SlideShare uma empresa Scribd logo
1 de 22
Enabling Cross-Boundary Data Science
with Privacy Enhancing Technologies
Ryan Carr, Ph.D.
ryan@enveil.com
Outline
• What is Cross-Boundary Data Science?
• What are Privacy Enhancing Technologies?
• Homomorphic Encryption Primer
• Use Case: Private Information Retrieval
• Use Case: Encrypted Machine Learning
Many data sets have “boundaries” limiting how
others can interact with them:
• Security Classification
• Privacy Regulations
• Competitive Interests
Privacy Enhancing Technologies can allow
searches, analytics, and ML across these
boundaries.
Cross-Boundary Data Science
Privacy Enhancing Technology Overview
Differential Privacy
Secure Multiparty
Compute
Private Set
Intersection
Homomorphic
Encryption
Trusted Execution
Environments
Privacy Enhancing
Technologies
(PETs)
Most
Secure
Least
Secure
Homomorphic Encryption (HE)
3+ Party SMPC Protocols
Trusted Execution Environments (TEE)
By 2025, 50% of large organizations will adopt privacy-enhancing computation for processing data in untrusted
environments and multiparty data analytics use cases.
(Gartner “Top Strategic Technology Trends for 2021,” Oct. 2020)
Properties of modern encryption (AES, RSA, etc.):
• Encodes plaintext messages into ciphertexts
• Encoding algorithm build around a trapdoor function
• Easy to decode a ciphertext, if you have the secret key
• Provides computational security:
o Without secret key, need to try > 280 possibilities
Homomorphic Encryption (HE) does all that, plus:
• Permits operations on ciphertexts without the secret key
• Different HE algorithms for different data types
o BFV / BGV : Integers
o CKKS : Fixed point reals
o TFHE : Boolean logic
Homomorphic Encryption Primer
BFV Basics
• BFV = Brakerski/Fan-Vercauteren
• Security based on hardness of
Ring Learning with Errors
• Homomorphic operations:
( 𝐸 𝑎 is an encryption of 𝑎 )
o 𝐸 𝑎 + 𝐸 𝑏 = 𝐸(𝑎 + 𝑏)
o 𝐸 𝑎 + 𝑏 = 𝐸(𝑎 + 𝑏)
o 𝐸 𝑎 × 𝐸 𝑏 = 𝐸(𝑎𝑏)
o 𝐸 𝑎 × 𝑏 = 𝐸(𝑎𝑏)
Example: Homomorphic Addition
Major Homomorphic Encryption Open Source Libraries
Homomorphic Encryption – Try it out!
SEAL
Supports BFV and CKKS.
Easiest to use, best performance for basic HE
operations.
github.com/microsoft/SEAL
PALISADE
Library for general lattice crypto, implements
its own math library
gitlab.com/palisade
HElib
Supports BGV + improvements, CKKS; Math
based on NTL library.
github.com/homenc/HElib
Homomorphic Encryption Standardization
Open Industry/Government/Academic Consortium
to Advance Secure Computation
http://homomorphicencryption.org
Use Case: Encrypted Search
select
forename,
middle_name,
...
aml_alert_flag,
sar_flag
from bankB.customer_profiles
where
id_doc_number = '9411998148' AND
id_doc_expiry_date = '2019-03-17' AND
nationality = 'British'
OR
soundex(forename) = soundex('Christina') AND
soundex(surname) = soundex('Thompson') AND
date_of_birth = '1963-05-20' AND
phone_number = '7903328915'
OR
soundex(forename) = soundex('Christina') AND
soundex(surname) = soundex('Thompson') AND
address = '49467 Larson Mountain' AND
postcode = 'N12'
select
forename,
middle_name,
...
aml_alert_flag,
sar_flag
from bankB.customer_profiles
where
id_doc_number = '9411998148' AND
id_doc_expiry_date = '2019909910' AND
nationality = 'British’
OR
soundex(forename) = soundex('Christina') AND
soundex(surname) = soundex('Thompson') AND
date_of_birth = ‘19699050200 AND
phone_number = '7903328915’
OR
soundex(forename) = soundex('Christina') AND
soundex(surname) = soundex('Thompson') AND
address = '49467 Larson Mountain' AND
postcode = 'N12'
Encrypted Query App
Client
Encrypted Query App
Server
User
OR
Application
Database
Boundary
Forename Middle Name Surname AML
Alert?
SAR
Alert?
Christina Flores Thompson Yes No
Forename Middle Name Surname AML
Alert?
SAR
Alert?
Christina Flores Thompson Yes No
Encrypted Query App
Client
Encrypted Query App
Server
User
OR
Application
Database
Encrypted Response
(sized to hold biggest possible answer)
Boundary
Use Case: Encrypted Search
Open Source Example:
https://github.com/IBM/fhe-toolkit-macos
Encrypted Search Algorithm
Database: (226 lines total)
Abkhazia, Sukhumi
Afghanistan, Kabul
Albania, Tirana
Algeria, Algiers
American Samoa, Pago Pago
Andorra, Andorra la Vella
… etc.
Query Interface:
Encrypted Query Construction
Encrypted Query Construction
Oblivious Matching
Oblivious Search
Encrypted Search Demo
https://github.com/IBM/fhe-toolkit-macos
HE enables new use cases for ML:
• Encrypted data (using CKKS), plaintext weights
• Use case: Send sensitive data to model owner for
inference. Data owner gets predictions.
Use Case: Encrypted ML Inference
HE enables new use cases for ML:
• Plaintext data, encrypted weights
• Use case: Send sensitive model to data owner for
inference. Model owner gets predictions.
Use Case: Encrypted ML Inference
HE enables new use cases for ML:
• Encrypted data, encrypted weights
• Use case: Outsource model processing to untrusted
(cloud) hardware without revealing model or data
Use Case: Encrypted ML Inference
Encrypted ML Demo
https://github.com/IBM/fhe-toolkit-macos
• Only polynomial functions
• Only practical for low-depth models
• Extra security constraints due to properties of
CKKS
Research field for encrypted ML is very active!
Encrypted ML Limitations
Enveil is hiring!
• Software Engineers, Customer Success, PMs, Sales
• Office in Fulton, MD (hybrid work)
• Tons of interesting engineering problems
• No time tracking!
• Huge impact for U.S. govt and commercial customers
• Generous benefits
• Email ryan@enveil.com or careers@enveil.com
Want to work on this?

Mais conteúdo relacionado

Mais de Data Works MD

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningData Works MD
 
Data in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in BaltimoreData in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in BaltimoreData Works MD
 
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Data Works MD
 
Automated Software Requirements Labeling
Automated Software Requirements LabelingAutomated Software Requirements Labeling
Automated Software Requirements LabelingData Works MD
 
Introduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application InsightsIntroduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application InsightsData Works MD
 
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...Data Works MD
 
RAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data ScienceRAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data ScienceData Works MD
 
Two Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG DataTwo Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG DataData Works MD
 
Detecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph KernelDetecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph KernelData Works MD
 
Predictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood HealthPredictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood HealthData Works MD
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis WorkshopData Works MD
 

Mais de Data Works MD (11)

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Data in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in BaltimoreData in the City: Analytics and Civic Data in Baltimore
Data in the City: Analytics and Civic Data in Baltimore
 
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
 
Automated Software Requirements Labeling
Automated Software Requirements LabelingAutomated Software Requirements Labeling
Automated Software Requirements Labeling
 
Introduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application InsightsIntroduction to Elasticsearch for Business Intelligence and Application Insights
Introduction to Elasticsearch for Business Intelligence and Application Insights
 
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
 
RAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data ScienceRAPIDS – Open GPU-accelerated Data Science
RAPIDS – Open GPU-accelerated Data Science
 
Two Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG DataTwo Algorithms for Weakly Supervised Denoising of EEG Data
Two Algorithms for Weakly Supervised Denoising of EEG Data
 
Detecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph KernelDetecting Lateral Movement with a Compute-Intense Graph Kernel
Detecting Lateral Movement with a Compute-Intense Graph Kernel
 
Predictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood HealthPredictive Analytics and Neighborhood Health
Predictive Analytics and Neighborhood Health
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis Workshop
 

Último

Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
Vision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptxVision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptxellehsormae
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理e4aez8ss
 
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024Timothy Spann
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
detection and classification of knee osteoarthritis.pptx
detection and classification of knee osteoarthritis.pptxdetection and classification of knee osteoarthritis.pptx
detection and classification of knee osteoarthritis.pptxAleenaJamil4
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...ssuserf63bd7
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhYasamin16
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 

Último (20)

Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
Vision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptxVision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptx
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
 
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
April 2024 - NLIT Cloudera Real-Time LLM Streaming 2024
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
detection and classification of knee osteoarthritis.pptx
detection and classification of knee osteoarthritis.pptxdetection and classification of knee osteoarthritis.pptx
detection and classification of knee osteoarthritis.pptx
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 

Enabling Cross-Boundary Data Science with Privacy Enhancing Tech

  • 1. Enabling Cross-Boundary Data Science with Privacy Enhancing Technologies Ryan Carr, Ph.D. ryan@enveil.com
  • 2. Outline • What is Cross-Boundary Data Science? • What are Privacy Enhancing Technologies? • Homomorphic Encryption Primer • Use Case: Private Information Retrieval • Use Case: Encrypted Machine Learning
  • 3. Many data sets have “boundaries” limiting how others can interact with them: • Security Classification • Privacy Regulations • Competitive Interests Privacy Enhancing Technologies can allow searches, analytics, and ML across these boundaries. Cross-Boundary Data Science
  • 4. Privacy Enhancing Technology Overview Differential Privacy Secure Multiparty Compute Private Set Intersection Homomorphic Encryption Trusted Execution Environments Privacy Enhancing Technologies (PETs) Most Secure Least Secure Homomorphic Encryption (HE) 3+ Party SMPC Protocols Trusted Execution Environments (TEE) By 2025, 50% of large organizations will adopt privacy-enhancing computation for processing data in untrusted environments and multiparty data analytics use cases. (Gartner “Top Strategic Technology Trends for 2021,” Oct. 2020)
  • 5. Properties of modern encryption (AES, RSA, etc.): • Encodes plaintext messages into ciphertexts • Encoding algorithm build around a trapdoor function • Easy to decode a ciphertext, if you have the secret key • Provides computational security: o Without secret key, need to try > 280 possibilities Homomorphic Encryption (HE) does all that, plus: • Permits operations on ciphertexts without the secret key • Different HE algorithms for different data types o BFV / BGV : Integers o CKKS : Fixed point reals o TFHE : Boolean logic Homomorphic Encryption Primer
  • 6. BFV Basics • BFV = Brakerski/Fan-Vercauteren • Security based on hardness of Ring Learning with Errors • Homomorphic operations: ( 𝐸 𝑎 is an encryption of 𝑎 ) o 𝐸 𝑎 + 𝐸 𝑏 = 𝐸(𝑎 + 𝑏) o 𝐸 𝑎 + 𝑏 = 𝐸(𝑎 + 𝑏) o 𝐸 𝑎 × 𝐸 𝑏 = 𝐸(𝑎𝑏) o 𝐸 𝑎 × 𝑏 = 𝐸(𝑎𝑏)
  • 8. Major Homomorphic Encryption Open Source Libraries Homomorphic Encryption – Try it out! SEAL Supports BFV and CKKS. Easiest to use, best performance for basic HE operations. github.com/microsoft/SEAL PALISADE Library for general lattice crypto, implements its own math library gitlab.com/palisade HElib Supports BGV + improvements, CKKS; Math based on NTL library. github.com/homenc/HElib Homomorphic Encryption Standardization Open Industry/Government/Academic Consortium to Advance Secure Computation http://homomorphicencryption.org
  • 9. Use Case: Encrypted Search select forename, middle_name, ... aml_alert_flag, sar_flag from bankB.customer_profiles where id_doc_number = '9411998148' AND id_doc_expiry_date = '2019-03-17' AND nationality = 'British' OR soundex(forename) = soundex('Christina') AND soundex(surname) = soundex('Thompson') AND date_of_birth = '1963-05-20' AND phone_number = '7903328915' OR soundex(forename) = soundex('Christina') AND soundex(surname) = soundex('Thompson') AND address = '49467 Larson Mountain' AND postcode = 'N12' select forename, middle_name, ... aml_alert_flag, sar_flag from bankB.customer_profiles where id_doc_number = '9411998148' AND id_doc_expiry_date = '2019909910' AND nationality = 'British’ OR soundex(forename) = soundex('Christina') AND soundex(surname) = soundex('Thompson') AND date_of_birth = ‘19699050200 AND phone_number = '7903328915’ OR soundex(forename) = soundex('Christina') AND soundex(surname) = soundex('Thompson') AND address = '49467 Larson Mountain' AND postcode = 'N12' Encrypted Query App Client Encrypted Query App Server User OR Application Database Boundary
  • 10. Forename Middle Name Surname AML Alert? SAR Alert? Christina Flores Thompson Yes No Forename Middle Name Surname AML Alert? SAR Alert? Christina Flores Thompson Yes No Encrypted Query App Client Encrypted Query App Server User OR Application Database Encrypted Response (sized to hold biggest possible answer) Boundary Use Case: Encrypted Search
  • 11. Open Source Example: https://github.com/IBM/fhe-toolkit-macos Encrypted Search Algorithm Database: (226 lines total) Abkhazia, Sukhumi Afghanistan, Kabul Albania, Tirana Algeria, Algiers American Samoa, Pago Pago Andorra, Andorra la Vella … etc. Query Interface:
  • 17. HE enables new use cases for ML: • Encrypted data (using CKKS), plaintext weights • Use case: Send sensitive data to model owner for inference. Data owner gets predictions. Use Case: Encrypted ML Inference
  • 18. HE enables new use cases for ML: • Plaintext data, encrypted weights • Use case: Send sensitive model to data owner for inference. Model owner gets predictions. Use Case: Encrypted ML Inference
  • 19. HE enables new use cases for ML: • Encrypted data, encrypted weights • Use case: Outsource model processing to untrusted (cloud) hardware without revealing model or data Use Case: Encrypted ML Inference
  • 21. • Only polynomial functions • Only practical for low-depth models • Extra security constraints due to properties of CKKS Research field for encrypted ML is very active! Encrypted ML Limitations
  • 22. Enveil is hiring! • Software Engineers, Customer Success, PMs, Sales • Office in Fulton, MD (hybrid work) • Tons of interesting engineering problems • No time tracking! • Huge impact for U.S. govt and commercial customers • Generous benefits • Email ryan@enveil.com or careers@enveil.com Want to work on this?