our authenticators operate on top of trending ring learning with errors based fully homomorphic encryption schemes over the integers. We implement our solution in VERITAS, a ready-to-use system for verification of outsourced computations executed over encrypted data. We show that contrary to prior work VERITAS supports verification of any homomorphic operation and we demonstrate its practicality for various applications, such as ride-hailing, genomic-data analysis, encrypted search, and machine-learning training and inference.

READ FULL TEXT
research
05/10/2023

Revisiting Fully Homomorphic Encryption Schemes

Homomorphic encryption is a sophisticated encryption technique that allo...
research
04/26/2022

MemFHE: End-to-End Computing with Fully Homomorphic Encryption in Memory

The increasing amount of data and the growing complexity of problems has...
research
10/29/2018

Conditionals in Homomorphic Encryption and Machine Learning Applications

Homomorphic encryption aims at allowing computations on encrypted data w...
research
03/01/2022

FHEBench: Benchmarking Fully Homomorphic Encryption Schemes

Fully Homomorphic Encryption (FHE) emerges one of the most promising sol...
research
05/04/2021

Verifiable Computing Using Computation Fingerprints Within FHE

We suggest using Fully Homomorphic Encryption (FHE) to be used, not only...
research
09/13/2023

Toward Lossless Homomorphic Encryption for Scientific Computation

This paper presents a comprehensive investigation into encrypted computa...
research
08/28/2020

Data-driven control on encrypted data

We provide an efficient and private solution to the problem of encryptio...

Please sign up or login with your details

Forgot password? Click here to reset