European University Institute Library

Protecting Privacy through Homomorphic Encryption, edited by Kristin Lauter, Wei Dai, Kim Laine

Label
Protecting Privacy through Homomorphic Encryption, edited by Kristin Lauter, Wei Dai, Kim Laine
Language
eng
resource.imageBitDepth
0
Literary Form
non fiction
Main title
Protecting Privacy through Homomorphic Encryption
Medium
electronic resource
Nature of contents
dictionaries
Oclc number
1290840554
Responsibility statement
edited by Kristin Lauter, Wei Dai, Kim Laine
Series statement
Springer eBooks.
Summary
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.--, Provided by publisher
Table Of Contents
Part 1: Introduction to Homomorphic Encryption (Dai) -- Part 2: Homomorphic Encryption Security Standard: Homomorphic Encryption Security Standard (Laine) -- Part 3: Applications of Homomorphic Encryption: Privacy-preserving Data Sharing and Computation Across Multiple Data Providers with Homomorphic Encryption (Troncoso-Pastoriza) -- Secure and Confidential Rule Matching for Network Traffic Analysis (Jetchev) -- Trusted Monitoring Service (TMS) (Scott) -- Private Set Intersection and Compute (Kannepalli) -- Part IV Applications of Homomorphic Encryption (at the Private AI Bootcamp): Private Outsourced Translation for Medical Data (Viand) -- HappyKidz: Privacy Preserving Phone Usage Tracking (Hastings) -- i-SEAL2: Identifying Spam EmAiL with SEAL (Froelicher) -- PRIORIS: Enabling Secure Suicidal Ideation Detection from Speech using Homomorphic Machine Learning (Natarajan) -- Gimme That Model!: A Trusted ML Model Trading Protocol (Lee) -- HEalth: Privately Computing on Shared Healthcare Data (Hales) -- Private Movie Recommendations for Children (Wagh S) -- Privacy-Preserving Prescription Drug Management Using Homomorphic Encryption (Youmans)
Content
Mapped to