CN114844621B - Multi-user privacy protection machine learning method and device based on multi-key full homomorphic encryption - Google Patents

Multi-user privacy protection machine learning method and device based on multi-key full homomorphic encryption Download PDF

Info

Publication number
CN114844621B
CN114844621B CN202210365746.7A CN202210365746A CN114844621B CN 114844621 B CN114844621 B CN 114844621B CN 202210365746 A CN202210365746 A CN 202210365746A CN 114844621 B CN114844621 B CN 114844621B
Authority
CN
China
Prior art keywords
key
data
ciphertext
machine learning
enc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210365746.7A
Other languages
Chinese (zh)
Other versions
CN114844621A (en
Inventor
蒋琳
王轩
王泓潇
顾嘉婧
刘洋
漆舒汉
方俊彬
廖清
张加佳
李晔
吴宇琳
姚霖
陈倩
赵鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Shenzhen Graduate School Harbin Institute of Technology
Original Assignee
Jinan University
Shenzhen Graduate School Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University, Shenzhen Graduate School Harbin Institute of Technology filed Critical Jinan University
Priority to CN202210365746.7A priority Critical patent/CN114844621B/en
Publication of CN114844621A publication Critical patent/CN114844621A/en
Application granted granted Critical
Publication of CN114844621B publication Critical patent/CN114844621B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/048Activation functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The invention discloses a multi-user privacy protection machine learning method and a device based on multi-key full homomorphic encryption, wherein the method comprises the following steps: initializing a multi-key fully homomorphic encryption algorithm by using a common character string CRS, generating a security parameter lambda and generating a common parameter set mkparams; the server S integrates the single-key ciphertext data Enc uploaded by each data provider ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D) (ii) a Server S stores multiple key cipher text data set Enc sk (D) On the basis, linear operation in the common machine learning algorithm is replaced by fully homomorphic addition and fully homomorphic multiplication, and a multi-key ciphertext data set Enc is subjected to sk (D) Performing machine learning modeling training; the server S encrypts the model ciphertext Enc with multiple keys sk (model) issuing to each data provider DP i And a decryption side DE; decrypting multiple key model ciphertext Enc sk (model) to obtain the DP from the respective data provider i Model = Dec trained on data D of (1) sk (Enc sk (model)). The invention ensures higher security and completes the privacy calculation task with lower communication cost and fewer interaction times.

Description

Multi-user privacy protection machine learning method and device based on multi-key fully homomorphic encryption
Technical Field
The invention belongs to the technical field of machine learning, and particularly relates to a multi-user privacy protection machine learning method and device based on multi-key fully homomorphic encryption.
Background
In multi-user machine learning, there are the following information that needs to be protected: input feature values, output labels or feedback, model details (including model framework, parameters and loss functions), and information from the data provider. The multi-user machine learning method with privacy protection can enable a plurality of entities to train one machine learning model without data sharing or resource aggregation, and protect data privacy while multi-user machine learning is carried out. In addition, the multi-user machine learning method provides a method for a plurality of users to train the same model together, but the data privacy of the method needs to be guaranteed by using a safety technology. Current security techniques for privacy protection in multi-user machine learning are:
1. the de-identification method comprises the following steps: some direct identifiers are deleted, thereby reducing the re-identification probability. Anonymization is one of de-identification, and through anonymization processing, an attacker cannot realize re-identification of a person corresponding to a certain personal information record in a database, namely, the association between the identity attribute of a natural person and the privacy attribute is cut off. However, this method does not protect the user's overall privacy, and may reduce the accuracy of the model, and, strictly speaking, depending on the capabilities of the attacker, there is still a potential risk of re-identification.
2. The differential privacy method comprises the following steps: noise is added to the data or inductive methods are used to mask certain sensitive attributes until a third party cannot distinguish the individual, thereby making the data unrecoverable to protect the user's privacy. Protection is provided for client data, for example, by hiding the contribution of the client during training. However, this method may result in insufficient model accuracy and no guarantee of confidentiality during parameter delivery, and the nature of this method still requires data to be transmitted to other places, and usually requires a trade-off between accuracy and privacy, and the security is lower than that of the homomorphic encryption.
3. The single-key homomorphic encryption method comprises the following steps: and protecting the data privacy of the user through parameter exchange under an encryption mechanism. Each user holds the same key and encrypts respective data, and the server trains the machine learning model using the data by using the property of a homomorphic encryption algorithm. In this way, the server can only see the data in the ciphertext state, and the data is prevented from being directly exposed to the server. However, the keys owned by each user are the same, and malicious user nodes can steal input data of other users through collusion with the central server; and a man-in-the-middle attack can be started on other users by utilizing the held key, so that the trained model result develops towards the direction beneficial to malicious user nodes.
4. Secure multiparty computing protocol: the security model contains multiple participants and provides security proofs in a well-defined simulation framework to ensure complete zero knowledge, i.e., each participant cannot obtain other information except for its inputs and outputs. However, this method usually requires multiple interactions of multiple participants to generate a calculation result, and the number of interactions is large, and the communication cost is large.
Disclosure of Invention
The invention mainly aims to overcome the defects in the prior art, and provides a multi-user privacy protection machine learning method and device based on multi-key fully homomorphic encryption, which can complete privacy calculation tasks with lower communication cost and fewer interaction times while ensuring higher security.
In order to achieve the purpose, the invention adopts the following technical scheme:
the invention provides a multi-user privacy protection machine learning method based on multi-key fully homomorphic encryption, which comprises the following steps:
initializing a multi-key fully homomorphic encryption algorithm by using a public character string CRS, wherein the initialization comprises generating a security parameter lambda and a public parameter set mkparams, and sending the public parameter set mkparams to a cloud server S and each data provider DP i Initializing; the multi-key fully homomorphic encryption algorithm comprises a public parameter generation algorithm, a key generation algorithm, an encryption algorithm, a decryption algorithm and a multi-key fully homomorphic operation algorithm;
each data provider DP i Generating keys sk independently from each other by calling a key generation algorithm according to the received public parameter set mkparams i And evaluating the key evk i Then calls the encryption algorithm with the respective key sk i To own local data d i Encrypting to obtain single-key ciphertext Enc ski (d i ) And evaluating the key evk i Uploading the data to a server S, and integrating the single-key ciphertext data Enc uploaded by each data provider by the server S ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D);
Server S stores multiple key cipher text data set Enc sk (D) On the basis of the method, a multi-key fully homomorphic operation algorithm is called, and linear operation in a common machine learning algorithm is replaced by the fully homomorphic operation algorithmState addition and full homomorphic multiplication for a multi-key ciphertext data set Enc sk (D) Performing machine learning modeling training; the machine learning modeling training is to calculate the ciphertext data by adopting a nonlinear function, linearly expand the ciphertext data by utilizing the nonlinear function, and calculate by utilizing addition and multiplication in the fully homomorphic operation;
after completing machine learning modeling under ciphertext, server S encrypts model ciphertext Enc with multiple keys sk (model) issuing to each data provider DP i And a decryption side DE;
decryptor DE federates all data providers DP i And their respective keys sk i Calling a decryption algorithm to sequentially decrypt the multi-key model ciphertext Enc sk (model) to obtain the DP from the respective data provider i Model = Dec trained on data D of (1) sk (Enc sk (model))。
As a preferred technical solution, the common parameter set mkparams is generated by:
and calling the common parameter generation algorithm by the common character string CRS, taking the safety parameter lambda as the input of the common parameter generation algorithm, and finally outputting a common parameter set mkparams.
As a preferred technical solution, each data provider DP provides data to a server i Data d local to itself i Before using the encryption key, the method also comprises the following steps:
each data provider DP i Preparing local data d i And preprocessing local data and extracting characteristics to prepare for machine learning modeling.
As a preferred technical solution, the server S integrates the single-key ciphertext data Enc uploaded by each data party ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D) The method specifically comprises the following steps:
ith data provider DP i Uploaded single key ciphertext data Enc ski (d i ) Is a p i Ciphertext matrices of xq, i.e. DP i Uploaded data consensus p i A bar, each piece of data containing a tag valueThe server S firstly fills the ciphertext uploaded by each data provider, expands the ciphertext structure of a single key into a multi-key ciphertext structure, and then aggregates the multi-key ciphertext structure to obtain a multi-key ciphertext data set Enc sk (D) Is a matrix of p x q, where,
Figure BDA0003586904080000031
that is, the server pieces together the data uploaded by all the data providers to obtain p pieces of data, each piece of data contains q values including the tag value, and p × q ciphertexts.
As a preferred technical solution, the linear operation in the ordinary machine learning algorithm is replaced by fully homomorphic addition and fully homomorphic multiplication, specifically:
in order to perform machine learning training in a ciphertext state, common operations in a machine learning algorithm are all split into basic addition and multiplication operations, and then the common operations are replaced by fully homomorphic addition and fully homomorphic multiplication operations under the ciphertext supported by multi-key fully homomorphic encryption.
As a preferred technical solution, the nonlinear function employs an activation function, and the activation function is specifically calculated as:
when ciphertext data c = Enc sk (d) An activation function calculation is required, then:
the server S will need to perform an activation function, e.g.
Figure BDA0003586904080000032
Performing Taylor expansion, i.e.
Figure BDA0003586904080000033
Utilizing the full homomorphic addition and the full homomorphic multiplication to complete the operation of the multi-key ciphertext c>
Figure BDA0003586904080000034
Finally, a multi-key ciphertext result c' = Enc is obtained sk (Sigmoid '(d)), and Sigmoid' (d) ≈ Sigmoid (d), thereby ensuring the accuracy of the calculation.
As a preferred technical solution, the machine learning modeling supports various types of machine learning modeling algorithms, including linear regression, logistic regression, neural network, or other algorithms.
The invention provides a multi-user privacy protection machine learning system based on multi-key fully homomorphic encryption, which is applied to the multi-user privacy protection machine learning method based on multi-key fully homomorphic encryption and comprises a preprocessing module, a multi-key ciphertext data set generating module, a fully homomorphic operation module, a machine learning module and a decryption module;
the preprocessing module is used for initializing a multi-key fully homomorphic encryption algorithm by using a common character string CRS, generating a security parameter lambda and a common parameter set mkparams, and sending the common parameter set mkparams to the cloud server S and each data provider DP i Initializing; the multi-key fully homomorphic encryption algorithm comprises a public parameter generation algorithm, a key generation algorithm, an encryption algorithm, a decryption algorithm and a multi-key fully homomorphic operation algorithm;
the multi-key ciphertext data set generation module is used for each data provider DP i The keys sk are generated independently from each other by calling a key generation algorithm according to the received public parameter set mkparams i And evaluating the key evk i Then calls the encryption algorithm with the respective key sk i For own local data d i Encrypting to obtain single-key ciphertext Enc ski (d i ) And evaluating the key evk i Uploading the data to a server S, and integrating the single-key ciphertext data Enc uploaded by each data provider by the server S ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D);
The fully homomorphic operation module is used for the server S to perform multi-key ciphertext data set Enc sk (D) On the basis of the method, a multi-key fully homomorphic operation algorithm is called, linear operation in a common machine learning algorithm is replaced by fully homomorphic addition and fully homomorphic multiplication, and a multi-key ciphertext data set Enc is subjected to sk (D) Performing machine learning modeling training; the machine learning modeling training is to calculate the ciphertext data by adopting a nonlinear function and perform line processing on the ciphertext data by utilizing the nonlinear functionPerforming sexual expansion, and calculating by using addition and multiplication in fully homomorphic operation;
the machine learning module is used for enabling the server S to complete machine learning modeling under the ciphertext and then encrypting the multi-key encrypted model ciphertext Enc sk (model) issuing to each data provider DP i And a decryption side DE;
the decryption module is used for combining all data providers DP by the decryption party DE i And their respective keys sk i Calling a decryption algorithm to sequentially decrypt the multi-key model ciphertext Enc sk (model) to obtain the DP from the respective data provider i Model = Dec trained on data D of (1) sk (Enc sk (model))。
Yet another aspect of the present invention provides an electronic device, including:
at least one processor; and (c) a second step of,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores computer program instructions executable by the at least one processor to cause the at least one processor to perform the multi-user privacy preserving machine learning method based on multi-key fully homomorphic encryption.
Yet another aspect of the present invention provides a computer-readable storage medium storing a program, which when executed by a processor, implements the multi-key fully homomorphic encryption-based multi-user privacy protection machine learning method.
Compared with the prior art, the invention has the following advantages and beneficial effects:
(1) The invention adopts a multi-key fully homomorphic encryption algorithm, the security is based on the difficult assumption of error learning on the sub-ring, the semantic security is proved, and meanwhile, the attack of a quantum computer can be resisted.
(2) In the invention, each user independently encrypts own data by using the respectively generated key, thereby preventing the problem that malicious users and a server conspire to steal input data of other users.
(3) The invention directly encrypts the input data, adopts the fully homomorphic encryption support and operates under the ciphertext for infinite times, so that the machine learning model can finally converge, and the ciphertext training/predicting result is consistent with the direct training/predicting result in the plaintext.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is an architecture diagram of a multi-user privacy preserving machine learning scheme based on multi-key fully homomorphic encryption according to an embodiment of the present invention;
FIG. 2 is a flowchart of a multi-user privacy preserving machine learning method based on multi-key fully homomorphic encryption according to an embodiment of the present invention;
FIG. 3 is a block diagram of a multi-user privacy preserving machine learning system based on multi-key fully homomorphic encryption according to an embodiment of the present invention;
fig. 4 is a structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by a person skilled in the art that the embodiments described herein can be combined with other embodiments.
Machine learning: machine learning is a branch of artificial intelligence, and is a research on computer algorithms which can be automatically improved through experience; the machine learning algorithm is an algorithm for automatically analyzing and obtaining rules from data and predicting unknown data by using the rules.
Multi-key fully homomorphic encryption: homomorphic encryption techniques are cryptographic techniques based on mathematical problems. The multi-key fully homomorphic encryption is that data which is homomorphic encrypted by using different keys is operated to obtain an output, the output is decrypted, and the result is the same as the result of directly operating unencrypted data by using the same method.
And (3) learning the upper band error of the sub-circle: the method is a kind of difficult calculation problem on the sub-ring, aims to prevent the cryptanalysis of the quantum computer and provides a basis for homomorphic encryption.
The invention relates to a scheme for realizing multi-user privacy protection machine learning based on a multi-key fully homomorphic encryption algorithm, wherein the multi-key fully homomorphic encryption algorithm supports data encrypted by different keys to perform fully homomorphic operation together, and the algorithm consists of 5 specific algorithms:
1. common parameter generation algorithm mkparams ← mkfhe λ ) A security parameter lambda is taken as input and a common parameter set mkparams is output;
2. key generation algorithm sk, pk, BK, KS ← mkfhe. Keygen (mkparams) using a common set of parameters to generate a different LWE key sk, public key pk, bootstrapping key BK, key exchange key KS for each data provider;
3. an encryption algorithm c ← MKTFHE. SymEnc (μ, sk) which encrypts the single-bit data μ with the LWE key sk and then returns an LWE ciphertext c;
4. decryption algorithm μ ← MKTFHE. SymDec (c, { sk) i } i∈{k} ) The algorithm inputs a multi-key encrypted ciphertext c and a set of keys { sk ] corresponding thereto i Returning a plaintext decryption result mu corresponding to the ciphertext c encrypted by the multiple keys;
5. multiple key fully homomorphic arithmetic algorithm c' ← MKTFHE 1 ,c 2 ,{pk i ,BK i ,KS i } i∈{k} ) Input as two LWE ciphertexts c 1 And c 2 And a set of public keys { pk } i ,BK i ,KS i } i∈{k} And outputting a result c' of performing corresponding operation on the plaintext of the two groups of input ciphertexts after the multi-key encryption.
Referring to fig. 1, a system architecture of the multi-user privacy protection machine learning method based on multi-key fully homomorphic encryption of the present invention includes a public string (CRS), a data provider, a cloud server, and a decryptor, specifically:
common character string (CRS): a security parameter λ and a public parameter set mkparams are generated and broadcast to the cloud server and each data provider.
A data provider: in the system, data samples are provided in a data providing direction machine learning algorithm, and data of each data providing direction are independent. Taking two data providers as an example, each data provider independently generates a key and a public key pair according to the received public parameter set, encrypts the data sample by using the respective key, and uploads the encrypted data sample to the cloud server. And then participate in joint decryption.
Cloud server: the method mainly receives ciphertext data encrypted by each data provider, completes a model training/predicting task under a multi-key fully homomorphic condition according to a corresponding machine learning algorithm, and returns a training/predicting result to a decryptor.
And (3) decryption: and the decryptor is responsible for receiving the machine learning model training/prediction result under the multi-key fully homomorphic encryption completed by the cloud server and combining all the data providers for decryption.
Referring to fig. 2, the multi-user privacy protection machine learning method based on multi-key fully homomorphic encryption of the embodiment includes the following steps:
s1, initializing a multi-key fully homomorphic encryption algorithm by using a common character string CRS, generating a security parameter lambda and generatingForming a common parameter set mkparams and transmitting the common parameter set mkparams to the cloud server S and each data provider DP i Is initialized.
Further, each data provider DP i Data d local to itself i Before using the key encryption, the method also comprises the following steps:
each data provider DP i Preparing local data d i And preprocessing local data of the user and extracting features to prepare for machine learning modeling.
S2, each data provider DP i Generating keys sk independently from each other by calling a key generation algorithm according to the received public parameter set mkparams i And evaluating the key evk i Then the encryption algorithm is invoked using the respective key sk i To own local data d i Encrypting to obtain single-key ciphertext Enc ski (d i ) And evaluating the key evk i Uploading the data to a server S, and integrating the single-key ciphertext data Enc uploaded by each data provider by the server S ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D)。
Further, the server S integrates the single-key ciphertext data Enc uploaded by each data party ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D) The method specifically comprises the following steps:
ith data provider DP i Uploaded single key ciphertext data Enc ski (d i ) Is a p i Ciphertext matrix of xq, i.e. DP i Uploaded data consensus p i And each piece of data comprises q values including the tag value, the server S firstly fills the ciphertext uploaded by each data provider, expands the ciphertext structure of a single key into a multi-key ciphertext structure, and then aggregates the multi-key ciphertext structure to obtain a multi-key ciphertext data set Enc sk (D) Is a matrix of p x q, where,
Figure BDA0003586904080000071
that is, the server combines the data uploaded by all the data providers together to obtain p numbersAccordingly, each piece of data has q values including the tag value, and p × q pieces of ciphertext are included.
S3, the server S stores the multi-key ciphertext data set Enc sk (D) On the basis of the method, a multi-key fully homomorphic operation algorithm is called, linear operation in a common machine learning algorithm is replaced by fully homomorphic addition and fully homomorphic multiplication, and a multi-key ciphertext data set Enc is subjected to sk (D) Performing machine learning modeling training; the machine learning modeling training is to calculate the ciphertext data by adopting a nonlinear function, linearly expand the ciphertext data by utilizing the nonlinear function, and calculate by utilizing addition and multiplication in the fully homomorphic operation.
Further, the replacing linear operation in the common machine learning algorithm with fully homomorphic addition and fully homomorphic multiplication specifically includes:
in order to perform machine learning training in a ciphertext state, common operations in a machine learning algorithm are all split into basic addition and multiplication operations, and then the common operations are replaced by fully homomorphic addition and fully homomorphic multiplication operations under the ciphertext supported by multi-key fully homomorphic encryption.
Further, the nonlinear function is an activation function, and the activation function is specifically calculated as:
when ciphertext data c = Enc sk (d) Activation function calculations need to be performed, then:
the server S will need to perform an activation function, e.g.
Figure BDA0003586904080000072
Performing Taylor expansion, i.e.
Figure BDA0003586904080000081
Completing the operation of multi-key ciphertext c by using full homomorphic addition and full homomorphic multiplication>
Figure BDA0003586904080000082
Finally obtaining a multi-key ciphertext result c' = Enc sk (Sigmoid '(d)), and Sigmoid' (d) ≈ Sigmoid (d), thereby ensuring the accuracy of the calculation.
S4, server SAfter completing machine learning modeling under ciphertext, the model ciphertext Enc of multi-key encryption is performed sk (model) issuing to each data provider DP i And a decryption side DE.
S5, the decryptor DE combines all the data providers DP i And their respective keys sk i Calling a decryption algorithm to sequentially decrypt the multi-key model ciphertext Enc sk (model) to obtain the DP from the respective data provider i Model = Dec trained on data D of (1) sk (Enc sk (model))。
Further, the machine learning modeling supports various types of machine learning modeling algorithms, including linear regression, logistic regression, or neural network algorithms.
In a more specific embodiment of the present application, a multi-user privacy protection machine learning method based on multi-key fully homomorphic encryption includes the following steps:
step 1: setup (1) for public string call mkfhe λ ) A common parameter set mkparams is generated and sent to all data providers and cloud servers.
Step 2: each data provider i (i is more than or equal to 1 and less than or equal to k) calls MKTFHE i Public key pk i Bootstrapping Key BK i Key exchange key KS i Then call MKTFHESymEnc (μ, sk), using the respective LWE key sk i Encrypting the data to generate a single-key ciphertext, and then combining the encrypted data with the { pk i ,BK i ,KS i } i∈{k} And uploading the public key to the cloud server.
And 3, after receiving the single-key ciphertext and the public key uploaded by each data participant, the cloud server firstly expands the single-key ciphertext into a multi-key ciphertext and then calls MKTFHE 1 ,c 2 ,{pk i ,BK i ,KS i } i∈{k} ) Performing corresponding multi-key fully homomorphic calculation to obtain the mechanistic under the multi-key cryptographAnd learning the model result and sending the model result to the decryption party.
And 4, step 4: after receiving the training result under the ciphertext from the cloud server, the decryptor calls MKTFHENSeSymDec (c, { sk) i } i∈{k} ) And all data providers are combined to carry out alternate decryption, and the decryption of the result is finished under the condition that the secret key of each party is not disclosed.
The invention provides a privacy protection multi-user machine learning method based on multi-key homomorphic encryption aiming at the problems of poor safety, low accuracy and the like of multi-user machine learning at present, each data provider independently generates a respective key and encrypts respective data by using the respective key, compared with a multi-user machine learning scheme based on a single key, the method has higher difficulty and more complex flow, and the technical key points are as follows:
1. in order to ensure the training and prediction effects of the machine learning model, the input data is directly encrypted, and a fully homomorphic encryption technology is adopted to support higher-frequency iterative training;
2. in order to solve the problem that users and servers in single-key homomorphic encryption conspire to steal input data of other users, the invention provides a privacy protection machine learning system supporting multiple users by relying on a multi-key homomorphic encryption scheme, and each user can encrypt data by using different keys and use a ciphertext of the data to finish training and prediction of a machine learning model.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present invention.
Based on the same idea as the multi-user privacy protection machine learning method based on the multi-key fully homomorphic encryption in the embodiment, the invention also provides a multi-user privacy protection machine learning system based on the multi-key fully homomorphic encryption, and the system can be used for executing the multi-user privacy protection machine learning method based on the multi-key fully homomorphic encryption. For convenience of explanation, the structural schematic diagram of the embodiment of the multi-user privacy-preserving machine learning system based on multi-key fully homomorphic encryption only shows a part related to the embodiment of the present invention, and those skilled in the art will understand that the illustrated structure does not constitute a limitation to the apparatus, and may include more or less components than those illustrated, or combine some components, or arrange different components.
Referring to fig. 3, in another embodiment of the present application, a multi-user privacy protection machine learning system 100 based on multi-key fully homomorphic encryption is provided, the system includes a preprocessing module 101, a multi-key ciphertext data set generating module 102, a fully homomorphic operation module 103, a machine learning module 104, and a decryption module 105;
the preprocessing module 101 is configured to initialize a multi-key fully homomorphic encryption algorithm with a common string CRS, generate a security parameter λ and a common parameter set mkparams, and send the common parameter set mkparams to the cloud server S and each data provider DP i Initializing; the multi-key fully homomorphic encryption algorithm comprises a public parameter generation algorithm, a key generation algorithm, an encryption algorithm, a decryption algorithm and a multi-key fully homomorphic operation algorithm;
the multi-key ciphertext data set generation module 102 is configured to provide DP for each data provider i Generating keys sk independently from each other by calling a key generation algorithm according to the received public parameter set mkparams i And evaluating the key evk i Then calls the encryption algorithm with the respective key sk i For own local data d i Encrypting to obtain single-key ciphertext Enc ski (d i ) And evaluating the key evk i Uploading the data to a server S, and integrating the single-key ciphertext data Enc uploaded by each data provider by the server S ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D);
The fully homomorphic operation module 103 is used for the server S to perform the multi-key ciphertext data set Enc sk (D) On the basis of the method, a multi-key fully homomorphic operation algorithm is called, linear operation in a common machine learning algorithm is replaced by fully homomorphic addition and fully homomorphic multiplication, and the multi-key fully homomorphic operation algorithm is subjected to multi-keyCiphertext data set Enc sk (D) Performing machine learning modeling training; the machine learning modeling training is to calculate the ciphertext data by adopting a nonlinear function, linearly expand the ciphertext data by utilizing the nonlinear function, and calculate by utilizing addition and multiplication in the fully homomorphic operation;
the machine learning module 104 is configured to, after the server S completes machine learning modeling under the ciphertext, encrypt the model ciphertext Enc with multiple keys sk (model) issuing to each data provider DP i And a decryption side DE;
the decryption module 105 is used for the decryptor DE to associate all data providers DP i And their respective keys sk i Calling a decryption algorithm to sequentially decrypt the multi-key model ciphertext Enc sk (model) to obtain the DP from the respective data provider i Model = Dec trained on data D of (1) sk (Enc sk (model))。
Furthermore, in the multi-key ciphertext data set generation module, the server S integrates the single-key ciphertext data Enc uploaded by each data party ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D) The method specifically comprises the following steps:
ith data provider DP i Uploaded single key ciphertext data Enc ski (d i ) Is a p i Ciphertext matrices of xq, i.e. DP i Uploaded data consensus p i And each piece of data comprises q values including the tag value, the server S firstly fills the ciphertext uploaded by each data provider, expands the ciphertext structure of a single key into a multi-key ciphertext structure, and then aggregates the multi-key ciphertext structure to obtain a multi-key ciphertext data set Enc sk (D) Is a matrix of p x q, where,
Figure BDA0003586904080000101
that is, the server pieces together the data uploaded by all the data providers to obtain p pieces of data, each piece of data contains q values including the tag value, and p × q ciphertexts.
Further, the nonlinear function is an activation function, and the activation function is specifically calculated as:
when ciphertext data c = Enc sk (d) An activation function calculation is required, then:
the server S will need to perform an activation function, e.g.
Figure BDA0003586904080000102
Performing Taylor expansion, i.e.
Figure BDA0003586904080000103
Utilizing the full homomorphic addition and the full homomorphic multiplication to complete the operation of the multi-key ciphertext c>
Figure BDA0003586904080000104
Finally obtaining a multi-key ciphertext result c' = Enc sk (Sigmoid '(d)), and Sigmoid' (d) ≈ Sigmoid (d), thereby ensuring the accuracy of the calculation.
It should be noted that, the multi-user privacy protection machine learning system based on multi-key homomorphic encryption of the present invention corresponds to the multi-user privacy protection machine learning method based on multi-key homomorphic encryption of the present invention one to one, and the technical features and the beneficial effects thereof described in the above embodiment of the multi-user privacy protection machine learning method based on multi-key homomorphic encryption are both applicable to the embodiment of multi-user privacy protection machine learning based on multi-key homomorphic encryption, and specific contents may refer to the description in the embodiment of the method of the present invention, and are not described herein again, and thus, the present invention is claimed.
In addition, in the implementation manner of the multi-user privacy protection machine learning system based on multi-key homomorphic encryption according to the above embodiment, the logical division of each program module is only an example, and in practical applications, the above function distribution may be completed by different program modules according to needs, for example, due to configuration requirements of corresponding hardware or convenience of implementation of software, that is, the internal structure of the multi-user privacy protection machine learning system based on multi-key homomorphic encryption is divided into different program modules to complete all or part of the above described functions.
Referring to fig. 4, in an embodiment, an electronic device 200 for implementing a multi-user privacy-preserving machine learning method based on multi-key fully homomorphic encryption is provided, where the electronic device 200 may include a first processor 201, a first memory 202, and a bus, and may further include a computer program stored in the first memory 202 and executable on the first processor 201, such as a multi-user privacy-preserving machine learning program 203 with multi-key fully homomorphic encryption.
The first memory 202 includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The first memory 202 may in some embodiments be an internal storage unit of the electronic device 200, e.g. a removable hard disk of the electronic device 200. The first memory 202 may also be an external storage device of the electronic device 200 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 200. Further, the first memory 202 may also include both an internal storage unit and an external storage device of the electronic device 200. The first memory 202 may be used to store not only application software installed in the electronic device 200 and various types of data, such as codes of the multi-user privacy protection machine learning program 203 for multi-key fully homomorphic encryption, but also temporarily store data that has been output or is to be output.
The first processor 201 may be formed by an integrated circuit in some embodiments, for example, by a single packaged integrated circuit, or by a plurality of integrated circuits packaged with the same function or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The first processor 201 is a Control Unit (Control Unit) of the electronic device, connects various components of the whole electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device 200 by running or executing programs or modules (e.g., federal learning defense programs, etc.) stored in the first memory 202 and calling data stored in the first memory 202.
Fig. 4 shows only an electronic device having components, and those skilled in the art will appreciate that the structure shown in fig. 4 does not constitute a limitation of the electronic device 200, and may include fewer or more components than those shown, or some components may be combined, or a different arrangement of components.
The multi-key fully homomorphic encrypted multi-user privacy preserving machine learning program 203 stored in the first memory 202 of the electronic device 200 is a combination of instructions that, when executed in the first processor 201, can implement:
initializing a multi-key fully homomorphic encryption algorithm by using a public character string CRS, generating a security parameter lambda and a public parameter set mkparams, and sending the public parameter set mkparams to a cloud server S and each data provider DP i Initializing; the multi-key fully homomorphic encryption algorithm comprises a public parameter generation algorithm, a key generation algorithm, an encryption algorithm, a decryption algorithm and a multi-key fully homomorphic operation algorithm;
each data provider DP i Generating keys sk independently from each other by calling a key generation algorithm according to the received public parameter set mkparams i And evaluating the key evk i Then calls the encryption algorithm with the respective key sk i For own local data d i Encrypting to obtain single-key ciphertext Enc ski (d i ) And evaluating the key evk i Uploading the data to a server S, and integrating the single-key ciphertext data Enc uploaded by each data provider by the server S ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D);
Server S stores multiple key cipher text data set Enc sk (D) On the basis of the method, a multi-key fully homomorphic operation algorithm is called, linear operation in a common machine learning algorithm is replaced by fully homomorphic addition and fully homomorphic multiplication, and a multi-key ciphertext data set Enc is subjected to sk (D) Performing machine learning modeling training(ii) a The machine learning modeling training is to calculate the ciphertext data by adopting a nonlinear function, linearly expand the ciphertext data by utilizing the nonlinear function, and calculate by utilizing addition and multiplication in the fully homomorphic operation;
after completing machine learning modeling under ciphertext, the server S encrypts the multi-key encrypted model ciphertext Enc sk (model) issuing to each data provider DP i And a decryption side DE;
decryptor DE federates all data providers DP i And their respective keys sk i Calling a decryption algorithm to sequentially decrypt the multi-key model ciphertext Enc sk (model) to obtain the DP from the respective data provider i Model = Dec trained on data D of (1) sk (Enc sk (model))。
Further, the modules/units integrated with the electronic device 200, if implemented in the form of software functional units and sold or used as independent products, may be stored in a non-volatile computer-readable storage medium. The computer-readable medium may include: any entity or device capable of carrying said computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, read-Only Memory (ROM).
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.

Claims (7)

1. The multi-key full homomorphic encryption-based multi-user privacy protection machine learning method is characterized by comprising the following steps of:
initializing a multi-key fully-homomorphic encryption algorithm by using a common character string CRS, wherein the initialization comprises the steps of generating a security parameter lambda and generating a common parameter set mkparams, and sending the common parameter set mkparams to a cloud server S and each data provider DP i Initializing; the multi-key fully homomorphic encryption algorithm comprises a public parameter generation algorithm, a key generation algorithm, an encryption algorithm, a decryption algorithm and a multi-key fully homomorphic operation algorithm; the common parameter set mkparams is generated by:
the common character string CRS calls the common parameter generation algorithm, a safety parameter lambda is used as the input of the common parameter generation algorithm, and finally a common parameter set mkparams is output;
each data provider DP i Generating keys sk independently from each other by calling a key generation algorithm according to the received public parameter set mkparams i And evaluating the key evk i Then calling the encryption algorithm to utilize eachSelf secret key sk i To own local data d i Encrypting to obtain single-key ciphertext Enc ski (d i ) And evaluating the key evk i Uploading the data to a server S, and integrating the single-key ciphertext data Enc uploaded by each data provider by the server S ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D) (ii) a The server S integrates the single-key ciphertext data Enc uploaded by each data side ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D) The method specifically comprises the following steps:
ith data provider DP i Uploaded single key ciphertext data Enc ski (d i ) Is a p i Ciphertext matrices of xq, i.e. DP i Uploaded data common p i And each piece of data comprises q values including the tag value, the server S firstly fills the ciphertext uploaded by each data provider, expands the ciphertext structure of a single key into a multi-key ciphertext structure, and then aggregates the multi-key ciphertext structure to obtain a multi-key ciphertext data set Enc sk (D) Is a matrix of p x q, where,
Figure FDA0004009794140000011
the server combines the data uploaded by all data providers together to obtain p pieces of data, wherein each piece of data comprises q values including a label value, and p × q ciphertexts;
server S stores multiple key cipher text data set Enc sk (D) On the basis of the method, a multi-key fully homomorphic operation algorithm is called, linear operation in a common machine learning algorithm is replaced by fully homomorphic addition and fully homomorphic multiplication, and a multi-key ciphertext data set Enc is subjected to sk (D) Performing machine learning modeling training; the machine learning modeling training is to calculate ciphertext data by adopting a nonlinear function, linearly expand the ciphertext data by using the nonlinear function, and calculate by using addition and multiplication in fully homomorphic operation; the nonlinear function adopts an activation function, and the activation function is calculated specifically as follows:
when ciphertext data c = Enc sk (d) An activation function calculation is required, then:
the server S needs to perform the calculation of the activation function and will
Figure FDA0004009794140000012
Performing Taylor expansion, i.e.
Figure FDA0004009794140000013
Utilizing the full homomorphic addition and the full homomorphic multiplication to complete the operation of the multi-key ciphertext c>
Figure FDA0004009794140000014
Finally obtaining a multi-key ciphertext result c' = Enc sk (Sigmoid '(d)), and Sigmoid' (d) ≈ Sigmoid (d), thereby ensuring the accuracy of the calculation;
after completing machine learning modeling under ciphertext, the server S encrypts the multi-key encrypted model ciphertext Enc sk (model) issuing to each data provider DP i And a decryption side DE;
decryptor DE federates all data providers DP i And their respective keys sk i Calling a decryption algorithm to sequentially decrypt the multi-key model ciphertext Enc sk (model) to obtain the DP from the respective data provider i Model = Dec trained on data D of (1) sk (Enc sk (model))。
2. The multi-user privacy preserving machine learning method based on multi-key fully homomorphic encryption according to claim 1, wherein each Data Provider (DP) i Data d local to itself i Before using the encryption key, the method also comprises the following steps:
each data provider DP i Preparing local data d i And preprocessing local data of the user and extracting features to prepare for machine learning modeling.
3. The multi-user privacy-preserving machine learning method based on multi-key fully homomorphic encryption according to claim 1, wherein the linear operation in the ordinary machine learning algorithm is replaced by fully homomorphic addition and fully homomorphic multiplication, specifically:
in order to perform machine learning training in a ciphertext state, common operations in a machine learning algorithm are all split into basic addition and multiplication operations, and then the common operations are replaced by fully homomorphic addition and fully homomorphic multiplication operations under the ciphertext supported by multi-key fully homomorphic encryption.
4. The multi-user privacy-preserving machine learning method based on multi-key fully homomorphic encryption according to claim 1, wherein the machine learning modeling supports various types of machine learning modeling algorithms, including linear regression, logistic regression, or neural network.
5. The multi-user privacy protection machine learning system based on multi-key fully homomorphic encryption is characterized by being applied to the multi-user privacy protection machine learning method based on multi-key fully homomorphic encryption of any one of claims 1 to 4, and comprising a preprocessing module, a multi-key ciphertext data set generating module, a fully homomorphic operation module, a machine learning module and a decryption module;
the preprocessing module is used for initializing a multi-key fully homomorphic encryption algorithm by using a common character string CRS, generating a security parameter lambda and a common parameter set mkparams, and sending the common parameter set mkparams to the cloud server S and each data provider DP i Initializing; the multi-key fully homomorphic encryption algorithm comprises a public parameter generation algorithm, a key generation algorithm, an encryption algorithm, a decryption algorithm and a multi-key fully homomorphic operation algorithm;
the multi-key ciphertext data set generation module is used for each data provider DP i Generating keys sk independently from each other by calling a key generation algorithm according to the received public parameter set mkparams i And evaluating the key evk i Then calls the encryption algorithm with the respective key sk i For own local data d i Encrypting to obtain single-key ciphertext Enc ski (d i ) And evaluating the key evk i Uploading to the server S, and finishing the server SSingle key cryptograph data Enc uploaded by each data provider ski (d i ) Obtaining a multi-key ciphertext data set Enc sk (D);
The fully homomorphic operation module is used for the server S to perform multi-key ciphertext data set Enc sk (D) On the basis of the method, a multi-key fully homomorphic operation algorithm is called, linear operation in a common machine learning algorithm is replaced by fully homomorphic addition and fully homomorphic multiplication, and a multi-key ciphertext data set Enc is subjected to sk (D) Performing machine learning modeling training; the machine learning modeling training is to calculate the ciphertext data by adopting a nonlinear function, linearly expand the ciphertext data by utilizing the nonlinear function, and calculate by utilizing addition and multiplication in the fully homomorphic operation;
the machine learning module is used for enabling the server S to encrypt the model ciphertext Enc with multiple keys after completing machine learning modeling under the ciphertext sk (model) issuing to each data provider DP i And a decryption side DE;
the decryption module is used for combining all data providers DP by the decryption party DE i And their respective keys sk i Calling a decryption algorithm to sequentially decrypt the multi-key model ciphertext Enc sk (model) to obtain the DP from each data provider i Model = Dec trained on data D of (1) sk (Enc sk (model))。
6. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores computer program instructions executable by the at least one processor to cause the at least one processor to perform the multi-user privacy preserving machine learning method based on multi-key fully homomorphic encryption of any one of claims 1-4.
7. A computer-readable storage medium storing a program, wherein the program, when executed by a processor, implements the multi-user privacy-preserving machine learning method based on multi-key fully homomorphic encryption according to any one of claims 1 to 4.
CN202210365746.7A 2022-04-08 2022-04-08 Multi-user privacy protection machine learning method and device based on multi-key full homomorphic encryption Active CN114844621B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210365746.7A CN114844621B (en) 2022-04-08 2022-04-08 Multi-user privacy protection machine learning method and device based on multi-key full homomorphic encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210365746.7A CN114844621B (en) 2022-04-08 2022-04-08 Multi-user privacy protection machine learning method and device based on multi-key full homomorphic encryption

Publications (2)

Publication Number Publication Date
CN114844621A CN114844621A (en) 2022-08-02
CN114844621B true CN114844621B (en) 2023-04-07

Family

ID=82564141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210365746.7A Active CN114844621B (en) 2022-04-08 2022-04-08 Multi-user privacy protection machine learning method and device based on multi-key full homomorphic encryption

Country Status (1)

Country Link
CN (1) CN114844621B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314211A (en) * 2022-08-08 2022-11-08 济南大学 Privacy protection machine learning training and reasoning method and system based on heterogeneous computing
CN116402505B (en) * 2023-05-11 2023-09-01 蓝象智联(杭州)科技有限公司 Homomorphic encryption-based graph diffusion method, homomorphic encryption-based graph diffusion device and storage medium
CN116915382B (en) * 2023-09-14 2023-12-15 北京隐算科技有限公司 Multi-user privacy protection method based on mode component homomorphism

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9313028B2 (en) * 2012-06-12 2016-04-12 Kryptnostic Method for fully homomorphic encryption using multivariate cryptography
CN112910624B (en) * 2021-01-14 2022-05-10 东北大学 Ciphertext prediction method based on homomorphic encryption
CN113037460B (en) * 2021-03-03 2023-02-28 北京工业大学 Federal learning privacy protection method based on homomorphic encryption and secret sharing
CN113553610B (en) * 2021-09-22 2021-12-31 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Multi-party privacy protection machine learning method based on homomorphic encryption and trusted hardware
CN114745092A (en) * 2022-04-11 2022-07-12 浙江工商大学 Financial data sharing privacy protection method based on federal learning

Also Published As

Publication number Publication date
CN114844621A (en) 2022-08-02

Similar Documents

Publication Publication Date Title
CN114844621B (en) Multi-user privacy protection machine learning method and device based on multi-key full homomorphic encryption
US11818262B2 (en) Method and system for one-to-many symmetric cryptography and a network employing the same
CN113553610B (en) Multi-party privacy protection machine learning method based on homomorphic encryption and trusted hardware
US11095428B2 (en) Hybrid system and method for secure collaboration using homomorphic encryption and trusted hardware
Han et al. A data sharing protocol to minimize security and privacy risks of cloud storage in big data era
US11269621B2 (en) Obfuscation for protection of streaming media and other data flows
CN111460453A (en) Machine learning training method, controller, device, server, terminal and medium
CN110599163B (en) Transaction record outsourcing method facing block chain transaction supervision
US11616643B2 (en) System and method of management of a shared cryptographic account
CN110611662A (en) Attribute-based encryption-based fog collaborative cloud data sharing method
JP2022531593A (en) Systems and methods for adding and comparing integers encrypted by quasigroup operations in AES counter mode encryption
CA3056814A1 (en) Symmetric cryptographic method and system and applications thereof
CN105721146B (en) A kind of big data sharing method towards cloud storage based on SMC
CN112953974A (en) Data collision method, device, equipment and computer readable storage medium
GB2594741A (en) Multi-directional zero-knowledge attestation systems and methods
CN114500069A (en) Method and system for storing and sharing electronic contract
CN117390676A (en) Offline privacy protection prediction method, system and equipment of trusted execution environment
Joseph et al. A Novel Algorithm for secured data sharing in cloud using GWOA-DNA cryptography
CN116861477A (en) Data processing method, system, terminal and storage medium based on privacy protection
Amanullah et al. An Effective double verification-based method for certifying information safety in cloud computing
CN114430321A (en) DFA self-adaptive security-based black box traceable key attribute encryption method and device
CN112019335B (en) SM2 algorithm-based multiparty collaborative encryption and decryption method, device, system and medium
Devaki Re-encryption model for multi-block data updates in network security
US11811920B1 (en) Secure computation and communication
CN113746829B (en) Multi-source data association method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant