Private Machine Learning Classification Based on Fully Homomorphic Encryption

被引:64
|
作者
Sun, Xiaoqiang [1 ]
Zhang, Peng [1 ]
Liu, Joseph K. [2 ]
Yu, Jianping [1 ]
Xie, Weixin [1 ]
机构
[1] Shenzhen Univ, ATR Key Lab Natl Def Technol, Coll Informat Engn, Shenzhen 518060, Peoples R China
[2] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
基金
中国国家自然科学基金;
关键词
Decision trees; Encryption; Additives; Switches; Protocols; Privacy; Machine learning classification; privacy preserving; fully homomorphic encryption; hyperplane decision-based; Naive Bayes; decision tree; CLOUD DATA; EFFICIENT; SEARCH;
D O I
10.1109/TETC.2018.2794611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning classification is an useful tool for trend prediction by analyzing big data. As supporting homomorphic operations over encrypted data without decryption, fully homomorphic encryption (FHE) contributes to machine learning classification without leaking user privacy, especially in the outsouring scenario. In this paper, we propose an improved FHE scheme based on HElib, which is a FHE library implemented based on Brakerski's FHE scheme. Our improvement focuses on two aspects. On the one hand, we first use the relinearization technique to reduce the ciphertext size, and then the modulus switching technique is used to reduce the modulus and decryption noise. On the other hand, we need no relinearization and modulus switching if there is additive homomorphic or no homomorphic operation in the multiplicative ciphertext's next homomorphic operation. Homomorphic comparison protocol, private hyperplane decision-based classification and private Naive Bayes classification are implemented by additive homomorphic and multiplicative homomorphic first. In our homomorphic comparison protocol, the number of interactions is reduced from 3 to 1. We choose the proposed FHE scheme to implement private decision tree classification. Simulation results show that the efficiency of our FHE scheme and implementation of private decision tree classification are more efficient than other two schemes.
引用
收藏
页码:352 / 364
页数:13
相关论文
共 50 条
  • [41] On Fully Homomorphic Encryption for Privacy-Preserving Deep Learning
    Hernandez Marcano, Nestor J.
    Moller, Mads
    Hansen, Soren
    Jacobsen, Rune Hylsberg
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [42] Fully Homomorphic Encryption Scheme Based on Decomposition Ring
    Arita, Seiko
    Handa, Sari
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 195 - 211
  • [43] Secure Collapsing Method Based on Fully Homomorphic Encryption
    Niyitegeka, David
    Bellafqira, Reda
    Genin, Emmanuelle
    Coatrieux, Gouenou
    DIGITAL PERSONALIZED HEALTH AND MEDICINE, 2020, 270 : 412 - 416
  • [44] Secure matrix multiplication based on fully homomorphic encryption
    Huang, Hai
    Zong, Haoran
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (05): : 5064 - 5085
  • [45] Secure Federated Learning With Fully Homomorphic Encryption for IoT Communications
    Hijazi, Neveen Mohammad
    Aloqaily, Moayad
    Guizani, Mohsen
    Ouni, Bassem
    Karray, Fakhri
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 4289 - 4300
  • [46] SoK: Learning with Errors, Circular Security, and Fully Homomorphic Encryption
    Micciancio, Daniele
    Vaikuntanathan, Vinod
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 291 - 321
  • [47] Bibliometrics of Machine Learning Research Using Homomorphic Encryption
    Chen, Zhigang
    Hu, Gang
    Zheng, Mengce
    Song, Xinxia
    Chen, Liqun
    MATHEMATICS, 2021, 9 (21)
  • [48] Secure matrix multiplication based on fully homomorphic encryption
    Hai Huang
    Haoran Zong
    The Journal of Supercomputing, 2023, 79 : 5064 - 5085
  • [49] Efficient Pruning for Machine Learning Under Homomorphic Encryption
    Aharoni, Ehud
    Baruch, Moran
    Bose, Pradip
    Buyuktosunoglu, Alper
    Drucker, Nir
    Pal, Subhankar
    Pelleg, Tomer
    Sarpatwar, Kanthi
    Shaul, Hayim
    Soceanu, Omri
    Vaculin, Roman
    COMPUTER SECURITY - ESORICS 2023, PT IV, 2024, 14347 : 204 - 225
  • [50] LWR-Based Fully Homomorphic Encryption, Revisited
    Luo, Fucai
    Wang, Fuqun
    Wang, Kunpeng
    Li, Jie
    Chen, Kefei
    SECURITY AND COMMUNICATION NETWORKS, 2018,