vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash

03/15/2023
by   Qian Lou, et al.
0

Fully homomorphic encryption (FHE) is a powerful encryption technique that allows for computation to be performed on ciphertext without the need for decryption. FHE will thus enable privacy-preserving computation and a wide range of applications, such as secure cloud computing on sensitive medical and financial data, secure machine learning, etc. Prior research in FHE has largely concentrated on improving its speed, and great stride has been made. However, there has been a scarcity of research on addressing a major challenge of FHE computation: client-side data owners cannot verify the integrity of the calculations performed by the service and computation providers, hence cannot be assured of the correctness of computation results. This is particularly concerning when the service or computation provider may act in an untrustworthy, unreliable, or malicious manner and tampers the computational results. Prior work on ensuring FHE computational integrity has been non-universal or incurring too much overhead. We propose vFHE to add computational integrity to FHE without losing universality and without incurring high performance overheads.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/11/2022

SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges

With the advent of functional encryption, new possibilities for computat...
research
01/17/2023

Verifiable Fully Homomorphic Encryption

Fully Homomorphic Encryption (FHE) is seeing increasing real-world deplo...
research
02/05/2018

Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm

Cloud computing is an upcoming technology that has been designed for com...
research
08/28/2020

Data-driven control on encrypted data

We provide an efficient and private solution to the problem of encryptio...
research
02/21/2020

Practical Verification of MapReduce Computation Integrity via Partial Re-execution

Big data processing is often outsourced to powerful, but untrusted cloud...
research
07/05/2020

Offline Model Guard: Secure and Private ML on Mobile Devices

Performing machine learning tasks in mobile applications yields a challe...
research
07/14/2020

BUNET: Blind Medical Image Segmentation Based on Secure UNET

The strict security requirements placed on medical records by various pr...

Please sign up or login with your details

Forgot password? Click here to reset