2020 2nd PhD Colloquium on Ethically Driven Innovation and Technology for Society (PhD EDITS) 2020
DOI: 10.1109/phdedits51180.2020.9315305
|View full text |Cite
|
Sign up to set email alerts
|

Application of Homomorphic Encryption in Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…A hash function used by the Distributed Hash Table (DHT) to assign file ownership to network nodes which generates a key of 256 bits, which is enough to withstand the level 2 attack on the DRE. This system's encryption function hides the distance between two points in a database table; therefore, it must be determined which of the two points is closest to a query point q , and it must also be implemented [ 4 , 26 ]: where ||p|| represents the Euclidean norm of p , represents the gradient system, and ||p||2 can be represented by pp . As a result, the problem of inequality can be broken down into a slew of gradient calculations.…”
Section: Methodsmentioning
confidence: 99%
“…A hash function used by the Distributed Hash Table (DHT) to assign file ownership to network nodes which generates a key of 256 bits, which is enough to withstand the level 2 attack on the DRE. This system's encryption function hides the distance between two points in a database table; therefore, it must be determined which of the two points is closest to a query point q , and it must also be implemented [ 4 , 26 ]: where ||p|| represents the Euclidean norm of p , represents the gradient system, and ||p||2 can be represented by pp . As a result, the problem of inequality can be broken down into a slew of gradient calculations.…”
Section: Methodsmentioning
confidence: 99%
“…As the popularity of ML increases in the cloud computing environment, privacy and security of the data become a great concern for cloud users. To overcome these problems, the researchers have given different methods for the application of homomorphic encryption in machine learning in the paper [18][19][20][21][22][23].…”
Section: Relevant Workmentioning
confidence: 99%
“…Behera et al [15] have implemented the Paillier cryptosystem which follows additive HE property. They started with a plain text which is encrypted using HE method and this encrypted data is then fed as input to a linear regression model.…”
Section: B Literature Surveymentioning
confidence: 99%