A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption
نویسندگان
چکیده
Homomorphic encryption (HE) is a promising solution for handling sensitive data in semi-trusted third-party computing environments, as it enables processing of encrypted data. However, applying sophisticated techniques such machine learning, statistics, and image to remains challenge. The computational complexity some operations can significantly increase time. In this paper, we focus on the analysis two state-of-the-art HE matrix multiplication algorithms with best time space complexities. We show how their performance depends libraries execution context, considering standard Cheon–Kim–Kim–Song (CKKS) scheme fixed-point numbers based Microsoft SEAL PALISADE libraries. that Windows OS library Linux are options. general, PALISADE-Linux outperforms PALISADE-Windows, SEAL-Linux, SEAL-Windows by 1.28, 1.59, 1.67 times average different sizes, respectively. derive high-precision extrapolation formulas estimate larger matrices.
منابع مشابه
FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption
BACKGROUND The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. ...
متن کاملEfficient Secure Matrix Multiplication over Lwe-based Homomorphic Encryption
Homomorphic encryption enables various calculations while preserving the data confidentiality. In this paper, we apply the somewhat homomorphic encryption scheme proposed by Brakerski and Vaikuntanathan (CRYPTO 2011) to secure matrix multiplication between two matrices. To reduce both the ciphertext size and the computation cost, we propose a new method to pack a matrix into a single ciphertext...
متن کاملSecure Outsourced Association Rule Mining using Homomorphic Encryption
Several techniques are used in data analysis, where frequent itemset mining and association rule mining are very popular among them. The motivation for ‘Data Mining as a Service’ (DMaaS) paradigm is that when the data owners are not capable of doing mining tasks internally they have to outsource the mining work to a trusted third party. Multiple data owners can also collaboratively mine by comb...
متن کاملSecure Outsourced Attribute-based Encryption
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by eligible users) are getting prohibitively high. Despite that the existing Outsourced ABE solutions a...
متن کاملA Secure Internet Voting Protocol Based on Homomorphic Encryption
In this paper, we focus on Internet voting protocol. Our protocol is similar to the Norwegian scheme which has been used in local elections in 2011. The primary focus of this paper is to prevent a possible cooperation between Ballot Box and Receipt Generator in the Norwegian scheme. The other purpose of this research is to present the alternative solution of coercion which is one of the most im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Big data and cognitive computing
سال: 2023
ISSN: ['2504-2289']
DOI: https://doi.org/10.3390/bdcc7020084