Privacy-Preserving Scalar Product Computation in Cloud Environments Under Multiple Keys

Author(s):  
Hong Rong ◽  
Huimei Wang ◽  
Kun Huang ◽  
Jian Liu ◽  
Ming Xian
Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1367
Author(s):  
Raghida El El Saj ◽  
Ehsan Sedgh Sedgh Gooya ◽  
Ayman Alfalou ◽  
Mohamad Khalil

Privacy-preserving deep neural networks have become essential and have attracted the attention of many researchers due to the need to maintain the privacy and the confidentiality of personal and sensitive data. The importance of privacy-preserving networks has increased with the widespread use of neural networks as a service in unsecured cloud environments. Different methods have been proposed and developed to solve the privacy-preserving problem using deep neural networks on encrypted data. In this article, we reviewed some of the most relevant and well-known computational and perceptual image encryption methods. These methods as well as their results have been presented, compared, and the conditions of their use, the durability and robustness of some of them against attacks, have been discussed. Some of the mentioned methods have demonstrated an ability to hide information and make it difficult for adversaries to retrieve it while maintaining high classification accuracy. Based on the obtained results, it was suggested to develop and use some of the cited privacy-preserving methods in applications other than classification.


Author(s):  
Yogachandran Rahulamathavan ◽  
Safak Dogan ◽  
Xiyu Shi ◽  
Rongxing Lu ◽  
Muttukrishnan Rajarajan ◽  
...  

2022 ◽  
Vol 2 (14) ◽  
pp. 18-25
Author(s):  
Vu Thi Van ◽  
Luong The Dung ◽  
Hoang Van Quan ◽  
Tran Thi Luong

The secure scalar product protocol is widely applied to solve practical problems such as privacy-preserving data mining, secure auction, secure electronic voting, privacy-preserving recommendation system, privacy-preserving statistical data analysis, etc.. In this paper, we propose an efficient multi-party secure computation protocol using Elliptic curve cryptography, which allows to compute the sum value of multi-scalar products without revealing about the input vectors. Moreover, theoretical and experimental analysis shows that the proposed method is more efficient than others in both computation and communication.


Sign in / Sign up

Export Citation Format

Share Document