Logistic regression model training based on the approximate homomorphic encryption

被引:116
|
作者
Kim, Andrey [1 ]
Song, Yongsoo [2 ]
Kim, Miran [3 ]
Lee, Keewoo [1 ]
Cheon, Jung Hee [1 ]
机构
[1] Seoul Natl Univ, Dept Math Sci, 1 Gwanak Ro, Seoul 08826, South Korea
[2] Univ Calif San Diego, Dept Comp Sci & Engn, 9500 Gillman Dr, San Diego, CA 92093 USA
[3] Univ Calif San Diego, Div Biomed Informat, 9500 Gillman Dr, San Diego, CA 92093 USA
基金
新加坡国家研究基金会;
关键词
Homomorphic encryption; Machine learning; Logistic regression;
D O I
10.1186/s12920-018-0401-7
中图分类号
Q3 [遗传学];
学科分类号
071007 ; 090102 ;
摘要
Background: Security concerns have been raised since big data became a prominent tool in data analysis. For instance, many machine learning algorithms aim to generate prediction models using training data which contain sensitive information about individuals. Cryptography community is considering secure computation as a solution for privacy protection. In particular, practical requirements have triggered research on the efficiency of cryptographic primitives. Methods: This paper presents a method to train a logistic regression model without information leakage. We apply the homomorphic encryption scheme of Cheon et al. (ASIACRYPT 2017) for an efficient arithmetic over real numbers, and devise a new encoding method to reduce storage of encrypted database. In addition, we adapt Nesterov's accelerated gradient method to reduce the number of iterations as well as the computational cost while maintaining the quality of an output classifier. Results: Our method shows a state-of-the-art performance of homomorphic encryption system in a real-world application. The submission based on this work was selected as the best solution of Track 3 at iDASH privacy and security competition 2017. For example, it took about six minutes to obtain a logistic regression model given the dataset consisting of 1579 samples, each of which has 18 features with a binary outcome variable. Conclusions: We present a practical solution for outsourcing analysis tools such as logistic regression analysis while preserving the data confidentiality.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Privacy-preserving approximate GWAS computation based on homomorphic encryption
    Kim, Duhyeong
    Son, Yongha
    Kim, Dongwoo
    Kim, Andrey
    Hong, Seungwan
    Cheon, Jung Hee
    BMC MEDICAL GENOMICS, 2020, 13 (Suppl 7)
  • [32] Logistic Regression on Homomorphic Encrypted Data at Scale
    Han, Kyoohyung
    Hong, Seungwan
    Cheon, Jung Hee
    Park, Daejun
    THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, : 9466 - 9471
  • [33] Approximate homomorphic encryption based privacy-preserving machine learning: a survey
    Yuan, Jiangjun
    Liu, Weinan
    Shi, Jiawen
    Li, Qingqing
    ARTIFICIAL INTELLIGENCE REVIEW, 2025, 58 (03)
  • [34] Securing Approximate Homomorphic Encryption Using Differential Privacy
    Li, Baiyu
    Micciancio, Daniele
    Schultz, Mark
    Sorrell, Jessica
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 560 - 589
  • [35] Approximate Methods for the Computation of Step Functions in Homomorphic Encryption
    Huang, Tairong
    Ma, Shihe
    Wang, Anyu
    Wang, Xiaoyun
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 217 - 237
  • [36] CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption
    He, Pengzhou
    Madrigal, Samira Carolina Oliva
    Koç, Çetin Kaya
    Bao, Tianyou
    Xie, Jiafeng
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 451 - 480
  • [37] Accelerating Homomorphic Encryption using Approximate Computing Techniques
    Khanna, Shabnam
    Rafferty, Ciara
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 380 - 387
  • [38] A (Leveled) Fully Homomorphic Encryption Scheme Based on Error-Free Approximate GCD
    Li, Xing
    Yu, Jianping
    Zhang, Peng
    Sun, Xiaoqiang
    PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 224 - 227
  • [39] Homomorphic encryption based on fraction
    Zhu, Ping
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 487 - 490
  • [40] Approximate Homomorphic Encryption over the Conjugate-Invariant Ring
    Kim, Duhyeong
    Song, Yongsoo
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 85 - 102