Efficient machine learning over encrypted data with non-interactive communication

被引:23
|
作者
Park, Heejin [1 ]
Kim, Pyung [2 ]
Kim, Heeyoul [3 ]
Park, Ki-Woong [4 ]
Lee, Younho [2 ]
机构
[1] SeoulTech, Div Ind & Informat Syst Engn, Grad Sch Policy & IT, Seoul, South Korea
[2] SeoulTech, Dept Ind & Syst Engn, ITM Div, Seoul, South Korea
[3] Kyonggi Univ, Dept Comp Sci, Suwon, Gyeonggi Do, South Korea
[4] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Privacy-preserving classification; Fully homomorphic encryption; Applied cryptography; Security; MEDICAL DIAGNOSIS;
D O I
10.1016/j.csi.2017.12.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we describe a protocol framework that can perform classification tasks in a privacy-preserving manner. To demonstrate the feasibility of the proposed framework, we implement two protocols supporting Naive Bayes classification. We overcome the heavy computational load of conventional fully homomorphic encryption based privacy-preserving protocols by using various optimization techniques. The proposed method differs from previous techniques insofar as it requires no intermediate interactions between the server and the client while executing the protocol, except for the mandatory interaction to obtain the decryption result of the encrypted classification output. As a result of this minimal interaction, the proposed method is relatively stable. Furthermore, the decryption key is used only once during the execution of the protocol, overcoming a potential security issue caused by the frequent exposure of the decryption key in memory. The proposed implementation uses a cryptographic primitive that is secure against attacks with quantum computers. Therefore, the framework described in this paper is expected to be robust against future quantum computer attacks. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:87 / 108
页数:22
相关论文
共 50 条
  • [21] An Efficient Construction of Non-Interactive Secure Multiparty Computation
    Obana, Satoshi
    Yoshida, Maki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 604 - 614
  • [22] An efficient and non-interactive hierarchical key agreement protocol
    Guo, Hua
    Mu, Yi
    Li, Zhoujun
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2011, 30 (01) : 28 - 34
  • [23] PROCESSING OF INTERACTIVE AND NON-INTERACTIVE PICTURES IN PA LEARNING BY RETARDED PERSONS
    ASHFORD, DC
    BAUMEISTER, AA
    AMERICAN JOURNAL OF MENTAL DEFICIENCY, 1977, 82 (02): : 187 - 193
  • [24] Interactive and non-interactive pictures in multimedia learning environments: Effects on learning outcomes and learning efficiency
    Rasch, Thorsten
    Schnotz, Wolfgang
    LEARNING AND INSTRUCTION, 2009, 19 (05) : 411 - 422
  • [26] A Learning Theory Approach to Non-Interactive Database Privacy
    Blum, Avrim
    Ligett, Katrina
    Roth, Aaron
    STOC'08: PROCEEDINGS OF THE 2008 ACM INTERNATIONAL SYMPOSIUM ON THEORY OF COMPUTING, 2008, : 609 - 617
  • [27] NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning
    Li, Tong
    Li, Jin
    Chen, Xiaofeng
    Liu, Zheli
    Lou, Wenjing
    Hou, Y. Thomas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2969 - 2982
  • [28] Non-interactive certificate update protocol for efficient authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 (113): : 132 - 144
  • [29] On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 74 : 883 - 889
  • [30] Non-interactive Certificate Update Protocol for Efficient Authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS ( IOT 2019), 2019,