7  FUTURE WORK 
A preliminary step towards future work will be further 
optimisation of the HE crypto-context parameters that 
would reduce the analysis time overhead. Afterwards, 
alternatives to distributed decryption will be explored, 
such as key switching, where the result ciphertext gets 
re-encrypted  so  that  it  only  can  be  decrypted  with  a 
secret key owned by the researcher. The final objective 
in the presented future work plan is the implementation 
of  regression  analysis  workflow  to  support  machine 
learning algorithms that are running in multiple epochs 
and  iterations.  This  increases  noise  in  the  ciphertext 
due  to  HE  multiplication,  requiring  ciphertext 
refreshing or bootstrapping (Micciancio &  Polyakov, 
2021) to reduce the amount of noise in the ciphertext 
and allow subsequent operations and decryption. In a 
multi-party  setting,  this  activity  has  to  be  done 
collaboratively by all central nodes, which presents an 
additional step in the analysis workflow. 
ACKNOWLEDGEMENTS 
This  work  was  supported  by  the  ORCHESTRA 
project,  which  has  received  funding  from  the 
European  Union’s  Horizon  2020  research  and 
innovation  programme  under  grant  agreement  No 
101016167. 
REFERENCES 
Hansen,  J.,  Wilson,  P.,  Verhoeven,  E.,  Kroneman,  M., 
Kirwan,  M.,  Verheij,  R.,  &  van  Veen,  E.  B.  (2021). 
Assessment of the EU Member States' rules on health 
data in the light of GDPR. 
Zhu,  L.,  Liu,  Z.,  &  Han,  S.  (2019).  Deep  leakage  from 
gradients.  Advances in neural information processing 
systems, 32. 
Yang, H., Ge, M., Xue, D., Xiang, K., Li, H., & Lu, R. 
(2023).  Gradient  Leakage  Attacks  in  Federated 
Learning:  Research  Frontiers,  Taxonomy  and  Future 
Directions. IEEE Network. 
Naehrig, M., Lauter, K., & Vaikuntanathan, V. (2011). Can 
homomorphic encryption be practical? Proceedings of 
the 3rd ACM Workshop on Cloud Computing Security 
Workshop. 
Wainakh, A., Guinea, A. S., Grube, T., & Mühlhäuser, M. 
(2020, September). Enhancing privacy via hierarchical 
federated learning. In 2020 IEEE European Symposium 
on Security and Privacy Workshops (EuroS&PW) (pp. 
344-347). IEEE. 
Hosseinalipour, S., Brinton, C. G., Aggarwal, V., Dai, H., 
& Chiang, M. (2020). From federated to fog learning: 
Distributed  machine  learning  over  heterogeneous 
wireless  networks.  IEEE Communications Magazine, 
58(12), 41-47. 
Orchestra  Cohort.  (n.d.).  Project.  Retrieved  January  10, 
2024, from https://orchestra-cohort.eu/work-packages/ 
Hosseinalipour, S., Azam, S. S., Brinton, C. G., Michelusi, 
N., Aggarwal, V., Love, D. J., & Dai, H. (2022). Multi-
stage hybrid federated learning over large-scale D2D-
enabled  fog  networks.  IEEE/ACM transactions on 
networking, 30(4), 1569-1584. 
Froelicher,  D.,  Troncoso-Pastoriza,  J.  R.,  Raisaro,  J.  L., 
Cuendet, M. A., Sousa, J. S., Cho, H., ... & Hubaux, J. 
P. (2021). Truly privacy-preserving federated analytics 
for  precision  medicine  with  multiparty  homomorphic 
encryption. Nature communications, 12(1), 5910. 
Sav, S., Pyrgelis, A., Troncoso-Pastoriza, J. R., Froelicher, 
D., Bossuat, J. P., Sousa, J. S., & Hubaux, J. P. (2021, 
January).  POSEIDON:  Privacy-Preserving  Federated 
Neural  Network  Learning.  In  28Th Annual Network 
And Distributed System Security Symposium (Ndss 
2021) (No. CONF). INTERNET SOC. 
Blatt, M., Gusev, A., Polyakov, Y., & Goldwasser, S. (2020). 
Secure  large-scale  genome-wide  association  studies 
using  homomorphic  encryption.  Proceedings of the 
National Academy of Sciences, 117(21), 11608-11613. 
Marcon, Y., Bishop, T., Avraam, D., Escriba-Montagut, X., 
Ryser-Welch,  P.,  Wheater,  S.,  ...  &  González,  J.  R. 
(2021).  Orchestrating  privacy-protected  big  data 
analyses  of  data  from  different  resources  with  R  and 
DataSHIELD.  PLoS computational biology,  17(3), 
e1008880. 
Goldschmidt,  R.  E.  (1964).  Applications of division by 
convergence  (Doctoral  dissertation,  Massachusetts 
Institute of Technology). 
Cheon,  J.  H.,  Kim,  A.,  Kim,  M.,  &  Song,  Y.  (2017). 
Homomorphic encryption for arithmetic of approximate 
numbers. In Advances in Cryptology–ASIACRYPT 2017: 
23rd International Conference on the Theory and 
Applications of Cryptology and Information Security, 
Hong Kong, China, December 3-7, 2017, Proceedings, 
Part I 23  (pp.  409-437).  Springer  International 
Publishing. 
Al Badawi, A., Bates, J., Bergamaschi, F., Cousins, D. B., 
Erabelli,  S.,  Genise,  N.,  ...  &  Zucca,  V.  (2022, 
November). Openfhe: Open-source fully homomorphic 
encryption  library.  In  Proceedings of the 10th 
Workshop on Encrypted Computing & Applied 
Homomorphic Cryptography (pp. 53-63). 
Hintjens,  P.  (2013).  ZeroMQ: messaging for many 
applications. " O'Reilly Media, Inc.". 
Samstein, R. M., Lee, C. H., Shoushtari, A. N., Hellmann, 
M. D., Shen, R., Janjigian, Y. Y.,  ... & Morris, L. G. 
(2019).  Tumor  mutational  load  predicts  survival  after 
immunotherapy  across  multiple  cancer  types.  Nature 
genetics, 51(2), 202-206. 
Micciancio,  D.,  &  Polyakov,  Y.  (2021,  November). 
Bootstrapping  in  FHEW-like  cryptosystems.  In 
Proceedings of the 9th on Workshop on Encrypted 
Computing & Applied Homomorphic Cryptography 
(pp. 17-28).