Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols

被引:19
|
作者
David, Bernardo [1 ]
Dowsley, Rafael [2 ]
Katti, Raj [3 ]
Nascimento, Anderson C. A. [3 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] Karlsruhe Inst Technol, D-76021 Karlsruhe, Germany
[3] Univ Washington, Tacoma, WA USA
来源
关键词
Secure comparison; Private machine learning; Unconditional security; Commodity based model; MULTIPARTY COMPUTATION; BIT-DECOMPOSITION; CONSTANT-ROUNDS; COMMITMENT;
D O I
10.1007/978-3-319-26059-4_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an efficient unconditionally secure protocol for privacy preserving comparison of l-bit integers when both integers are shared between two semi-honest parties. Using our comparison protocol as a building block, we construct two-party generic private machine learning classifiers. In this scenario, one party holds an input while the other holds a model and they wish to classify the input according to the model without revealing their private information to each other. Our constructions are based on the setup assumption that there exists pre-distributed correlated randomness available to the computing parties, the so-called commodity-based model. The protocols are storage and computationally efficient, consisting only of additions and multiplications of integers.
引用
收藏
页码:354 / 367
页数:14
相关论文
共 50 条
  • [1] Efficient Privacy Preserving Reputation Protocols Inspired by Secure Sum
    Hasan, Omar
    Bertino, Elisa
    Brunie, Lionel
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 126 - 133
  • [2] Efficient Secure Building Blocks With Application to Privacy Preserving Machine Learning Algorithms
    Kjamilji, Artrim
    Savas, Erkay
    Levi, Albert
    [J]. IEEE ACCESS, 2021, 9 : 8324 - 8353
  • [3] Efficient and Secure Protocols for Privacy-Preserving Set Operations
    Sang, Yingpeng
    Shen, Hong
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
  • [4] On the existence of unconditionally privacy-preserving auction protocols
    Brandt, Felix
    Sandholm, Tuomas
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (02)
  • [5] Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra
    David, Bernardo
    Dowsley, Rafael
    van de Graaf, Jeroen
    Marques, Davidson
    Nascimento, Anderson C. A.
    Pinto, Adriana C. B.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) : 59 - 73
  • [6] Protocol for privacy preserving set pattern matching with unconditionally secure
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    [J]. Beijing Youdian Daxue Xuebao, 2009, 1 (99-102):
  • [7] Practical Secure Aggregation for Privacy-Preserving Machine Learning
    Bonawitz, Keith
    Ivanov, Vladimir
    Kreuter, Ben
    Marcedone, Antonio
    McMahan, H. Brendan
    Patel, Sarvar
    Ramage, Daniel
    Segal, Aaron
    Seth, Karn
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1175 - 1191
  • [8] A Review of Privacy-Preserving Machine Learning Classification
    Wang, Andy
    Wang, Chen
    Bi, Meng
    Xu, Jian
    [J]. CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 671 - 682
  • [9] Privacy-Preserving Machine Learning Using Federated Learning and Secure Aggregation
    Lia, Dragos
    Togan, Mihai
    [J]. PROCEEDINGS OF THE 2020 12TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2020), 2020,
  • [10] Secure, privacy-preserving and federated machine learning in medical imaging
    Georgios A. Kaissis
    Marcus R. Makowski
    Daniel Rückert
    Rickmer F. Braren
    [J]. Nature Machine Intelligence, 2020, 2 : 305 - 311