Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2020

13-04-2020

Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions

Authors: Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao

Published in: Peer-to-Peer Networking and Applications | Issue 6/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Functional encryption (FE) and predicate encryption (PE) can be utilized in deploying and executing machine learning (ML) algorithms to improve efficiency. However, most of existing FE and PE algorithms only consider generic functions. Actually, quadratic-functions-based FE and PE can be used to further reduce the computation costs significantly. In this paper, we present a functional encryption scheme for quadratic functions from those for generic functions. In our constructions, ciphertexts are associated with a pair of vectors \((\mathsf {x},\mathsf {y})\in \mathbb {Z}^{n}_{q}\times \mathbb {Z}^{m}_{q}\), private keys are associated with a quadratic function, and the decryption of ciphertexts CT(x,y) with a private key skF, where F is a n × m-dimensional matrix, recovers \((\mathsf {x})^{\top }\mathsf {F}\mathsf {y}\in \mathbb {Z}_{q}\). Compared with Baltico et al.’s FEs for quadratic functions (at Crypto 2017), our schemes could obtain almost the same ciphertexts size of \(O((n+m)\log q)\) as their schemes (in contrast to O(n) in Baltico et al.’s schemes), and the computation for quadratic functions in our scheme does not rely on bilinear maps, while their schemes must rely on this assumption. In particular, our schemes under the standard assumptions achieve adaptive security, while Baltico et al.’s scheme only obtains selective security. Moreover, beyond the MDDH and GGM assumptions, our schemes allow for instantiations under standard assumptions such as LWE, LPN, and etc.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agrawal S, Kumarasubramanian A, Prabhakaran M, Sahai A (2015) On the practical security of inner product functional encryption. In: Katz J. (ed) Advance in PKC 2015, vol 9020. Springer, Berlin Heidelberg, pp 777–798 Agrawal S, Kumarasubramanian A, Prabhakaran M, Sahai A (2015) On the practical security of inner product functional encryption. In: Katz J. (ed) Advance in PKC 2015, vol 9020. Springer, Berlin Heidelberg, pp 777–798
2.
go back to reference Ananth P, Brakerski Z, Segev G, Vaikuntanathan V (2015) From selective to adaptive security in functional encryption. In: Gennaro R, Robshaw M (eds) Advance in CRYPTO, vol 2015, pp 657–677 Ananth P, Brakerski Z, Segev G, Vaikuntanathan V (2015) From selective to adaptive security in functional encryption. In: Gennaro R, Robshaw M (eds) Advance in CRYPTO, vol 2015, pp 657–677
3.
go back to reference Ananth P, Sahai A (2017) Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps. In: Coron JS., Nielsen J (eds) Advances in EUROCRYPT 2017, vol 10210, Springer, Berlin Heidelberg. pp 152–181 Ananth P, Sahai A (2017) Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps. In: Coron JS., Nielsen J (eds) Advances in EUROCRYPT 2017, vol 10210, Springer, Berlin Heidelberg. pp 152–181
4.
go back to reference Baltico CEZ, Catalano D, Fiore D, Gay R (2017) Practical functional encryption for quadratic functions with applications to predicate encryption. In CRYPTO 2017:67–98MathSciNetMATH Baltico CEZ, Catalano D, Fiore D, Gay R (2017) Practical functional encryption for quadratic functions with applications to predicate encryption. In CRYPTO 2017:67–98MathSciNetMATH
5.
go back to reference Bellare M, Rogaway P (2006) The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In: Vaudenay S (ed) EUROCRYPT 2006. vol 4004. Springer, Heidelberg, pp 409–426 Bellare M, Rogaway P (2006) The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In: Vaudenay S (ed) EUROCRYPT 2006. vol 4004. Springer, Heidelberg, pp 409–426
6.
go back to reference Boneh D (1998) The decision di e-hellman problem. In: proceedings of the 3rd Algorithmic Number Theory Symposium volume 1423, pages 48–63 Lecture Notes in Computer Science Boneh D (1998) The decision di e-hellman problem. In: proceedings of the 3rd Algorithmic Number Theory Symposium volume 1423, pages 48–63 Lecture Notes in Computer Science
7.
go back to reference Boneh D (1999) Twenty years of attacks on the rsa cryptosystem. In: Notices of the American Mathematical Society, pp 203–213 Boneh D (1999) Twenty years of attacks on the rsa cryptosystem. In: Notices of the American Mathematical Society, pp 203–213
8.
go back to reference Ehsan H, Hassan T, Mehdi G (2017) Cryptodl: Deep neural networks over encrypted data. arXiv:1711.05189 Ehsan H, Hassan T, Mehdi G (2017) Cryptodl: Deep neural networks over encrypted data. arXiv:1711.​05189
9.
go back to reference Garg S, Gentry C, Halevi S, Zhandry M (2016) Functional encryption without obfuscation, In TCC2016, 480–511 Garg S, Gentry C, Halevi S, Zhandry M (2016) Functional encryption without obfuscation, In TCC2016, 480–511
10.
go back to reference Gorbunov S, Vaikuntanathan V, Wee H (2012) Functional encryption with bounded collusions via multi-party computation. In: Reihaneh Safavi-Naini, Ran Canetti (eds) editors, Advances in Cryptology CRYPTO 2012, vol 7417. Springer, Berlin Heidelberg, pp 162–179 Gorbunov S, Vaikuntanathan V, Wee H (2012) Functional encryption with bounded collusions via multi-party computation. In: Reihaneh Safavi-Naini, Ran Canetti (eds) editors, Advances in Cryptology CRYPTO 2012, vol 7417. Springer, Berlin Heidelberg, pp 162–179
11.
go back to reference Graepel T, Kristin L, Michael N (2012) Ml confidential: Machine learning on encrypted data. In: International Conference on Information Security and Cryptology, pages 1–21. Springer Graepel T, Kristin L, Michael N (2012) Ml confidential: Machine learning on encrypted data. In: International Conference on Information Security and Cryptology, pages 1–21. Springer
14.
go back to reference Jiang W, Li H, Xu G, Wen M, Dong G, Lin X (2019) Ptas: Privacy-preserving thin-client authentication scheme in blockchain-based pki. Future Generation Comput Syst 96:185–195CrossRef Jiang W, Li H, Xu G, Wen M, Dong G, Lin X (2019) Ptas: Privacy-preserving thin-client authentication scheme in blockchain-based pki. Future Generation Comput Syst 96:185–195CrossRef
15.
go back to reference Jiang XQ, Kim M, Lauter K, Song YS (2018) Secure outsourced matrix computation, and Application to neural networks. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications security pages 1209–1222 Jiang XQ, Kim M, Lauter K, Song YS (2018) Secure outsourced matrix computation, and Application to neural networks. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications security pages 1209–1222
16.
go back to reference Keith B, Vladimir I, Ben K, Antonio M, Brendan MH, Sarvar P, Daniel R, Aaron S, Karn S (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 1175–1191 Keith B, Vladimir I, Ben K, Antonio M, Brendan MH, Sarvar P, Daniel R, Aaron S, Karn S (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 1175–1191
17.
go back to reference Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerg Topic Comput 6(1):97–109CrossRef Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerg Topic Comput 6(1):97–109CrossRef
19.
go back to reference Li HW, Yang Y, Dai YS, Bai J, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data IEEE Transactions on Cloud Computing accepted Li HW, Yang Y, Dai YS, Bai J, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data IEEE Transactions on Cloud Computing accepted
22.
go back to reference Mohassel P, Zhang YP (2017) Secureml: a system for scalable privacy-preserving machine learning. In: In 2017 IEEE Symposium on Security and Privacy (S&P), pp 19–38 Mohassel P, Zhang YP (2017) Secureml: a system for scalable privacy-preserving machine learning. In: In 2017 IEEE Symposium on Security and Privacy (S&P), pp 19–38
23.
go back to reference Ran G, Nathan D, Kim L, Kristin L, Michael N, John W (2016) Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp 201–210 Ran G, Nathan D, Kim L, Kristin L, Michael N, John W (2016) Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp 201–210
24.
go back to reference Ren H, Li HW, Dai YS, Yang K, Lin XD (2018) Querying in internet of things with privacy preserving: Challenges, solutions and opportunities. IEEE Network 32(6):144–151CrossRef Ren H, Li HW, Dai YS, Yang K, Lin XD (2018) Querying in internet of things with privacy preserving: Challenges, solutions and opportunities. IEEE Network 32(6):144–151CrossRef
25.
go back to reference Sun XC, Li B, Lu XH, Fang FY (2015) Cca secure public key encryption scheme based on lwe without gaussian sampling. In Inscrypt 2015:361–378MATH Sun XC, Li B, Lu XH, Fang FY (2015) Cca secure public key encryption scheme based on lwe without gaussian sampling. In Inscrypt 2015:361–378MATH
26.
go back to reference Shacham H, Ristenpart T, Shrimpton T (2011) Careful with composition: Limitations of the indiferentiability framework. In: Paterson KG (ed) EUROCRYPT 2011, volume 6632 of LNCS, pages 487–506 pringer Shacham H, Ristenpart T, Shrimpton T (2011) Careful with composition: Limitations of the indiferentiability framework. In: Paterson KG (ed) EUROCRYPT 2011, volume 6632 of LNCS, pages 487–506 pringer
27.
go back to reference Wang HG, Chen KF, Joseph KL, Hu ZY (2018) Leakage-resilient chosen-ciphertext secure functional encryption from garbled circuits, In ISPEC2018, 119–140 Wang HG, Chen KF, Joseph KL, Hu ZY (2018) Leakage-resilient chosen-ciphertext secure functional encryption from garbled circuits, In ISPEC2018, 119–140
28.
go back to reference Wang HG, Zhang Y, Chen K, Sui GY, Zhao YL, huang XY (2019) Functional broadcast encryption with applications to data sharing for cloud storage Information Sciences Wang HG, Zhang Y, Chen K, Sui GY, Zhao YL, huang XY (2019) Functional broadcast encryption with applications to data sharing for cloud storage Information Sciences
29.
go back to reference Waters B (2015) A punctured programming approach to adaptively secure functional encryption. In Advances in CRYPTO 2015:678–697MathSciNetMATH Waters B (2015) A punctured programming approach to adaptively secure functional encryption. In Advances in CRYPTO 2015:678–697MathSciNetMATH
31.
go back to reference Xu G, Li H, Liu S, Wen M, Lu R (2019) Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans Vehicular Technol 68(4):3854–3865CrossRef Xu G, Li H, Liu S, Wen M, Lu R (2019) Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans Vehicular Technol 68(4):3854–3865CrossRef
32.
go back to reference Xu G, Li H, Ren H, Yang K, Deng RH (2019) Data security issues in deep learning: Attacks, countermeasures and opportunities. IEEE Commun Mag 57(11):116–122CrossRef Xu G, Li H, Ren H, Yang K, Deng RH (2019) Data security issues in deep learning: Attacks, countermeasures and opportunities. IEEE Commun Mag 57(11):116–122CrossRef
33.
go back to reference Xu GW, Li HW, Dai YS, Yang K, Lin XD (2018) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inform Forensics Secur 14(4):870–885CrossRef Xu GW, Li HW, Dai YS, Yang K, Lin XD (2018) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inform Forensics Secur 14(4):870–885CrossRef
34.
go back to reference Xu RH, James JB, Lin C (2019) Cryptonn: Training neural networks over encrypted data. arXiv:1904.07303 Xu RH, James JB, Lin C (2019) Cryptonn: Training neural networks over encrypted data. arXiv:1904.​07303
35.
go back to reference Yu Y, Zhang J (2016) Cryptography with auxiliary input and trapdoor from constant-noise lpn. In CRYPTO 2016:214–243MathSciNetMATH Yu Y, Zhang J (2016) Cryptography with auxiliary input and trapdoor from constant-noise lpn. In CRYPTO 2016:214–243MathSciNetMATH
36.
go back to reference Zhang Y, Xu CX, Li HW, Yang K, Zhou JY, Lin XD (2018) Healthdep: An efficient and secure deduplication scheme for cloud-assisted ehealth systems. IEEE Trans Industrial Inform 14(9):4101–4112CrossRef Zhang Y, Xu CX, Li HW, Yang K, Zhou JY, Lin XD (2018) Healthdep: An efficient and secure deduplication scheme for cloud-assisted ehealth systems. IEEE Trans Industrial Inform 14(9):4101–4112CrossRef
37.
go back to reference Zhang Y, Xu CX, Lin XD, Shen XM (2019) Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Transactions on Cloud Computing accepted Zhang Y, Xu CX, Lin XD, Shen XM (2019) Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Transactions on Cloud Computing accepted
Metadata
Title
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions
Authors
Huige Wang
Kefei Chen
Yuan Zhang
Yunlei Zhao
Publication date
13-04-2020
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00907-4

Other articles of this Issue 6/2020

Peer-to-Peer Networking and Applications 6/2020 Go to the issue

Premium Partner