Sitemap

ASecuritySite: When Bob Met Alice

This publication brings together interesting articles related to cyber security.

Press enter or click to view image in full size

Privacy-Aware Machine Learning: Homomorphic Encryption and Federated Learning

10 min readMay 16, 2025

At LastingAsset Limited, we’re working on new models for fraud detection using homomorphic encryption. So let’s have a quick look at some of the current work in the area, especially in how we can integrate with privacy-aware machine learning. Most of the work in this uses the CCKS homomorphic method, and which operates on floating point values. With this, we use a public key to encrypt the data, and where we can then process with this encrypted data in a privacy-preserving way. With the encrypted result, we can then decrypt with the associated private key (Figure 1).

Press enter or click to view image in full size
Figure 1 [here]

We can easily extend this model, so that we can implement machine learning models, and where Bob, Alice and Peggy provide their data in a privacy-aware way, and where the data processor cannot see the contents of their data:

Press enter or click to view image in full size

Homomorphic Encryption and ML

Nugent et al [1] implemented fraud detection with homomorphic encryption using two models…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web
Already have an account? Sign in
ASecuritySite: When Bob Met Alice

Published in ASecuritySite: When Bob Met Alice

This publication brings together interesting articles related to cyber security.

Prof Bill Buchanan OBE FRSE

Written by Prof Bill Buchanan OBE FRSE

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.

Responses (1)

Write a response

Thank you for sharing sir.