Protecting privacy through homomorphic encryption /

Saved in:
Bibliographic Details
Imprint:Cham : Springer, [2021]
©2021
Description:1 online resource : illustrations (chiefly color)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/12942433
Hidden Bibliographic Details
Other authors / contributors:Lauter, Kristin E. (Kristin Estella), 1969- editor.
Dai, Wei (Computer scientist), editor.
Laine, Kim, editor.
ISBN:9783030772871
303077287X
9783030772864
3030772861
Digital file characteristics:text file PDF
Notes:Includes bibliographical references.
Online resource; title from PDF title page (SpringerLink, viewed January 25, 2022).
Summary:This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.
Other form:Original 3030772861 9783030772864
Standard no.:10.1007/978-3-030-77287-1
Table of Contents:
  • Part 1: Introduction to Homomorphic Encryption (Dai)
  • Part 2: Homomorphic Encryption Security Standard: Homomorphic Encryption Security Standard (Laine)
  • Part 3: Applications of Homomorphic Encryption: Privacy-preserving Data Sharing and Computation Across Multiple Data Providers with Homomorphic Encryption (Troncoso-Pastoriza)
  • Secure and Confidential Rule Matching for Network Traffic Analysis (Jetchev)
  • Trusted Monitoring Service (TMS) (Scott)
  • Private Set Intersection and Compute (Kannepalli)
  • Part IV Applications of Homomorphic Encryption (at the Private AI Bootcamp): Private Outsourced Translation for Medical Data (Viand)
  • HappyKidz: Privacy Preserving Phone Usage Tracking (Hastings)
  • i-SEAL2: Identifying Spam EmAiL with SEAL (Froelicher)
  • PRIORIS: Enabling Secure Suicidal Ideation Detection from Speech using Homomorphic Machine Learning (Natarajan)
  • Gimme That Model!: A Trusted ML Model Trading Protocol (Lee)
  • HEalth: Privately Computing on Shared Healthcare Data (Hales)
  • Private Movie Recommendations for Children (Wagh S)
  • Privacy-Preserving Prescription Drug Management Using Homomorphic Encryption (Youmans).