Publication:
Fully Homomorphic Encryption with Applications to Privacy-Preserving Machine Learning

No Thumbnail Available

Date

2023-06-30

Published Version

Published Version

Journal Title

Journal ISSN

Volume Title

Publisher

The Harvard community has made this article openly available. Please share how this access benefits you.

Research Projects

Organizational Units

Journal Issue

Citation

Gul, Michael. 2023. Fully Homomorphic Encryption with Applications to Privacy-Preserving Machine Learning. Bachelor's thesis, Harvard College.

Research Data

Abstract

There are two dominant trends today that appear to be mutually exclusive: on the one hand, machine learning services that provide accurate predictions based on personal data have become widespread, but on the other hand, data privacy has become a paramount concern for many people. Furthermore, the use of machine learning is heavily restricted in situations like healthcare where it would be most impactful due to regulations preventing the sharing of private data. Fully Homomorphic Encryption (FHE) is the magic bullet that lets us “have our cake and eat it too,” allowing users to send their data to a remote machine learning provider and receive accurate predictions while mathematically guaranteeing complete data security. In this thesis, I give an exposition of Fully Homomorphic Encryption from first principles. I present the mathematical foundations of FHE, notably the Learning With Errors problem (and its Ring variant) used to prove FHE schemes secure, and then I describe two popular FHE schemes. Finally, I survey how FHE is currently used for machine learning, with a particular focus on settings where FHE unlocks opportunities that are otherwise infeasible due to privacy concerns. The primary contribution of this work is the completeness of its exposition, which takes a reader with no cryptography background to the forefront of current research in this revolutionary technology.

Description

Other Available Sources

Keywords

Cryptography, Fully Homomorphic Encryption, Machine Learning, Computer science, Mathematics

Terms of Use

This article is made available under the terms and conditions applicable to Other Posted Material (LAA), as set forth at Terms of Service

Endorsement

Review

Supplemented By

Referenced By

Related Stories