IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Homomorphic Encryption and Machine Learning in the Encrypted Domain

Homomorphic Encryption and Machine Learning in the Encrypted Domain
View Sample PDF
Author(s): Neethu Krishna (SCMS School of Engineering and Technology, Karukutty, India), Kommisetti Murthy Raju (Shri Vishnu Engineering College For Women, India), V. Dankan Gowda (BMS Institute of Technology and Management, India), G. Arun (Erode Sengunthar Engineering College, India)and Sampathirao Suneetha (Andhra University College of Engineering, Andhra University, India)
Copyright: 2024
Pages: 18
Source title: Innovative Machine Learning Applications for Cryptography
Source Author(s)/Editor(s): J. Anitha Ruth (SRM Institute of Science and Technology, Vadapalani, India), G.V. Mahesh Vijayalakshmi (BMS Institute of Technology and Management, India), P. Visalakshi (Department of Networking and Communications, College of Engineering and Technology, SRM Institute of Science and Technology, Katankulathur, India), R. Uma (Sri Sairam Engineering College, Chennai, India)and A. Meenakshi (SRM Institute of Science and Technology, Vadapalani, India)
DOI: 10.4018/979-8-3693-1642-9.ch010

Purchase

View Homomorphic Encryption and Machine Learning in the Encrypted Domain on the publisher's website for pricing and purchasing information.

Abstract

In cryptography, performing computations on encrypted material without first decrypting it has long been an aspiration. This is exactly what homomorphic encryption (HE) accomplishes. By allowing computation on encrypted data, the associated privacy and security of sensitive information are beyond imagination to date. This chapter delves into the vast and intricate realm of HE, its fundamental theories, and far-reaching implications for machine learning. As a result of the sensitive nature of the data on which machine learning is based, privacy and security issues often arise. In this vein, homomorphic encryption, which allows algorithms to learn from and predict encrypted data, emerges as a possible panacea. The authors thus set out in this chapter to prepare the ground for a deeper understanding of that synergy, showing how it is there but also what lies ahead.

Related Content

Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda. © 2024. 26 pages.
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha. © 2024. 20 pages.
K. Sriprasadh. © 2024. 24 pages.
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh. © 2024. 20 pages.
R. Jayashree, J. Venkata Subramanian. © 2024. 14 pages.
M. Indira, K. S. Mohanasundaram, M. Saranya. © 2024. 14 pages.
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith. © 2024. 26 pages.
Body Bottom