SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering

被引:29
作者
Cong, Kelong [1 ]
Das, Debajyoti [1 ]
Park, Jeongeun [1 ]
Pereira, Hilder V. L. [1 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
来源
PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022 | 2022年
关键词
Decision Tree; Privacy; Homomorphic Encryption; Transciphering;
D O I
10.1145/3548606.3560702
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine learning as a service scenario typically requires the client to trust the server and provide sensitive data in plaintext. However, with the recent improvements in fully homomorphic encryption (FHE) schemes, many such applications can be designed in a privacy-preserving way. In this work, we focus on such a problem, private decision tree evaluation (PDTE) - where a server has a decision tree classification model, and a client wants to use the model to classify her private data without revealing the data or the classification result to the server. We present an efficient non-interactive design of PDTE, that we call SortingHat, based on FHE techniques. As part of our design, we solve multiple cryptographic problems related to FHE: (1) we propose a fast homomorphic comparison function where one input can be in plaintext format; (2) we design an efficient binary decision tree evaluation technique in the FHE setting, which we call homomorphic traversal, and apply it together with our homomorphic comparison to evaluate private decision tree classifiers, obtaining running times orders of magnitude faster than the state of the art; (3) we improve both the communication cost and the time complexity of transciphering, by applying our homomorphic comparison to the FiLIP stream cipher. Through a prototype implementation, we demonstrate that our improved transciphering solution runs around 400 times faster than previous works. We finally present a choice in terms of PDTE design: we present a version of SortingHat without transciphering that achieves significant improvement in terms of computation cost compared to prior works, and another version t-SortingHat with transciphering that has a communication cost about 20 thousand times smaller but comparable running time.
引用
收藏
页码:563 / 577
页数:15
相关论文
共 47 条
[1]   PIR with compressed queries and amortized query processing [J].
Angel, Sebastian ;
Chen, Hao ;
Laine, Kim ;
Setty, Srinath .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :962-979
[2]   Decision tree classifiers for automated medical diagnosis [J].
Azar, Ahmad Taher ;
El-Metwally, Shereen M. .
NEURAL COMPUTING & APPLICATIONS, 2013, 23 (7-8) :2387-2403
[3]  
Barni M, 2009, LECT NOTES COMPUT SC, V5789, P424, DOI 10.1007/978-3-642-04444-1_26
[4]   Efficient Garbling from a Fixed-Key Blockcipher [J].
Bellare, Mihir ;
Viet Tung Hoang ;
Keelveedhi, Sriram ;
Rogaway, Phillip .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :478-492
[5]  
Bellare Mihir, 2012, FDN GARBLED CIRCUITS, P784, DOI 10.1145/2382196.2382279
[6]  
Bonte Charlotte, 2022, Report 2022/074
[7]   Machine Learning Classification over Encrypted Data [J].
Bost, Raphael ;
Popa, Raluca Ada ;
Tu, Stephen ;
Goldwasser, Shafi .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[8]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[9]  
Brickell J, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P498
[10]   Chosen-Ciphertext Secure Fully Homomorphic Encryption [J].
Canetti, Ran ;
Raghuraman, Srinivasan ;
Richelson, Silas ;
Vaikuntanathan, Vinod .
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 :213-240