2018
DOI: 10.1007/978-3-030-04167-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Integer Vector Homomorphic Encryption Using Deep Learning for Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…In 2020, Li et al 12 introduced a third party to be the decryptor for decrypting the results from the cloud server and storing the results for request queries from the clients, which keeps the whole DNNs inference on the cloud server. Furthermore, in the previous work, Xie et al 13 proposed a method for processing encrypted data in DNNs inference with the same encryption scheme EIVHE 6 .…”
Section: Related Workmentioning
confidence: 99%
“…In 2020, Li et al 12 introduced a third party to be the decryptor for decrypting the results from the cloud server and storing the results for request queries from the clients, which keeps the whole DNNs inference on the cloud server. Furthermore, in the previous work, Xie et al 13 proposed a method for processing encrypted data in DNNs inference with the same encryption scheme EIVHE 6 .…”
Section: Related Workmentioning
confidence: 99%
“…HE allows data to be processed in ciphertext, maintaining a trade-off between privacy and performance. To protect the user's privacy, the privacy-preserving NN is built to perform inference directly on encrypted data, the ciphertext inference can be done over two paradigms: interactive paradigm (online mode), such as GELU-NET [13] (model was partitioned NN into two non-colluding parties), GAZELLE [12] (high accuracy but huge memory cost), and BAYHENN [23] (inference was partitioned into linear and non-linear computations), and non-interactive paradigm (offline mode), such as CryptoNets [1] (the first work developed in this area), Chabanne et al [2] (first proposed work that combines activation function with BN function), Hesamiford et al [3] (suggested using derivative of polynomials to replace the activation function), Ishiyama et al [4] (proposed using CM for decreasing MD), Xie et al [24] (exploited the Efficient Integer Vector HE in CNN) and Dathathri et al [9] (initiated an optimizing compiler for HE NN inference). In this work, the focus is on ciphertext inference in the non-interactive paradigm.…”
Section: Privacy-preserving Deep Learningmentioning
confidence: 99%
“…Since our technique applies cryptography into significant learning, it might be acclimated to various diverse datasets before using them to continue. At the point when direct information encryption, others can't comprehend information without mystery key, and consequently it can secure protection and guarantee clients to utilize the neural system securely [18].In [19][20], we improve Gentry's holomorphic encryption to recommend an effective, disentangled mystery key holomorphic encryption. It in the picture encryption, with the goal that the picture can be prepared in encoded structure to secure the protection.…”
Section: Introductionmentioning
confidence: 99%