1,306 research outputs found

    ๋™ํ˜•์•”ํ˜ธ ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์— ๊ด€ํ•œ ์—ฐ๊ตฌ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ž์—ฐ๊ณผํ•™๋Œ€ํ•™ ์ˆ˜๋ฆฌ๊ณผํ•™๋ถ€, 2019. 2. ์ฒœ์ •ํฌ.2009๋…„ Gentry์— ์˜ํ•ด์„œ ์™„์ „๋™ํ˜•์•”ํ˜ธ๊ฐ€ ์ฒ˜์Œ ์„ค๊ณ„๋œ ์ดํ›„๋กœ ์ตœ์ ํ™”์™€ ๊ณ ์†ํ™”๋ฅผ ์œ„ํ•ด์„œ ๋‹ค์–‘ํ•œ ๊ธฐ๋ฒ•๋“ค๊ณผ ์Šคํ‚ด๋“ค์ด ์„ค๊ณ„๋˜์–ด ์™”๋‹ค. ํ•˜์ง€๋งŒ ๋™ํ˜•์•”ํ˜ธ์˜ ์—ฐ์‚ฐํšŸ์ˆ˜๋ฅผ ๋ฌด์ œํ•œ์œผ๋กœ ๋Š˜๋ฆฌ๊ธฐ ์œ„ํ•ด์„œ ํ•„์ˆ˜์ ์ธ ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์˜ ํšจ์œจ์„ฑ ๋ฌธ์ œ๋กœ ์‹ค์ œ ์‘์šฉ์— ์ ์šฉํ•˜๊ธฐ์—๋Š” ๋ถ€์ ํ•ฉํ•˜๋‹ค๋Š” ํ‰๊ฐ€๋ฅผ ๋งŽ์ด ๋ฐ›์•„์™”๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์˜ ๊ณ ์†ํ™”๋ฅผ ์œ„ํ•œ ๋‹ค์–‘ํ•œ ๊ธฐ๋ฒ•์„ ์ œ์‹œํ•˜๊ณ  ์ด๋ฅผ ์‹ค์ œ๋กœ ์‘์šฉ๋ถ„์•ผ์— ์ ์šฉํ•˜์˜€๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋Œ€ํ‘œ์ ์ธ ๋™ํ˜•์•”ํ˜ธ ์Šคํ‚ด๋“ค์— ๋Œ€ํ•œ ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•˜์˜€๋Š”๋ฐ, ์ฒซ ๋ฒˆ์งธ๋กœ๋Š” Microsoft Research์™€ IMB์—์„œ ๋งŒ๋“  ๋™ํ˜•์•”ํ˜ธ ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ์ธ SEAL๊ณผ HElib์— ์ ์šฉ๊ฐ€๋Šฅํ•œ ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. ํ•ด๋‹น ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์—์„œ ํ•ต์‹ฌ์ ์ด ๊ณผ์ •์€ ์•”ํ˜ธํ™”๋œ ์ƒํƒœ์—์„œ ๋ณตํ˜ธํ™” ํ•จ์ˆ˜๋ฅผ ๊ณ„์‚ฐํ•˜๋Š” ๋ถ€๋ถ„์ด๋‹ค. ์•”ํ˜ธ๋œ ์ƒํƒœ์—์„œ ์ตœํ•˜์œ„ ๋น„ํŠธ๋ฅผ ์ถ”์ถœํ•˜๋Š” ์ƒˆ๋กœ์šด ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•˜์—ฌ ์žฌ๋ถ€ํŒ… ๊ณผ์ •์—์„œ ์†Œ๋ชจ๋˜๋Š” ๊ณ„์‚ฐ๋Ÿ‰๊ณผ ํ‘œํ˜„๋˜๋Š” ๋‹คํ•ญ์‹์˜ ์ฐจ์ˆ˜๋ฅผ ์ค„์ด๋Š”๋ฐ์— ์„ฑ๊ณตํ•˜์˜€๋‹ค. ๋‘ ๋ฒˆ์งธ๋กœ๋Š”, ๋น„๊ต์  ์ตœ๊ทผ์— ๊ฐœ๋ฐœ๋œ ๊ทผ์‚ฌ๊ณ„์‚ฐ ๋™ํ˜•์•”ํ˜ธ์ธ HEAAN ์Šคํ‚ด์˜ ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์„ ๊ฐœ์„ ํ•˜๋Š” ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. 2018๋…„์— ์‚ผ๊ฐํ•จ์ˆ˜๋ฅผ ์ด์šฉํ•œ ๊ทผ์‚ฌ๋ฒ•์„ ํ†ตํ•ด์„œ ์ฒ˜์Œ ํ•ด๋‹น ์Šคํ‚ด์— ๋Œ€ํ•œ ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์ด ์ œ์‹œ๋˜์—ˆ๋Š”๋ฐ, ๋งŽ์€ ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ด๊ณ ์žˆ๋Š” ์•”ํ˜ธ๋ฌธ์— ๋Œ€ํ•ด์„œ๋Š” ์ „์ฒ˜๋ฆฌ, ํ›„์ฒ˜๋ฆฌ ๊ณผ์ •์ด ๊ณ„์‚ฐ๋Ÿ‰์˜ ๋Œ€๋ถ€๋ถ„์„ ์ฐจ์ง€ํ•˜๋Š” ๋ฌธ์ œ๊ฐ€ ์žˆ์—ˆ๋‹ค. ํ•ด๋‹น ๊ณผ์ •๋“ค์„ ์—ฌ๋Ÿฌ ๋‹จ๊ณ„๋กœ ์žฌ๊ท€์ ์ธ ํ•จ์ˆ˜๋“ค๋กœ ํ‘œํ˜„ํ•˜์—ฌ ๊ณ„์‚ฐ๋Ÿ‰์ด ๋ฐ์ดํ„ฐ ์‚ฌ์ด์ฆˆ์— ๋Œ€ํ•ด์„œ ๋กœ๊ทธ์ ์œผ๋กœ ์ค„์ด๋Š” ๊ฒƒ์— ์„ฑ๊ณตํ•˜์˜€๋‹ค. ์ถ”๊ฐ€๋กœ, ๋‹ค๋ฅธ ์Šคํ‚ด๋“ค์— ๋น„ํ•ด์„œ ๋งŽ์ด ์‚ฌ์šฉ๋˜์ง€๋Š” ์•Š์ง€๋งŒ, ์ •์ˆ˜๊ธฐ๋ฐ˜ ๋™ํ˜•์•”ํ˜ธ๋“ค์— ๋Œ€ํ•ด์„œ๋„ ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์„ ๊ฐœ์„ ํ•˜๋Š” ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•˜์˜€๊ณ  ๊ทธ ๊ฒฐ๊ณผ ๊ณ„์‚ฐ๋Ÿ‰์„ ๋กœ๊ทธ์ ์œผ๋กœ ์ค„์ด๋Š” ๊ฒƒ์— ์„ฑ๊ณตํ•˜์˜€๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ, ์žฌ๋ถ€ํŒ… ๊ธฐ๋ฒ•์˜ ํ™œ์šฉ์„ฑ๊ณผ ์‚ฌ์šฉ ๊ฐ€๋Šฅ์„ฑ์„ ๋ณด์ด๊ธฐ ์œ„ํ•ด ์‹ค์ œ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ์„ ํ•„์š”๋กœ ํ•˜๋Š” ๊ธฐ๊ณ„ํ•™์Šต ๋ถ„์•ผ์— ์ ์šฉํ•ด๋ณด์•˜๋‹ค. ์‹ค์ œ๋กœ 400,000๊ฑด์˜ ๊ธˆ์œต ๋ฐ์ดํ„ฐ๋ฅผ ์ด์šฉํ•œ ํšŒ๊ท€๋ถ„์„์„ ์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ๋ฅผ ์ด์šฉํ•ด์„œ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. ๊ทธ ๊ฒฐ๊ณผ ์•ฝ 16์‹œ๊ฐ„ ์•ˆ์— 80\% ์ด์ƒ์˜ ์ •ํ™•๋„์™€ 0.8 ์ •๋„์˜ AUROC ๊ฐ’์„ ๊ฐ€์ง€๋Š” ์œ ์˜๋ฏธํ•œ ๋ถ„์„ ๋ชจ๋ธ์„ ์–ป์„ ์ˆ˜ ์žˆ์—ˆ๋‹ค.After Gentry's blueprint on homomorphic encryption (HE) scheme, various efficient schemes have been suggested. For unlimited number of operations between encrypted data, the bootstrapping process is necessary. There are only few works on bootstrapping procedure because of the complexity and inefficiency of bootstrapping. In this paper, we propose various method and techniques for improved bootstrapping algorithm, and we apply it to logistic regression on large scale encrypted data. The bootstrapping process depends on based homomorphic encryption scheme. For various schemes such as BGV, BFV, HEAAN, and integer-based scheme, we improve bootstrapping algorithm. First, we improved bootstrapping for BGV (HElib) and FV (SEAL) schemes which is implemented by Microsoft Research and IMB respectively. The key process for bootstrapping in those two scheme is extracting lower digits of plaintext in encrypted state. We suggest new polynomial that removes lowest digit of input, and we apply it to bootstrapping with previous method. As a result, both the complexity and the consumed depth are reduced. Second, bootstrapping for multiple data needs homomorphic linear transformation. The complexity of this part is O(n) for number of slot n, and this part becomes a bottleneck when we use large n. We use the structure of linear transformation which is used in bootstrapping, and we decompose the matrix which is corresponding to the transformation. By applying recursive strategy, we reduce the complexity to O(log n). Furthermore, we suggest new bootstrapping method for integer-based HE schemes which are based on approximate greatest common divisor problem. By using digit extraction instead of previous bit-wise approach, the complexity of bootstrapping algorithm reduced from O(poly(lambda)) to O(log^2(lambda)). Our implementation for this process shows 6 seconds which was about 3 minutes. To show that bootstrapping can be used for practical application, we implement logistic regression on encrypted data with large scale. Our target data has 400,000 samples, and each sample has 200 features. Because of the size of the data, direct application of homomorphic encryption scheme is almost impossible. Therefore, we decide the method for encryption to maximize the effect of multi-threading and SIMD operations in HE scheme. As a result, our homomorphic logistic regression takes about 16 hours for the target data. The output model has 0.8 AUROC with about 80% accuracy. Another experiment on MNIST dataset shows correctness of our implementation and method.Abstract 1 Introduction 1.1 Homomorphic Encryption 1.2 Machine Learning on Encrypted Data 1.3 List of Papers 2 Background 2.1 Notation 2.2 Homomorphic Encryption 2.3 Ring Learning with Errors 2.4 Approximate GCD 3 Lower Digit Removal and Improved Bootstrapping 3.1 Basis of BGV and BFV scheme 3.2 Improved Digit Extraction Algorithm 3.3 Bootstrapping for BGV and BFV Scheme 3.3.1 Our modications 3.4 Slim Bootstrapping Algorithm 3.5 Implementation Result 4 Faster Homomorphic DFT and Improved Bootstrapping 4.1 Basis of HEAAN scheme 4.2 Homomorphic DFT 4.2.1 Previous Approach 4.2.2 Our method 4.2.3 Hybrid method 4.2.4 Implementation Result 4.3 Improved Bootstrapping for HEAAN 4.3.1 Linear Transformation in Bootstrapping 4.3.2 Improved CoeToSlot and SlotToCoe 4.3.3 Implementation Result 5 Faster Bootstrapping for FHE over the integers 5.1 Basis of FHE over the integers 5.2 Decryption Function via Digit Extraction 5.2.1 Squashed Decryption Function 5.2.2 Digit extraction Technique 5.2.3 Homomorphic Digit Extraction in FHE over the integers 5.3 Bootstrapping for FHE over the integers 5.3.1 CLT scheme with M Z_t 5.3.2 Homomorphic Operations with M Z_t^a 5.3.3 Homomorphic Digit Extraction for CLT scheme 5.3.4 Our Method on the CLT scheme 5.3.5 Analysis of Proposed Bootstrapping Method 5.4 Implementation Result 6 Logistic Regression on Large Encrypted Data 6.1 Basis of Logistic Regression 6.2 Logistic Regression on Encrypted Data 6.2.1 HE-friendly Logistic Regression Algorithm 6.2.2 HE-Optimized Logistic Regression Algorithm 6.2.3 Further Optimization 6.3 Evaluation 6.3.1 Logistic Regression on Encrypted Financial Dataset 6.3.2 Logistic Regression on Encrypted MNIST Dataset 6.3.3 Discussion 7 Conclusions Abstract (in Korean)Docto

    A Simple and Robust Gray Image Encryption Scheme Using Chaotic Logistic Map and Artificial Neural Network

    Get PDF
    A robust gray image encryption scheme using chaotic logistic map and artificial neural network (ANN) is introduced. In the proposed method, an external secret key is used to derive the initial conditions for the logistic chaotic maps which are employed to generate weights and biases matrices of the multilayer perceptron (MLP). During the learning process with the backpropagation algorithm, ANN determines the weight matrix of the connections. The plain image is divided into four subimages which are used for the first diffusion stage. The subimages obtained previously are divided into the square subimage blocks. In the next stage, different initial conditions are employed to generate a key stream which will be used for permutation and diffusion of the subimage blocks. Some security analyses such as entropy analysis, statistical analysis, and key sensitivity analysis are given to demonstrate the key space of the proposed algorithm which is large enough to make brute force attacks infeasible. Computing validation using experimental data with several gray images has been carried out with detailed numerical analysis, in order to validate the high security of the proposed encryption scheme

    A new RSA public key encryption scheme with chaotic maps

    Get PDF
    Public key cryptography has received great attention in the field of information exchange through insecure channels. In this paper, we combine the Dependent-RSA (DRSA) and chaotic maps (CM) to get a new secure cryptosystem, which depends on both integer factorization and chaotic maps discrete logarithm (CMDL). Using this new system, the scammer has to go through two levels of reverse engineering, concurrently, so as to perform the recovery of original text from the cipher-text has been received. Thus, this new system is supposed to be more sophisticated and more secure than other systems. We prove that our new cryptosystem does not increase the overhead in performing the encryption process or the decryption process considering that it requires minimum operations in both. We show that this new cryptosystem is more efficient in terms of performance compared with other encryption systems, which makes it more suitable for nodes with limited computational ability

    Research on digital image watermark encryption based on hyperchaos

    Get PDF
    The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value
    • โ€ฆ
    corecore