04071nam 22007095 450 991090620070332120241110115722.09783031654947303165494310.1007/978-3-031-65494-7(MiAaPQ)EBC31759760(Au-PeEL)EBL31759760(CKB)36527731600041(DE-He213)978-3-031-65494-7(EXLCZ)993652773160004120241110d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierHomomorphic Encryption for Data Science (HE4DS) /by Allon Adir, Ehud Aharoni, Nir Drucker, Ronen Levy, Hayim Shaul, Omri Soceanu1st ed. 2024.Cham :Springer Nature Switzerland :Imprint: Springer,2024.1 online resource (311 pages)9783031654930 3031654935 Part I Introduction and Basic Homomorphic Encryption (HE) Concepts -- Chapter 1 Introduction to Data Science -- Chapter 2 Modern Homomorphic Encryption - Introduction -- Chapter 3 Modern HE - Security Models -- Chapter 4 Approaches for Writing HE Applications -- Part II Approximations -- Chapter 5 Approximation Methods Part I: A General Overview -- Chapter 6 Approximation Methods Part II: Approximations of Standard Functions -- Part III Packing Methods -- Chapter 7 SIMD Packing Part I: Basic Packing Techniques -- Chapter 8 SIMD Packing Part II – Tile Tensor Basics -- Chapter 9 SIMD Packing Part III: Advanced Tile Tensors -- Part IV Use Cases and Other Approaches -- Chapter 10 Privacy-Preserving Machine Learning with HE -- Chapter 11 Case Study: Neural Network.This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications. The authors present various techniques to leverage the unique features of FHE and to overcome its characteristic limitations. Specifically, this book summarizes polynomial approximation techniques used by FHE applications and various data packing schemes based on a data structure called tile tensors, and demonstrates how to use the studied techniques in several specific privacy preserving applications. Examples and exercises are also included throughout this book. The proliferation of practical FHE technology has triggered a wide interest in the field and a common wish to experience and understand it. This book aims to simplify the FHE world for those who are interested in privacy preserving data science tasks, and for an audience that does not necessarily have a deep cryptographic background, including undergraduate and graduate-level students in computer science, and data scientists who plan to work on private data and models.Data protectionLaw and legislationCryptographyData encryption (Computer science)Machine learningComputer networksSecurity measuresPrivacyCryptologyMachine LearningMobile and Network SecurityData protectionLaw and legislation.Cryptography.Data encryption (Computer science).Machine learning.Computer networksSecurity measures.Privacy.Cryptology.Machine Learning.Mobile and Network Security.005.8323.448Adir Allon1775549Aharoni Ehud1775550Drucker Nir1775551Levy Ronen1775552Shaul Hayim1775553Soceanu Omri1775554MiAaPQMiAaPQMiAaPQBOOK9910906200703321Homomorphic Encryption for Data Science (HE4DS)4290194UNINA