Fully Homomorphic Encryption: the business applications

Fully Homomorphic Encryption: the business applications

Fully Homomorphic Encryption creates many new ways we can use our encrypted data. What applications are already out there, and what may be possible in the future?

There are not many organizations that already use FHE. Who does (and how), and what is possible?

Estimated reading time: minutes

This post is part 4 of the Fully Homomorphic Encryption series.


Current applications

Because Fully Homomorphic Encryption is still in a fairly experimental phase, few organizations are using the technology yet. The companies that already use FHE are, for example, IBM, Microsoft and Google.

IBM field trials

IBM says it has implemented FHE in two cases. Once in 2019 at the Brazilian bank Banco Bradesco 1 and a second time at a European bank 2 (the research paper of which has not yet been published). At Banco Bradesco, there was a need for a machine learning model that could work securely with financial data from their customers. This data had to be used to predict whether a specific customer would apply for a loan in the next three months. FHE can help with this issue as it allows the bank to safeguard the privacy of their customers while gaining useful insights about the customer’s condition. The customer can then receive a better offer or be helped out in another way.

To achieve this, all financial data and the machine learning model itself are first homomorphically encrypted 3. Subsequently, IBM was able to demonstrate that it was possible to perform predictions with the same accuracy as without encryption. Finally, the model was also trained with encrypted data, which showed that it is possible to use FHE to guarantee privacy in this case. This means that it seems quite possible for banks to really start using this technology. This allows them to safely outsource prediction execution to an untrusted environment.

Password monitoring Edge and Chrome

The most used application of FHE at the moment, is probably the password monitoring function of Microsoft Edge 4 and Google Chrome 5. The web browsers offer the functionality of a password vault, so it is important to properly protect information within this function. To encrypt passwords, while retaining the ability to compare them to a database of leaked passwords, homomorphic encryption is used. Microsoft uses a modified version of their SEAL FHE solution in Edge. All passwords (and usernames) are hashed and made unreadable with a traditional form of encryption (see Figure 1) 4. The information is then homomorphically encrypted. The highly encrypted information is sent to the cloud to be compared against huge password databases. The results of this are processed locally by the user to determine whether the checked username and password combination actually exists in the database. If this is the case, the user will see a warning (see Figure 2) 6. The implementation in Google Chrome works in a similar way.

edgeflow

Figure 1. Edge Password Monitor HE flow diagram.

edgepopup

Figure 2. Edge Password Monitor popup.

Microsoft ElectionGuard

A final example of FHE in practice is Microsoft’s product ElectionGuard 7. It provides a way to verify that election results are correct, and that votes have not been altered, suppressed, or otherwise been tampered with in any way. Individual voters can see that their vote has been registered and that their choice has been correctly added to the final count. Anyone who wants to follow the election can verify that all votes have been tallied correctly to obtain an accurate and fair result. The principle of secret ballots means not only that each person’s vote should be private, but must be private so that votes cannot be bought, sold or coerced.

ElectionGuard uses FHE to ensure this. Each voter receives a tracking code to verify that their vote goes through the system unchanged and ends up in the final count. However, this code cannot be used to prove how a vote was cast, it can only be proven that the vote has not been changed. During the count, all encrypted votes can simply be added together, without anyone ever being able to see the content of the vote.


Possible applications

So FHE is already being applied in a number of ways in practice, but what other applications are possible?

Internet of Things

FHE has the potential to solve the most important problems of IoT: security, storage and computation.
FHE can be applied to ensure confidentiality, privacy and anonymization. The messages sent by sensors to a base station are homomorphically encrypted at the station and then sent to the cloud for processing.
Read more

Genomics

Sharing data while preserving privacy has become a limiting factor of genomics. FHE can be the solution for this.
DNA and RNA sequences are biometric identifiers. They may contain medically significant information such as a disease risk or sensitive characteristics. This information is often stored in a central database where access is restricted. A number of use cases for sharing genomics data use simple computations and are well suited for FHE.

E-health

Healthcare systems operate in an environment where sensitive information must be protected from leaks, yet available for everyday processing.
The chance that evil actors are out to steal your data is higher than ever, so it is important to secure systems properly. FHE can help address the balance between risk and information usefulness. Billing and report generation are two applications that can benefit from this.
Read more

School leavers

Every year, tens of thousands of students drop out of school early. FHE can give schools insight into this problem, while preserving privacy.
To reduce this problem, it would be useful if a drop-out risk could be calculated for all students. However, it is unlikely that schools have enough data points. This would require bringing together information from schools, hospitals, welfare systems, police and more. This is a big challenge in terms of privacy, but FHE can handle it safely.

Ad privacy

While ads are often unwanted, they can be useful when tailored to the needs of the user.
Many users are concerned about the privacy of their data. Jeckmans et al. sketch a scenario in which a user on a social platform wants product recommendations. The proposed system applies FHE so that friend recommendations can be completely anonymous.
Read more

Financial privacy

Imagine a scenario where a company wants to make financial predictions using someone else's data, but no one wants to disclose their data or algorithms.
This is extremely difficult to achieve without FHE. However, by using it, Company A can keep their algorithms to themselves and Company B send their data encrypted to Company A for processing.


Icons made by Good Ware, photo3idea_studio, srip, Freepik, dDara and Eucalyp from www.flaticon.com


This article is based on a research report I wrote for the project “Fully Homomorphic Encryption” commissioned by [SALT Cyber Security]. You can also read this blog post (in Dutch) on their website at https://salt-security.com/nieuws/fully-homomorphic-encryption-de-geschiedenis/.

  1. O. Masters, et al., “Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector”, 2019. [Online]. Available: https://eprint.iacr.org/2019/1113.pdf↩︎

  2. J. Salter, “IBM completes successful field trials on Fully Homomorphic Encryption”, Ars Technica, Jul. 31, 2020. https://arstechnica.com/gadgets/2020/07/ibm-completes-successful-field-trials-on-fully-homomorphic-encryption/↩︎

  3. K. Moskovitch, “Top Brazilian Bank Pilots Privacy Encryption Quantum Computers Can’t Break | by Inside IBM Research | Medium”, Inside IBM Research, Jan. 10, 2020. https://ibm-research.medium.com/top-brazilian-bank-pilots-privacy-encryption-quantum-computers-cant-break-92ed2695bf14↩︎

  4. K. Lauter, S. Kannepali, K. Laine, and R. C. Moreno, “Password Monitor: Safeguarding passwords in Microsoft Edge”, Microsoft Research, Jan. 21, 2021. https://www.microsoft.com/en-us/research/blog/password-monitor-safeguarding-passwords-in-microsoft-edge/↩︎ ↩︎2

  5. J. Pullman, K. Thomas, E. Bursztein, “Google Online Security Blog: Protect your accounts from data breaches with Password Checkup”, Google Security Blog, Feb. 6, 2019. ↩︎

  6. Microsoft, “Protect your online accounts using Password Monitor”, Microsoft Support. https://www.microsoft.com/en-us/research/blog/password-monitor-safeguarding-passwords-in-microsoft-edge/↩︎

  7. A. Thornton, “What is ElectionGuard?”, Microsoft On the Issues, Mar. 27, 2020. https://news.microsoft.com/on-the-issues/2020/03/27/what-is-electionguard/↩︎