Protecting Privacy through Homomorphic Encryption

This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a glob...

Full description

Bibliographic Details
Other Authors: Lauter, Kristin (Editor), Dai, Wei (Editor), Laine, Kim (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2021, 2021
Edition:1st ed. 2021
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 04130nmm a2200421 u 4500
001 EB002010095
003 EBX01000000000000001172994
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220201 ||| eng
020 |a 9783030772871 
100 1 |a Lauter, Kristin  |e [editor] 
245 0 0 |a Protecting Privacy through Homomorphic Encryption  |h Elektronische Ressource  |c edited by Kristin Lauter, Wei Dai, Kim Laine 
250 |a 1st ed. 2021 
260 |a Cham  |b Springer International Publishing  |c 2021, 2021 
300 |a XVI, 176 p. 35 illus., 28 illus. in color  |b online resource 
505 0 |a Part 1: Introduction to Homomorphic Encryption (Dai) -- Part 2: Homomorphic Encryption Security Standard: Homomorphic Encryption Security Standard (Laine) -- Part 3: Applications of Homomorphic Encryption: Privacy-preserving Data Sharing and Computation Across Multiple Data Providers with Homomorphic Encryption (Troncoso-Pastoriza) -- Secure and Confidential Rule Matching for Network Traffic Analysis (Jetchev) -- Trusted Monitoring Service (TMS) (Scott) -- Private Set Intersection and Compute (Kannepalli) -- Part IV Applications of Homomorphic Encryption (at the Private AI Bootcamp): Private Outsourced Translation for Medical Data (Viand) -- HappyKidz: Privacy Preserving Phone Usage Tracking (Hastings) -- i-SEAL2: Identifying Spam EmAiL with SEAL (Froelicher) -- PRIORIS: Enabling Secure Suicidal Ideation Detection from Speech using Homomorphic Machine Learning (Natarajan) -- Gimme That Model!: A Trusted ML Model Trading Protocol (Lee) -- HEalth: Privately Computing on Shared Healthcare Data (Hales) -- Private Movie Recommendations for Children (Wagh S) -- Privacy-Preserving Prescription Drug Management Using Homomorphic Encryption (Youmans) 
653 |a Number theory 
653 |a Security Science and Technology 
653 |a Algebraic Geometry 
653 |a Computer science / Mathematics 
653 |a Number Theory 
653 |a Cryptography 
653 |a Privacy 
653 |a Security systems 
653 |a Mathematical Applications in Computer Science 
653 |a Data encryption (Computer science) 
653 |a Data protection / Law and legislation 
653 |a Cryptology 
653 |a Algebraic geometry 
700 1 |a Dai, Wei  |e [editor] 
700 1 |a Laine, Kim  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/978-3-030-77287-1 
856 4 0 |u https://doi.org/10.1007/978-3-030-77287-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.0151 
520 |a This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear