Improved Security for a Ring-Based Fully Homomorphic Encryption
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
ARTIFICIAL INTELLIGENCE and ALGORITHMIC LIABILITY a Technology and Risk Engineering Perspective from Zurich Insurance Group and Microsoft Corp
White Paper ARTIFICIAL INTELLIGENCE AND ALGORITHMIC LIABILITY A technology and risk engineering perspective from Zurich Insurance Group and Microsoft Corp. July 2021 TABLE OF CONTENTS 1. Executive summary 03 This paper introduces the growing notion of AI algorithmic 2. Introduction 05 risk, explores the drivers and A. What is algorithmic risk and why is it so complex? ‘Because the computer says so!’ 05 B. Microsoft and Zurich: Market-leading Cyber Security and Risk Expertise 06 implications of algorithmic liability, and provides practical 3. Algorithmic risk : Intended or not, AI can foster discrimination 07 guidance as to the successful A. Creating bias through intended negative externalities 07 B. Bias as a result of unintended negative externalities 07 mitigation of such risk to enable the ethical and responsible use of 4. Data and design flaws as key triggers of algorithmic liability 08 AI. A. Model input phase 08 B. Model design and development phase 09 C. Model operation and output phase 10 Authors: D. Potential complications can cloud liability, make remedies difficult 11 Zurich Insurance Group 5. How to determine algorithmic liability? 13 Elisabeth Bechtold A. General legal approaches: Caution in a fast-changing field 13 Rui Manuel Melo Da Silva Ferreira B. Challenges and limitations of existing legal approaches 14 C. AI-specific best practice standards and emerging regulation 15 D. New approaches to tackle algorithmic liability risk? 17 Microsoft Corp. Rachel Azafrani 6. Principles and tools to manage algorithmic liability risk 18 A. Tools and methodologies for responsible AI and data usage 18 Christian Bucher B. Governance and principles for responsible AI and data usage 20 Franziska-Juliette Klebôn C. -
The Association for Women in Mathematics: How and Why It Was
Mathematical Communities t’s 2011 and the Association for Women in Mathematics The Association (AWM) is celebrating 40 years of supporting and II promoting female students, teachers, and researchers. It’s a joyous occasion filled with good food, warm for Women conversation, and great mathematics—four plenary lectures and eighteen special sessions. There’s even a song for the conference, titled ‘‘((3 + 1) 9 3 + 1) 9 3 + 1 Anniversary in Mathematics: How of the AWM’’ and sung (robustly!) to the tune of ‘‘This Land is Your Land’’ [ICERM 2011]. The spirit of community and and Why It Was the beautiful mathematics on display during ‘‘40 Years and Counting: AWM’s Celebration of Women in Mathematics’’ are truly a triumph for the organization and for women in Founded, and Why mathematics. It’s Still Needed in the 21st Century SARAH J. GREENWALD,ANNE M. LEGGETT, AND JILL E. THOMLEY This column is a forum for discussion of mathematical communities throughout the world, and through all time. Our definition of ‘‘mathematical community’’ is Participants from the Special Session in Number Theory at the broadest: ‘‘schools’’ of mathematics, circles of AWM’s 40th Anniversary Celebration. Back row: Cristina Ballantine, Melanie Matchett Wood, Jackie Anderson, Alina correspondence, mathematical societies, student Bucur, Ekin Ozman, Adriana Salerno, Laura Hall-Seelig, Li-Mei organizations, extra-curricular educational activities Lim, Michelle Manes, Kristin Lauter; Middle row: Brooke Feigon, Jessica Libertini-Mikhaylov, Jen Balakrishnan, Renate (math camps, math museums, math clubs), and more. Scheidler; Front row: Lola Thompson, Hatice Sahinoglu, Bianca Viray, Alice Silverberg, Nadia Heninger. (Photo Cour- What we say about the communities is just as tesy of Kiran Kedlaya.) unrestricted. -
Practical Homomorphic Encryption and Cryptanalysis
Practical Homomorphic Encryption and Cryptanalysis Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften (Dr. rer. nat.) an der Fakult¨atf¨urMathematik der Ruhr-Universit¨atBochum vorgelegt von Dipl. Ing. Matthias Minihold unter der Betreuung von Prof. Dr. Alexander May Bochum April 2019 First reviewer: Prof. Dr. Alexander May Second reviewer: Prof. Dr. Gregor Leander Date of oral examination (Defense): 3rd May 2019 Author's declaration The work presented in this thesis is the result of original research carried out by the candidate, partly in collaboration with others, whilst enrolled in and carried out in accordance with the requirements of the Department of Mathematics at Ruhr-University Bochum as a candidate for the degree of doctor rerum naturalium (Dr. rer. nat.). Except where indicated by reference in the text, the work is the candidates own work and has not been submitted for any other degree or award in any other university or educational establishment. Views expressed in this dissertation are those of the author. Place, Date Signature Chapter 1 Abstract My thesis on Practical Homomorphic Encryption and Cryptanalysis, is dedicated to efficient homomor- phic constructions, underlying primitives, and their practical security vetted by cryptanalytic methods. The wide-spread RSA cryptosystem serves as an early (partially) homomorphic example of a public- key encryption scheme, whose security reduction leads to problems believed to be have lower solution- complexity on average than nowadays fully homomorphic encryption schemes are based on. The reader goes on a journey towards designing a practical fully homomorphic encryption scheme, and one exemplary application of growing importance: privacy-preserving use of machine learning. -
Information Guide
INFORMATION GUIDE 7 ALL-PRO 7 NFL MVP LAMAR JACKSON 2018 - 1ST ROUND (32ND PICK) RONNIE STANLEY 2016 - 1ST ROUND (6TH PICK) 2020 BALTIMORE DRAFT PICKS FIRST 28TH SECOND 55TH (VIA ATL.) SECOND 60TH THIRD 92ND THIRD 106TH (COMP) FOURTH 129TH (VIA NE) FOURTH 143RD (COMP) 7 ALL-PRO MARLON HUMPHREY FIFTH 170TH (VIA MIN.) SEVENTH 225TH (VIA NYJ) 2017 - 1ST ROUND (16TH PICK) 2020 RAVENS DRAFT GUIDE “[The Draft] is the lifeblood of this Ozzie Newsome organization, and we take it very Executive Vice President seriously. We try to make it a science, 25th Season w/ Ravens we really do. But in the end, it’s probably more of an art than a science. There’s a lot of nuance involved. It’s Joe Hortiz a big-picture thing. It’s a lot of bits and Director of Player Personnel pieces of information. It’s gut instinct. 23rd Season w/ Ravens It’s experience, which I think is really, really important.” Eric DeCosta George Kokinis Executive VP & General Manager Director of Player Personnel 25th Season w/ Ravens, 2nd as EVP/GM 24th Season w/ Ravens Pat Moriarty Brandon Berning Bobby Vega “Q” Attenoukon Sarah Mallepalle Sr. VP of Football Operations MW/SW Area Scout East Area Scout Player Personnel Assistant Player Personnel Analyst Vincent Newsome David Blackburn Kevin Weidl Patrick McDonough Derrick Yam Sr. Player Personnel Exec. West Area Scout SE/SW Area Scout Player Personnel Assistant Quantitative Analyst Nick Matteo Joey Cleary Corey Frazier Chas Stallard Director of Football Admin. Northeast Area Scout Pro Scout Player Personnel Assistant David McDonald Dwaune Jones Patrick Williams Jenn Werner Dir. -
Homomorphic Encryption Library
Ludwig-Maximilians-Universit¨at Munchen¨ Prof. Dr. D. Kranzlmuller,¨ Dr. N. gentschen Felde Data Science & Ethics { Microsoft SEAL { Exercise 1: Library for Matrix Operations Microsoft's Simple Encrypted Arithmetic Library (SEAL)1 is a publicly available homomorphic encryption library. It can be found and downloaded at http://sealcrypto.codeplex.com/. Implement a library 13b MS-SEAL.h supporting matrix operations using homomorphic encryption on basis of the MS SEAL. due date: 01.07.2018 (EOB) no. of students: 2 deliverables: 1. Implemenatation (including source code(s)) 2. Documentation (max. 10 pages) 3. Presentation (10 { max. 15 minutes) 13b MS-SEAL.h #i n c l u d e <f l o a t . h> #i n c l u d e <s t d b o o l . h> typedef struct f double ∗ e n t r i e s ; unsigned int width; unsigned int height; g matrix ; /∗ Initialize new matrix: − reserve memory only ∗/ matrix initMatrix(unsigned int width, unsigned int height); /∗ Initialize new matrix: − reserve memory − set any value to 0 ∗/ matrix initMatrixZero(unsigned int width, unsigned int height); /∗ Initialize new matrix: − reserve memory − set any value to random number ∗/ matrix initMatrixRand(unsigned int width, unsigned int height); 1https://www.microsoft.com/en-us/research/publication/simple-encrypted-arithmetic-library-seal-v2-0/# 1 /∗ copy a matrix and return its copy ∗/ matrix copyMatrix(matrix toCopy); /∗ destroy matrix − f r e e memory − set any remaining value to NULL ∗/ void freeMatrix(matrix toDestroy); /∗ return entry at position (xPos, yPos), DBL MAX in case of error -
Arxiv:2102.00319V1 [Cs.CR] 30 Jan 2021
Efficient CNN Building Blocks for Encrypted Data Nayna Jain1,4, Karthik Nandakumar2, Nalini Ratha3, Sharath Pankanti5, Uttam Kumar 1 1 Center for Data Sciences, International Institute of Information Technology, Bangalore 2 Mohamed Bin Zayed University of Artificial Intelligence 3 University at Buffalo, SUNY 4 IBM Systems 5 Microsoft [email protected], [email protected], [email protected]/[email protected], [email protected], [email protected] Abstract Model Owner Model Architecture 푴 Machine learning on encrypted data can address the concerns Homomorphically Encrypted Model Model Parameters 퐸(휽) related to privacy and legality of sharing sensitive data with Encryption untrustworthy service providers, while leveraging their re- Parameters 휽 sources to facilitate extraction of valuable insights from oth- End-User Public Key Homomorphically Encrypted Cloud erwise non-shareable data. Fully Homomorphic Encryption Test Data {퐸(퐱 )}푇 Test Data 푖 푖=1 FHE Computations Service 푇 Encryption (FHE) is a promising technique to enable machine learning {퐱푖}푖=1 퐸 y푖 = 푴(퐸 x푖 , 퐸(휽)) Provider and inferencing while providing strict guarantees against in- Inference 푇 Decryption formation leakage. Since deep convolutional neural networks {푦푖}푖=1 Homomorphically Encrypted Inference Results {퐸(y )}푇 (CNNs) have become the machine learning tool of choice Private Key 푖 푖=1 in several applications, several attempts have been made to harness CNNs to extract insights from encrypted data. How- ever, existing works focus only on ensuring data security Figure 1: In a conventional Machine Learning as a Ser- and ignore security of model parameters. They also report vice (MLaaS) scenario, both the data and model parameters high level implementations without providing rigorous anal- are unencrypted. -
Program of the Sessions San Diego, California, January 9–12, 2013
Program of the Sessions San Diego, California, January 9–12, 2013 AMS Short Course on Random Matrices, Part Monday, January 7 I MAA Short Course on Conceptual Climate Models, Part I 9:00 AM –3:45PM Room 4, Upper Level, San Diego Convention Center 8:30 AM –5:30PM Room 5B, Upper Level, San Diego Convention Center Organizer: Van Vu,YaleUniversity Organizers: Esther Widiasih,University of Arizona 8:00AM Registration outside Room 5A, SDCC Mary Lou Zeeman,Bowdoin upper level. College 9:00AM Random Matrices: The Universality James Walsh, Oberlin (5) phenomenon for Wigner ensemble. College Preliminary report. 7:30AM Registration outside Room 5A, SDCC Terence Tao, University of California Los upper level. Angles 8:30AM Zero-dimensional energy balance models. 10:45AM Universality of random matrices and (1) Hans Kaper, Georgetown University (6) Dyson Brownian Motion. Preliminary 10:30AM Hands-on Session: Dynamics of energy report. (2) balance models, I. Laszlo Erdos, LMU, Munich Anna Barry*, Institute for Math and Its Applications, and Samantha 2:30PM Free probability and Random matrices. Oestreicher*, University of Minnesota (7) Preliminary report. Alice Guionnet, Massachusetts Institute 2:00PM One-dimensional energy balance models. of Technology (3) Hans Kaper, Georgetown University 4:00PM Hands-on Session: Dynamics of energy NSF-EHR Grant Proposal Writing Workshop (4) balance models, II. Anna Barry*, Institute for Math and Its Applications, and Samantha 3:00 PM –6:00PM Marina Ballroom Oestreicher*, University of Minnesota F, 3rd Floor, Marriott The time limit for each AMS contributed paper in the sessions meeting will be found in Volume 34, Issue 1 of Abstracts is ten minutes. -
Seattle, Washington Washington State Convention Center and Sheraton Seattle January 6–9, 2016 Wednesday–Saturday
Meetings & Conferences Seattle, Washington Washington State Convention Center and Sheraton Seattle January 6–9, 2016 Wednesday–Saturday Meeting #1116 Joint Mathematics Meetings, including the 122nd Annual Meeting of the AMS, 99th Annual Meeting of the Math- ematical Association of America (MAA), annual meetings of the Association for Women in Mathematics (AWM) and the National Association of Mathematicians (NAM), and the winter meeting of the Association of Symbolic Logic (ASL), with sessions contributed by the Society for Industrial and Applied Mathematics (SIAM). AMS Associate Secretary: Michel Lapidus Announcement issue of Notices: October 2015 Program first available on AMS website: To be announced Deadlines For organizers: Expired For abstracts: September 22, 2015 The scientific information listed below may be dated. For the latest information, see www.ams.org/meetings/ national.html. Joint Invited Addresses Jennifer Chayes, Microsoft Research, Network Sci- ence: From the online world to cancer genomics; Saturday, 3:00 pm (MAA-AMS-SIAM Gerald and Judith Porter Public Lecture) 1116 NOTICES OF THE AMS VOLUME 62, NUMBER 9 Meetings & Conferences Kristin Lauter, Microsoft Research, Title to be an- sible via the abstract submission form found at nounced ; Friday, 11:10 am (AMS-MAA). jointmathematicsmeetings.org/meetings/ Xiao-Li Meng, Harvard University, Statistical paradises abstracts/abstract.pl?type=jmm. and paradoxes in big data; Friday, 11:10 am (AMS-MAA). Karen E Smith, University of Michigan, Title to be an- Some sessions are co-sponsored with other organiza- nounced. Thursday, 10:05 am (AWM-AMS Noether Lecture). tions. These are noted within the parentheses at the end of each listing, where applicable. -
MP2ML: a Mixed-Protocol Machine Learning Framework for Private Inference∗ (Full Version)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference∗ (Full Version) Fabian Boemer Rosario Cammarota Daniel Demmler [email protected] [email protected] [email protected] Intel AI Intel Labs hamburg.de San Diego, California, USA San Diego, California, USA University of Hamburg Hamburg, Germany Thomas Schneider Hossein Yalame [email protected] [email protected] darmstadt.de TU Darmstadt TU Darmstadt Darmstadt, Germany Darmstadt, Germany ABSTRACT 1 INTRODUCTION Privacy-preserving machine learning (PPML) has many applica- Several practical services have emerged that use machine learn- tions, from medical image evaluation and anomaly detection to ing (ML) algorithms to categorize and classify large amounts of financial analysis. nGraph-HE (Boemer et al., Computing Fron- sensitive data ranging from medical diagnosis to financial eval- tiers’19) enables data scientists to perform private inference of deep uation [14, 66]. However, to benefit from these services, current learning (DL) models trained using popular frameworks such as solutions require disclosing private data, such as biometric, financial TensorFlow. nGraph-HE computes linear layers using the CKKS ho- or location information. momorphic encryption (HE) scheme (Cheon et al., ASIACRYPT’17), As a result, there is an inherent contradiction between utility and relies on a client-aided model to compute non-polynomial acti- and privacy: ML requires data to operate, while privacy necessitates vation functions, such as MaxPool and ReLU, where intermediate keeping sensitive information private [70]. Therefore, one of the feature maps are sent to the data owner to compute activation func- most important challenges in using ML services is helping data tions in the clear. -
Mathematics People
NEWS Mathematics People “In 1972, Rainer Weiss wrote down in an MIT report his Weiss, Barish, and ideas for building a laser interferometer that could detect Thorne Awarded gravitational waves. He had thought this through carefully and described in detail the physics and design of such an Nobel Prize in Physics instrument. This is typically called the ‘birth of LIGO.’ Rai Weiss’s vision, his incredible insights into the science and The Royal Swedish Academy of Sci- challenges of building such an instrument were absolutely ences has awarded the 2017 Nobel crucial to make out of his original idea the successful Prize in Physics to Rainer Weiss, experiment that LIGO has become. Barry C. Barish, and Kip S. Thorne, “Kip Thorne has done a wealth of theoretical work in all of the LIGO/Virgo Collaboration, general relativity and astrophysics, in particular connected for their “decisive contributions to with gravitational waves. In 1975, a meeting between the LIGO detector and the observa- Rainer Weiss and Kip Thorne from Caltech marked the tion of gravitational waves.” Weiss beginning of the complicated endeavors to build a gravi- receives one-half of the prize; Barish tational wave detector. Rai Weiss’s incredible insights into and Thorne share one-half. the science and challenges of building such an instrument Rainer Weiss combined with Kip Thorne’s theoretical expertise with According to the prize citation, gravitational waves, as well as his broad connectedness “LIGO, the Laser Interferometer with several areas of physics and funding agencies, set Gravitational-Wave Observatory, is the path toward a larger collaboration. -
Association for Women in Mathematics
Association for Women in Mathematics AWM Research Symposium 2015 April 11-12, 2015 at University of Maryland, College Park College Park, MD Organizers Ruth Charney (Brandeis University) Shelly Harvey (Rice University) Kristin Lauter (Microsoft Research) Gail Letzter (National Security Agency) Magnhild Lien (California State University, Northridge) Konstantina Trivisa (University of Maryland) Talitha Washington (Howard University) 2015 AWM Research Symposium Sponsors 2015 AWM Research Symposium Exhibitors April 11, 2015 Dear Colleagues, It is our great pleasure to welcome you to AWM Research Symposium 2015 on the campus of the University of Maryland, College Park. This research conference highlights the accomplishments of women in mathematics and showcases the research of female mathematicians at all stages of their careers. We are grateful to the University of Maryland for hosting this symposium and to our sponsors and exhibitors Microsoft Research, NSF, NSA, NIST, Springer, Elsevier, Google, Wolfram and INTECH for their generous support. In 2011, the Association for Women in Mathematics celebrated its fortieth anniversary with a research conference, “40 Years and Counting, AWM’s Celebration of Women in Mathematics.” Participation at the anniversary conference greatly exceeded all expectations and motivated AWM to launch a series of biennial research symposia. The second AWM Symposium was held at Santa Clara University in 2013, and this symposium is the third event in the series. These symposia are designed to help support and nurture networks of female researchers in many areas of mathematics, to provide networking opportunities for junior and senior women to enhance career prospects and recognition. AWM was founded in 1971 during a period when relatively few women in the U.S. -
Explorations in Complex and Riemannian Geometry a Volume Dedicated to Robert E
CONTEMPORARY MATHEMATICS 332 Explorations in Complex and Riemannian Geometry A Volume Dedicated to Robert E. Greene John Bland Kong-Toe Kim Steven G. Krantz Editors http://dx.doi.org/10.1090/conm/332 Explorations in Complex and Riemannian Geometry A Volume Dedicated to Robert E. Greene Professor Robert E. Greene CoNTEMPORARY MATHEMATICS 332 Explorations in Complex and Riemannian Geometry A Volume Dedicated to Robert E. Greene John Bland Kong-Toe Kim Steven G. Krantz Editors American Mathematical Society Providence. Rhode Island Editorial Board Dennis DeTurck, managing editor Andreas Blass Andy R. Magid Michael Vogelius 2000 Mathematics Subject Classification. Primary 32H02, 32M05, 32H40, 32M10, 53C20, 53C24, 53C22, 53C55, 53C56, 53C60. Library of Congress Cataloging-in-Publication Data Explorations in complex and Riemannian geometry : a volume dedicated to Robert E. Greene / John Bland, Kang-Tae Kim, Steven G. Krantz. p. em. -(Contemporary mathematics, ISSN 0271-4132 ; 332) Includes bibliographical references. ISBN 0-8218-3273-5 (alk. paper) 1. Differential geometry. 2. Functions of several complex variables. 3. Geometry, Riemann- ian. I. Greene, Robert Everist, 1943- II. Bland, John, 1952- III. Kim, Kang-Tae, 1957- IV. Krantz, Steven G. (Steven George), 1951- V. Contemporary mathematics (American Math- ematical Society) ; v. 332. QA64l.E97 2003 516.3'6-dc21 2003052196 Copying and reprinting. Material in this book may be reproduced by any means for edu- cational and scientific purposes without fee or permission with the exception of reproduction by services that collect fees for delivery of documents and provided that the customary acknowledg- ment of the source is given. This consent does not extend to other kinds of copying for general distribution, for advertising or promotional purposes, or for resale.