27 research outputs found

    Improved privacy-preserving training using fixed-Hessian minimisation

    Get PDF
    The fixed-Hessian minimisation method can be used to implement privacy-preserving machine learning training from homomorphic encryption. This is a relatively under-explored part of the literature, with the main prior work being that of Bonte and Vercauteren (BMC Medical Genomics, 2018), who proposed a simplified Hessian method for logistic regression training over the BFV homomorphic encryption scheme. Our main contribution is to revisit the fixed- Hessian approach for logistic regression training over the CKKS homomorphic encryption scheme. We improve on the prior work in several aspects, most notably showing how the native encoding in CKKS can be used to take advantage of SIMD operations. We implement our new fixed-Hessian approach in SEAL and compare it to more commonly-used minimisation methods, based on Gradient Descent and Nesterov’s Accelerated Gradient Descent. We find that the fixed-Hessian approach exhibits fast run time and comparable accuracy to these alternative approaches. Moreover, it can be argued to be more practical in the privacy-preserving training context, as no step size parameter needs to be chosen. As an additional contribution, we describe and implement three distinct training algorithms, based on Gradient Descent, Nesterov’s Accelerated Gradient Descent, and a fixed-Hessian method respec- tively, to achieve privacy-preserving ridge regression training from homomorphic encryption. To the best of our knowledge, this is the first time homomorphic encryption has been used to implement ridge regression training on encrypted data

    CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness

    Get PDF
    Σ\Sigma-protocols, a class of interactive two-party protocols, which are used as a framework to instantiate many other authentication schemes, are automatically a proof of knowledge (PoK) given that they satisfy the special-soundness property. This fact provides a convenient method to compose Σ\Sigma-protocols and PoKs for complex relations. However, composing in this manner can be error-prone. While they must satisfy special-soundness, this is unfortunately not the case for many recently proposed composed practical schemes. Here we explore two schemes: ZKAttest from Faz-Hernández et al. and the ones from Agrawal et al., and show that their Σ\Sigma-protocol\u27s suffer from several security misdesigns which invalidate their security proofs, and state a practical cheap attack on ZKAttest\u27s implementation. By exploring and resolving their misdesigns, we propose CDLS, a sound and secure variant of their protocols

    Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance

    Get PDF
    This work provides a systematic investigation of the use of approximate enumeration oracles in BKZ, building on recent technical progress on speeding-up lattice enumeration: relaxing (the search radius of) enumeration and extended preprocessing which preprocesses in a larger rank than the enumeration rank. First, we heuristically justify that relaxing enumeration with certain extreme pruning asymptotically achieves an exponential speed-up for reaching the same root Hermite factor (RHF). Second, we perform simulations/experiments to validate this and the performance for relaxed enumeration with numerically optimised pruning for both regular and extended preprocessing. Upgrading BKZ with such approximate enumeration oracles gives rise to our main result, namely a practical and faster (wrt. previous work) polynomial-space lattice reduction algorithm for reaching the same RHF in practical and cryptographic parameter ranges. We assess its concrete time/quality performance with extensive simulations and experiments

    DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More

    Get PDF
    We design DiStefano: an efficient framework for generating private commitments over TLS-encrypted web traffic for a designated, untrusted third-party. DiStefano provides many improvements over previous TLS commitment systems, including: a modular security model that is applicable to TLS 1.3 traffic, and support for generating verifiable claims using applicable zero-knowledge systems; inherent 1-out-of-n privacy for the TLS server that the client communicates with; and various cryptographic optimisations to ensure fast online performance of the TLS session. We build an open-source implementation of DiStefano integrated into the BoringSSL cryptographic library, that is used within Chromium-based Internet browsers. We show that DiStefano is practical for committing to facts in arbitrary TLS traffic, with online times that are comparable with existing TLS 1.2 solutions. We also make improvements to certain cryptographic primitives used inside DiStefano, leading to 3x and 2x improvements in online computation time and bandwidth in specific situations

    Establishing a large prospective clinical cohort in people with head and neck cancer as a biomedical resource: head and neck 5000

    Get PDF
    BACKGROUND: Head and neck cancer is an important cause of ill health. Survival appears to be improving but the reasons for this are unclear. They could include evolving aetiology, modifications in care, improvements in treatment or changes in lifestyle behaviour. Observational studies are required to explore survival trends and identify outcome predictors. METHODS: We are identifying people with a new diagnosis of head and neck cancer. We obtain consent that includes agreement to collect longitudinal data, store samples and record linkage. Prior to treatment we give participants three questionnaires on health and lifestyle, quality of life and sexual history. We collect blood and saliva samples, complete a clinical data capture form and request a formalin fixed tissue sample. At four and twelve months we complete further data capture forms and send participants further quality of life questionnaires. DISCUSSION: This large clinical cohort of people with head and neck cancer brings together clinical data, patient-reported outcomes and biological samples in a single co-ordinated resource for translational and prognostic research

    Multi-messenger observations of a binary neutron star merger

    Get PDF
    On 2017 August 17 a binary neutron star coalescence candidate (later designated GW170817) with merger time 12:41:04 UTC was observed through gravitational waves by the Advanced LIGO and Advanced Virgo detectors. The Fermi Gamma-ray Burst Monitor independently detected a gamma-ray burst (GRB 170817A) with a time delay of ~1.7 s with respect to the merger time. From the gravitational-wave signal, the source was initially localized to a sky region of 31 deg2 at a luminosity distance of 40+8-8 Mpc and with component masses consistent with neutron stars. The component masses were later measured to be in the range 0.86 to 2.26 Mo. An extensive observing campaign was launched across the electromagnetic spectrum leading to the discovery of a bright optical transient (SSS17a, now with the IAU identification of AT 2017gfo) in NGC 4993 (at ~40 Mpc) less than 11 hours after the merger by the One- Meter, Two Hemisphere (1M2H) team using the 1 m Swope Telescope. The optical transient was independently detected by multiple teams within an hour. Subsequent observations targeted the object and its environment. Early ultraviolet observations revealed a blue transient that faded within 48 hours. Optical and infrared observations showed a redward evolution over ~10 days. Following early non-detections, X-ray and radio emission were discovered at the transient’s position ~9 and ~16 days, respectively, after the merger. Both the X-ray and radio emission likely arise from a physical process that is distinct from the one that generates the UV/optical/near-infrared emission. No ultra-high-energy gamma-rays and no neutrino candidates consistent with the source were found in follow-up searches. These observations support the hypothesis that GW170817 was produced by the merger of two neutron stars in NGC4993 followed by a short gamma-ray burst (GRB 170817A) and a kilonova/macronova powered by the radioactive decay of r-process nuclei synthesized in the ejecta

    Principles Of Heliophysics: a textbook on the universal processes behind planetary habitability

    Full text link
    This textbook gives a perspective of heliophysics in a way that emphasizes universal processes from a perspective that draws attention to what provides Earth (and similar (exo-)planets) with a relatively stable setting in which life as we know it can thrive. The book is intended for students in physical sciences in later years of their university training and for beginning graduate students in fields of solar, stellar, (exo-)planetary, and planetary-system sciences.Comment: 419 pages, 119 figures, and 200 "activities" in the form of problems, exercises, explorations, literature readings, and "what if" challenge
    corecore