SlideShare uma empresa Scribd logo
1 de 22
Enabling Cross-Boundary Data Science
with Privacy Enhancing Technologies
Ryan Carr, Ph.D.
ryan@enveil.com
Outline
• What is Cross-Boundary Data Science?
• What are Privacy Enhancing Technologies?
• Homomorphic Encryption Primer
• Use Case: Private Information Retrieval
• Use Case: Encrypted Machine Learning
Many data sets have “boundaries” limiting how
others can interact with them:
• Security Classification
• Privacy Regulations
• Competitive Interests
Privacy Enhancing Technologies can allow
searches, analytics, and ML across these
boundaries.
Cross-Boundary Data Science
Privacy Enhancing Technology Overview
Differential Privacy
Secure Multiparty
Compute
Private Set
Intersection
Homomorphic
Encryption
Trusted Execution
Environments
Privacy Enhancing
Technologies
(PETs)
Most
Secure
Least
Secure
Homomorphic Encryption (HE)
3+ Party SMPC Protocols
Trusted Execution Environments (TEE)
By 2025, 50% of large organizations will adopt privacy-enhancing computation for processing data in untrusted
environments and multiparty data analytics use cases.
(Gartner “Top Strategic Technology Trends for 2021,” Oct. 2020)
Properties of modern encryption (AES, RSA, etc.):
• Encodes plaintext messages into ciphertexts
• Encoding algorithm build around a trapdoor function
• Easy to decode a ciphertext, if you have the secret key
• Provides computational security:
o Without secret key, need to try > 280 possibilities
Homomorphic Encryption (HE) does all that, plus:
• Permits operations on ciphertexts without the secret key
• Different HE algorithms for different data types
o BFV / BGV : Integers
o CKKS : Fixed point reals
o TFHE : Boolean logic
Homomorphic Encryption Primer
BFV Basics
• BFV = Brakerski/Fan-Vercauteren
• Security based on hardness of
Ring Learning with Errors
• Homomorphic operations:
( 𝐸 𝑎 is an encryption of 𝑎 )
o 𝐸 𝑎 + 𝐸 𝑏 = 𝐸(𝑎 + 𝑏)
o 𝐸 𝑎 + 𝑏 = 𝐸(𝑎 + 𝑏)
o 𝐸 𝑎 × 𝐸 𝑏 = 𝐸(𝑎𝑏)
o 𝐸 𝑎 × 𝑏 = 𝐸(𝑎𝑏)
Example: Homomorphic Addition
Major Homomorphic Encryption Open Source Libraries
Homomorphic Encryption – Try it out!
SEAL
Supports BFV and CKKS.
Easiest to use, best performance for basic HE
operations.
github.com/microsoft/SEAL
PALISADE
Library for general lattice crypto, implements
its own math library
gitlab.com/palisade
HElib
Supports BGV + improvements, CKKS; Math
based on NTL library.
github.com/homenc/HElib
Homomorphic Encryption Standardization
Open Industry/Government/Academic Consortium
to Advance Secure Computation
http://homomorphicencryption.org
Use Case: Encrypted Search
select
forename,
middle_name,
...
aml_alert_flag,
sar_flag
from bankB.customer_profiles
where
id_doc_number = '9411998148' AND
id_doc_expiry_date = '2019-03-17' AND
nationality = 'British'
OR
soundex(forename) = soundex('Christina') AND
soundex(surname) = soundex('Thompson') AND
date_of_birth = '1963-05-20' AND
phone_number = '7903328915'
OR
soundex(forename) = soundex('Christina') AND
soundex(surname) = soundex('Thompson') AND
address = '49467 Larson Mountain' AND
postcode = 'N12'
select
forename,
middle_name,
...
aml_alert_flag,
sar_flag
from bankB.customer_profiles
where
id_doc_number = '9411998148' AND
id_doc_expiry_date = '2019909910' AND
nationality = 'British’
OR
soundex(forename) = soundex('Christina') AND
soundex(surname) = soundex('Thompson') AND
date_of_birth = ‘19699050200 AND
phone_number = '7903328915’
OR
soundex(forename) = soundex('Christina') AND
soundex(surname) = soundex('Thompson') AND
address = '49467 Larson Mountain' AND
postcode = 'N12'
Encrypted Query App
Client
Encrypted Query App
Server
User
OR
Application
Database
Boundary
Forename Middle Name Surname AML
Alert?
SAR
Alert?
Christina Flores Thompson Yes No
Forename Middle Name Surname AML
Alert?
SAR
Alert?
Christina Flores Thompson Yes No
Encrypted Query App
Client
Encrypted Query App
Server
User
OR
Application
Database
Encrypted Response
(sized to hold biggest possible answer)
Boundary
Use Case: Encrypted Search
Open Source Example:
https://github.com/IBM/fhe-toolkit-macos
Encrypted Search Algorithm
Database: (226 lines total)
Abkhazia, Sukhumi
Afghanistan, Kabul
Albania, Tirana
Algeria, Algiers
American Samoa, Pago Pago
Andorra, Andorra la Vella
… etc.
Query Interface:
Encrypted Query Construction
Encrypted Query Construction
Oblivious Matching
Oblivious Search
Encrypted Search Demo
https://github.com/IBM/fhe-toolkit-macos
HE enables new use cases for ML:
• Encrypted data (using CKKS), plaintext weights
• Use case: Send sensitive data to model owner for
inference. Data owner gets predictions.
Use Case: Encrypted ML Inference
HE enables new use cases for ML:
• Plaintext data, encrypted weights
• Use case: Send sensitive model to data owner for
inference. Model owner gets predictions.
Use Case: Encrypted ML Inference
HE enables new use cases for ML:
• Encrypted data, encrypted weights
• Use case: Outsource model processing to untrusted
(cloud) hardware without revealing model or data
Use Case: Encrypted ML Inference
Encrypted ML Demo
https://github.com/IBM/fhe-toolkit-macos
• Only polynomial functions
• Only practical for low-depth models
• Extra security constraints due to properties of
CKKS
Research field for encrypted ML is very active!
Encrypted ML Limitations
Enveil is hiring!
• Software Engineers, Customer Success, PMs, Sales
• Office in Fulton, MD (hybrid work)
• Tons of interesting engineering problems
• No time tracking!
• Huge impact for U.S. govt and commercial customers
• Generous benefits
• Email ryan@enveil.com or careers@enveil.com
Want to work on this?

Mais conteúdo relacionado

Mais de Data Works MD

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningData Works MD
 
Data in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in BaltimoreData in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in BaltimoreData Works MD
 
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Data Works MD
 
Automated Software Requirements Labeling
Automated Software Requirements LabelingAutomated Software Requirements Labeling
Automated Software Requirements LabelingData Works MD
 
Introduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application InsightsIntroduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application InsightsData Works MD
 
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...Data Works MD
 
RAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data ScienceRAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data ScienceData Works MD
 
Two Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG DataTwo Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG DataData Works MD
 
Detecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph KernelDetecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph KernelData Works MD
 
Predictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood HealthPredictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood HealthData Works MD
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis WorkshopData Works MD
 

Mais de Data Works MD (11)

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Data in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in BaltimoreData in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in Baltimore
 
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
 
Automated Software Requirements Labeling
Automated Software Requirements LabelingAutomated Software Requirements Labeling
Automated Software Requirements Labeling
 
Introduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application InsightsIntroduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application Insights
 
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
 
RAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data ScienceRAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data Science
 
Two Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG DataTwo Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG Data
 
Detecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph KernelDetecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph Kernel
 
Predictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood HealthPredictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood Health
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis Workshop
 

Último

EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Último (20)

EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Enabling Cross-Boundary Data Science with Privacy Enhancing Tech

  • 1. Enabling Cross-Boundary Data Science with Privacy Enhancing Technologies Ryan Carr, Ph.D. ryan@enveil.com
  • 2. Outline • What is Cross-Boundary Data Science? • What are Privacy Enhancing Technologies? • Homomorphic Encryption Primer • Use Case: Private Information Retrieval • Use Case: Encrypted Machine Learning
  • 3. Many data sets have “boundaries” limiting how others can interact with them: • Security Classification • Privacy Regulations • Competitive Interests Privacy Enhancing Technologies can allow searches, analytics, and ML across these boundaries. Cross-Boundary Data Science
  • 4. Privacy Enhancing Technology Overview Differential Privacy Secure Multiparty Compute Private Set Intersection Homomorphic Encryption Trusted Execution Environments Privacy Enhancing Technologies (PETs) Most Secure Least Secure Homomorphic Encryption (HE) 3+ Party SMPC Protocols Trusted Execution Environments (TEE) By 2025, 50% of large organizations will adopt privacy-enhancing computation for processing data in untrusted environments and multiparty data analytics use cases. (Gartner “Top Strategic Technology Trends for 2021,” Oct. 2020)
  • 5. Properties of modern encryption (AES, RSA, etc.): • Encodes plaintext messages into ciphertexts • Encoding algorithm build around a trapdoor function • Easy to decode a ciphertext, if you have the secret key • Provides computational security: o Without secret key, need to try > 280 possibilities Homomorphic Encryption (HE) does all that, plus: • Permits operations on ciphertexts without the secret key • Different HE algorithms for different data types o BFV / BGV : Integers o CKKS : Fixed point reals o TFHE : Boolean logic Homomorphic Encryption Primer
  • 6. BFV Basics • BFV = Brakerski/Fan-Vercauteren • Security based on hardness of Ring Learning with Errors • Homomorphic operations: ( 𝐸 𝑎 is an encryption of 𝑎 ) o 𝐸 𝑎 + 𝐸 𝑏 = 𝐸(𝑎 + 𝑏) o 𝐸 𝑎 + 𝑏 = 𝐸(𝑎 + 𝑏) o 𝐸 𝑎 × 𝐸 𝑏 = 𝐸(𝑎𝑏) o 𝐸 𝑎 × 𝑏 = 𝐸(𝑎𝑏)
  • 8. Major Homomorphic Encryption Open Source Libraries Homomorphic Encryption – Try it out! SEAL Supports BFV and CKKS. Easiest to use, best performance for basic HE operations. github.com/microsoft/SEAL PALISADE Library for general lattice crypto, implements its own math library gitlab.com/palisade HElib Supports BGV + improvements, CKKS; Math based on NTL library. github.com/homenc/HElib Homomorphic Encryption Standardization Open Industry/Government/Academic Consortium to Advance Secure Computation http://homomorphicencryption.org
  • 9. Use Case: Encrypted Search select forename, middle_name, ... aml_alert_flag, sar_flag from bankB.customer_profiles where id_doc_number = '9411998148' AND id_doc_expiry_date = '2019-03-17' AND nationality = 'British' OR soundex(forename) = soundex('Christina') AND soundex(surname) = soundex('Thompson') AND date_of_birth = '1963-05-20' AND phone_number = '7903328915' OR soundex(forename) = soundex('Christina') AND soundex(surname) = soundex('Thompson') AND address = '49467 Larson Mountain' AND postcode = 'N12' select forename, middle_name, ... aml_alert_flag, sar_flag from bankB.customer_profiles where id_doc_number = '9411998148' AND id_doc_expiry_date = '2019909910' AND nationality = 'British’ OR soundex(forename) = soundex('Christina') AND soundex(surname) = soundex('Thompson') AND date_of_birth = ‘19699050200 AND phone_number = '7903328915’ OR soundex(forename) = soundex('Christina') AND soundex(surname) = soundex('Thompson') AND address = '49467 Larson Mountain' AND postcode = 'N12' Encrypted Query App Client Encrypted Query App Server User OR Application Database Boundary
  • 10. Forename Middle Name Surname AML Alert? SAR Alert? Christina Flores Thompson Yes No Forename Middle Name Surname AML Alert? SAR Alert? Christina Flores Thompson Yes No Encrypted Query App Client Encrypted Query App Server User OR Application Database Encrypted Response (sized to hold biggest possible answer) Boundary Use Case: Encrypted Search
  • 11. Open Source Example: https://github.com/IBM/fhe-toolkit-macos Encrypted Search Algorithm Database: (226 lines total) Abkhazia, Sukhumi Afghanistan, Kabul Albania, Tirana Algeria, Algiers American Samoa, Pago Pago Andorra, Andorra la Vella … etc. Query Interface:
  • 17. HE enables new use cases for ML: • Encrypted data (using CKKS), plaintext weights • Use case: Send sensitive data to model owner for inference. Data owner gets predictions. Use Case: Encrypted ML Inference
  • 18. HE enables new use cases for ML: • Plaintext data, encrypted weights • Use case: Send sensitive model to data owner for inference. Model owner gets predictions. Use Case: Encrypted ML Inference
  • 19. HE enables new use cases for ML: • Encrypted data, encrypted weights • Use case: Outsource model processing to untrusted (cloud) hardware without revealing model or data Use Case: Encrypted ML Inference
  • 21. • Only polynomial functions • Only practical for low-depth models • Extra security constraints due to properties of CKKS Research field for encrypted ML is very active! Encrypted ML Limitations
  • 22. Enveil is hiring! • Software Engineers, Customer Success, PMs, Sales • Office in Fulton, MD (hybrid work) • Tons of interesting engineering problems • No time tracking! • Huge impact for U.S. govt and commercial customers • Generous benefits • Email ryan@enveil.com or careers@enveil.com Want to work on this?