News

New accepted paper at Information Security Practice and Experience, 18th International Conference, ISPEC 2023  [16.11.23]

Christian Krupitzer from the Department of Food Informatics is Co-Author of the peer reviewed conference paper "Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example" at Information Security Practice and Experience, 18th International Conference, ISPEC 2023(CORE Rating: C (CORE2023); Peer reviewed).

The publication "Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example" by Thomas Prantl (University of Würzburg, Germany) with the co-authors, Simon Engel (University of Würzburg, Germany), Lukas Horn (University of Würzburg, Germany), Dennis Kaiser (University of Würzburg, Germany), Lukas Iffländer (University of Würzburg, Germany), André Bauer (University of Würzburg, Germany), Christian Krupitzer (Department of Foodinformatics, Institute of Food Science and Biotechnology, and Computational Science Hub, University of Hohenheim), Samuel Kounev (University of Würzburg, Germany) was accepted at Information Security Practice and Experience, 18th International Conference, ISPEC 2023(CORE Rating: C (CORE2023); Peer reviewed).

In recent years, the trend has increasingly been to store and process data in the cloud. However, this is based on the premise that cloud providers treat the data in a trustworthy manner. One way of using the data in the cloud without the provider having access to it is homomorphic encryption. However, since this encryption has only recently become practicable, analysis of its for practical applications is still in its infancy. Therefore, we investigate the performance of homomorphic encryption using a real-world application, namely linear regression. Our main finding is that although the homomorphic computation of linear regression is in the range of minutes and thus slower than in the non-homomorphic case, linear regression can be computed homomorphic and is therefore suitable for use cases where data security is the top priority.

The publication is available at: link.springer.com/10.1007/978-981-99-7032-2_17


Back to Latest News