{"id":25743,"date":"2025-03-17T15:11:55","date_gmt":"2025-03-17T09:26:55","guid":{"rendered":"https:\/\/www.revoscience.com\/en\/?p=25743"},"modified":"2025-03-17T15:11:57","modified_gmt":"2025-03-17T09:26:57","slug":"security-scheme-could-protect-sensitive-data-during-cloud-computation","status":"publish","type":"post","link":"https:\/\/www.revoscience.com\/en\/security-scheme-could-protect-sensitive-data-during-cloud-computation\/","title":{"rendered":"Security scheme could protect sensitive data during cloud computation"},"content":{"rendered":"\n<p><strong><em>MIT researchers crafted a new approach that could allow anyone to run operations on encrypted data without decrypting it first.<\/em><\/strong><\/p>\n\n\n<div class=\"wp-block-post-author\"><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">Adam Zewe<\/p><\/div><\/div>\n\n\n<p>CAMBRIDGE, MA \u2013 &nbsp;A hospital that wants to use a cloud computing service to perform artificial intelligence data analysis on sensitive patient records needs a guarantee those data will remain private during computation. Homomorphic encryption is a special type of security scheme that can provide this assurance.<\/p>\n\n\n\n<p>The technique encrypts data in a way that anyone can perform computations without decrypting the data, preventing others from learning anything about underlying patient records. However, there are only a few ways to achieve homomorphic encryption, and they are so computationally intensive that it is often infeasible to deploy them in the real world.<\/p>\n\n\n\n<p>MIT researchers have developed a new theoretical approach to building homomorphic encryption schemes that is simple and relies on computationally lightweight cryptographic tools. Their technique combines two tools so they become more powerful than either would be on its own. The researchers leverage this to construct a \u201csomewhat homomorphic\u201d encryption scheme \u2014&nbsp;that is, it enables users to perform a limited number of operations on encrypted data without decrypting it, as opposed to fully homomorphic encryption that can allow more complex computations.<\/p>\n\n\n\n<p>This somewhat homomorphic technique can capture many applications, such as private database lookups and private statistical analysis.<\/p>\n\n\n\n<p>While this scheme is still theoretical, and much work remains before it could be used in practice, its simpler mathematical structure could make it efficient enough to protect user data in a wider range of real-world scenarios.<\/p>\n\n\n\n<p>\u201cThe dream is that you type your ChatGPT prompt, encrypt it, send the encrypted message to ChatGPT, and then it can produce outputs for you without ever seeing what you are asking it,\u201d says Henry Corrigan-Gibbs, the Douglas Ross Career Development Professor of Software Technology in the MIT Department of Electrical Engineering and Computer Science (EECS) and a co-author of a paper on this security scheme. \u201cWe are a long way from getting there, in part because these schemes are so inefficient. In this work, we wanted to try to build homomorphic encryption schemes that don\u2019t use the standard tools, since different approaches can often lead to more efficient, more practical constructions.\u201d<\/p>\n\n\n\n<p>His co-authors include Alexandra Henzinger, an EECS graduate student; Yael Kalai, an Ellen Swallow Richards (1873) Professor and professor of EECS; and Vinod Vaikuntanathan, the Ford Professor of Engineering and a principal investigator in the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). The research will be presented at the International Conference on the Theory and Applications of Cryptographic Techniques.<\/p>\n\n\n\n<p><strong>Balancing security and flexibility<\/strong><\/p>\n\n\n\n<p>MIT researchers began theorizing about homomorphic encryption in the 1970s. But designing the mathematical structure needed to securely embed a message in a manner flexible enough to enable computation proved to be enormously challenging. The first homomorphic encryption scheme wasn\u2019t designed until 2009.<\/p>\n\n\n\n<p>\u201cThese two requirements are very much in tension. On the one hand, we need security, but on the other hand, we need this flexibility in the homomorphism. We have very few mathematical pathways to get there,\u201d says Henzinger.<\/p>\n\n\n\n<p>Essentially, homomorphic schemes add noise to a message to encrypt it. As algorithms and machine-learning models perform operations on that encrypted message, the noise inevitably grows. If one computes for too long, the noise can eventually overshadow the message.<\/p>\n\n\n\n<p>\u201cIf you run a deep neural network on these encrypted data, for instance, by the time you get to the end of the computation, the noise might be a billion times larger than the message and you can\u2019t actually figure out what the message says,\u201d Corrigan-Gibbs explains.<\/p>\n\n\n\n<p>There are two main ways to get around this problem. A user could keep operations to a minimum, but this restricts how the encrypted data can be used. On the other hand, a user could add extra steps to reduce noise, but these techniques require a massive amount of additional computation.<\/p>\n\n\n\n<p>Somewhat homomorphic encryption seeks to meet users somewhere in the middle. They can use the technique to perform secure operations on encrypted data using a specific class of functions that keep the noise from growing out of hand.<\/p>\n\n\n\n<p>These functions, known as bounded polynomials, are designed to prevent excessively complex operations. For instance, the functions allow many additions, but only a few multiplications on encrypted data to avoid generating too much extra noise.<\/p>\n\n\n\n<p><strong>Greater than the sum of their parts<\/strong><\/p>\n\n\n\n<p>The researchers built their scheme by combining two simple cryptographic tools. They started with a linear homomorphic encryption scheme, which can only perform additions on encrypted data, and added one theoretical assumption to it.<\/p>\n\n\n\n<p>This cryptographic assumption \u201clifts\u201d the linear scheme into a somewhat homomorphic one that can operate with a broader class of more complex functions.<\/p>\n\n\n\n<p>\u201cOn its own, this assumption doesn\u2019t give us much. But when we put them together, we get something much more powerful. Now, we can do additions and some bounded number of multiplications,\u201d Henzinger says.<\/p>\n\n\n\n<p>The process for performing homomorphic encryptions is quite simple. The researchers\u2019 scheme encrypts each piece of data into a matrix in a way that the matrix provably hides the underlying data. Then, to perform additions or multiplications on those encrypted data, one only needs to add or multiply the corresponding matrices.<\/p>\n\n\n\n<p>The researchers used mathematical proofs to show that their theoretical encryption scheme provides guaranteed security when operations are limited to this class of bounded polynomial functions.<\/p>\n\n\n\n<p>Now that they have developed this theoretical approach, one next step will be making it practical for real-world applications. For that, they will need to make the encryption scheme fast enough to run certain types of computations on modern hardware.<\/p>\n\n\n\n<p>\u201cWe haven\u2019t spent 10 years trying to optimize this scheme yet, so we don\u2019t know how efficient it could get,\u201d Henzinger says.<\/p>\n\n\n\n<p>In addition, the researchers hope to expand their technique to allow more complex operations, perhaps moving closer to developing a new approach for fully homomorphic encryption.<\/p>\n\n\n\n<p>\u201cThe exciting thing for us is that, when we put these two simple things together, something different happened that we didn\u2019t expect. It gives us hope. What else can we do now? If we add something else, maybe we can do something even more exciting,\u201d Corrigan-Gibbs says.<\/p>\n\n\n\n<p>This research was funded, in part, by Apple, Capital One, Facebook, Google, Mozilla, NASDAQ, MIT\u2019s FinTech@CSAIL Initiative, the National Science Foundation (NSF), and a Simons Investigator Award.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MIT researchers crafted a new approach that could allow anyone to run operations on encrypted data without decrypting it first.<\/p>\n","protected":false},"author":2,"featured_media":25744,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[163,17],"tags":[],"class_list":["post-25743","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-research"],"featured_image_urls":{"full":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0.jpg",900,600,false],"thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-200x200.jpg",200,200,true],"medium":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-600x400.jpg",600,400,true],"medium_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-768x512.jpg",750,500,true],"large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-675x450.jpg",675,450,true],"1536x1536":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0.jpg",900,600,false],"2048x2048":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0.jpg",900,600,false],"ultp_layout_landscape_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0.jpg",900,600,false],"ultp_layout_landscape":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-870x570.jpg",870,570,true],"ultp_layout_portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-600x600.jpg",600,600,true],"ultp_layout_square":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-600x600.jpg",600,600,true],"newspaper-x-single-post":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-760x490.jpg",760,490,true],"newspaper-x-recent-post-big":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-550x360.jpg",550,360,true],"newspaper-x-recent-post-list-image":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0-95x65.jpg",95,65,true],"web-stories-poster-portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0.jpg",640,427,false],"web-stories-publisher-logo":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0.jpg",96,64,false],"web-stories-thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2025\/03\/MIT_Quantum-Secure-01-PRESS_0.jpg",150,100,false]},"author_info":{"info":["Adam Zewe"]},"category_info":"<a href=\"https:\/\/www.revoscience.com\/en\/category\/techbiz\/ai\/\" rel=\"category tag\">AI<\/a> <a href=\"https:\/\/www.revoscience.com\/en\/category\/news\/research\/\" rel=\"category tag\">Research<\/a>","tag_info":"Research","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/25743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/comments?post=25743"}],"version-history":[{"count":1,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/25743\/revisions"}],"predecessor-version":[{"id":25745,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/25743\/revisions\/25745"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media\/25744"}],"wp:attachment":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media?parent=25743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/categories?post=25743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/tags?post=25743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}