[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3576915.3624406acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: Computing the Persistent Homology of Encrypted Data

Published: 21 November 2023 Publication History

Abstract

Topological Data Analysis (TDA) offers a suite of computational tools that provide quantified shape features of high dimensional data that can be used by modern statistical and predictive machine learning (ML) models. Persistent homology (PH) transforms data (e.g., point clouds, images, time series) into persistence diagrams (PDs)--compact representations of its latent topological structures. Because PDs enjoy inherent noise tolerance, are interpretable, provide a solid basis for data analysis, and can be made compatible with the expansive set of well-established ML model architectures, PH has been widely adopted for model development including on sensitive data. Thus, TDA should be incorporated into secure end-to-end data analysis pipelines. This paper introduces a version of the fundamental algorithm to compute PH on encrypted data using homomorphic encryption (HE).

References

[1]
H. Adams, T. Emerson, M. Kirby, R. Neville, C. Peterson, P. Shipman, S. Chepushtanova, E. Hanson, F. Motta, and L. Ziegelmeier. 2017. Persistence Images: A Stable Vector Representation of Persistent Homology. J. Mach. Learn. Res., Vol. 18, 1 (January 2017), 218--252.
[2]
A. Badawi, J. Bates, F. Bergamaschi, D. Cousins, S. Erabelli, N. Genise, S. Halevi, H. Hunt, A. Kim, Y. Lee, Z. Liu, D. Micciancio, I. Quah, Y. Polyakov, R. Saraswathy, K. Rohloff, J. Saylor, D. Suponitsky, M. Triplett, V. Vaikuntanathan, and V. Zucca. 2022. OpenFHE: Open-Source Fully Homomorphic Encryption Library. Cryptology ePrint Archive, Paper 2022/915. https://eprint.iacr.org/2022/915 https://eprint.iacr.org/2022/915.
[3]
F. Chazal and B. Michel. 2021. An Introduction to Topological Data Analysis: Fundamental and Practical Aspects for Data Scientists. Frontiers in Artificial Intelligence, Vol. 4 (2021). https://doi.org/10.3389/frai.2021.667963
[4]
J. H. Cheon, D. Kim, D. Kim, H. H. Lee, and K. Lee. 2019. Numerical Method for Comparison on Homomorphically Encrypted Numbers. Advances in Cryptology - ASIACRYPT 2019, Lecture Notes in Computer Science, Vol. 11922 (2019), 415--445.
[5]
D. Gold, K. Karabina, and F. Motta. 2023. Performance Gains in Secure Machine Learning via TDA-Preprocessing. 32nd USENIX Security Symposium Poster Session. https://www.usenix.org/conference/usenixsecurity23/poster-session
[6]
G. Kaissis, M. R. Makowski, D. Rueckert, and R. Braren. 2020. Secure, privacy-preserving and federated machine learning in medical imaging. Nature Machine Intelligence, Vol. 2, 6 (2020), 305--311.
[7]
Elchanan Solomon, Alexander Wagner, and Paul Bendich. 2022. From Geometry to Topology: Inverse Theorems for Distributed Persistence. In 38th International Symposium on Computational Geometry (SoCG 2022) (Leibniz International Proceedings in Informatics (LIPIcs), Vol. 224), Xavier Goaoc and Michael Kerber (Eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 61:1--61:16. https://doi.org/10.4230/LIPIcs.SoCG.2022.61
[8]
A. Yao. 1986. How to generate and exchange secrets. Proceeedings of the 27th Annual Symposium on Foundations of Computer Science (1986), 162--167.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
November 2023
3722 pages
ISBN:9798400700507
DOI:10.1145/3576915
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 November 2023

Check for updates

Author Tags

  1. homomorphic encryption
  2. persistent homology
  3. secure computing
  4. topological data analysis

Qualifiers

  • Poster

Conference

CCS '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 143
    Total Downloads
  • Downloads (Last 12 months)79
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media