Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3338469.3358942acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

Linear-Regression on Packed Encrypted Data in the Two-Server Model

Published: 11 November 2019 Publication History

Abstract

Developing machine learning models from federated training data, containing many independent samples, is an important task that can significantly enhance the potential applicability and prediction power of learned models. Since single users, like hospitals or individual labs, typically collect data-sets that do not support accurate learning with high confidence, it is desirable to combine data from several users without compromising data privacy. In this paper, we develop a privacy-preserving solution for learning a linear regression model from data collectively contributed by several parties ("data owners''). Our protocol is based on the protocol of Giacomelli et al. (ACNS 2018) that utilized two non colluding servers and Linearly Homomorphic Encryption (LHE) to learn regularized linear regression models. Our methods use a different LHE scheme that allows us to significantly reduce both the number and runtime of homomorphic operations, as well as the total runtime complexity. Another advantage of our protocol is that the underlying LHE scheme is based on a different (and post-quantum secure) security assumption than Giacomelli et al. Our approach leverages the Chinese Remainder Theorem, and Single Instruction Multiple Data representations, to obtain our improved performance. For a 1000 x 40 linear regression task we can learn a model in a total of 3 seconds for the homomorphic operations, compared to more than 100 seconds reported in the literature. Our approach also scales up to larger feature spaces: we implemented a system that can handle a 1000 x 100 linear regression task, investing minutes of server computing time after a more significant offline pre-processing by the data owners. We intend to incorporate our protocol and implementations into a comprehensive system that can handle secure federated learning at larger scales.

References

[1]
Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2015. Machine Learning Classification over Encrypted Data. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8--11, 2015. The Internet Society. https://www.ndss-symposium.org/ndss2015/machine-learning-classification-over-encrypted-data
[2]
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2012. (Leveled) Fully Homomorphic Encryption Without Bootstrapping. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS '12). ACM, New York, NY, USA, 309--325. https://doi.org/10.1145/2090236.2090262
[3]
Hao Chen, Kim Laine, and Rachel Player. 2017. Simple Encrypted Arithmetic Library - SEAL v2.1. In Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers (Lecture Notes in Computer Science), Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson (Eds.), Vol. 10323. Springer, 3--18. https://doi.org/10.1007/978--3--319--70278-0_1
[4]
Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. IACR Cryptology ePrint Archive, Vol. 2012 (2012), 144.
[5]
Pierre-Alain Fouque, Jacques Stern, and Jan-Geert Wackers. 2002. CryptoComputing with Rationals. In Financial Cryptography, 6th International Conference, FC 2002, Southampton, Bermuda, March 11--14, 2002, Revised Papers. 136--146. https://doi.org/10.1007/3--540--36504--4_10
[6]
Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, and Kyonghwan Yoon. 2018. Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption. In Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2--4, 2018, Proceedings (Lecture Notes in Computer Science), Bart Preneel and Frederik Vercauteren (Eds.), Vol. 10892. Springer, 243--261. https://doi.org/10.1007/978--3--319--93387-0_13
[7]
Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin E. Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19--24, 2016 (JMLR Workshop and Conference Proceedings), Maria-Florina Balcan and Kilian Q. Weinberger (Eds.), Vol. 48. JMLR.org, 201--210. http://proceedings.mlr.press/v48/gilad-bachrach16.html
[8]
Oded Goldreich. 2004. The Foundations of Cryptography - Volume 2: Basic Applications .Cambridge University Press. https://doi.org/10.1017/CBO9780511721656
[9]
O. Goldreich, S. Micali, and A. Wigderson. 1987. How to Play ANY Mental Game. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC '87). ACM, New York, NY, USA, 218--229. https://doi.org/10.1145/28395.28420
[10]
Thore Graepel, Kristin Lauter, and Michael Naehrig. 2013. ML Confidential: Machine Learning on Encrypted Data. In Proceedings of the 15th International Conference on Information Security and Cryptology (ICISC'12). Springer-Verlag, Berlin, Heidelberg, 1--21. https://doi.org/10.1007/978--3--642--37682--5_1
[11]
Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In 34rd Annual International Cryptology Conference, CRYPTO 2014. Springer Verlag.
[12]
Xiaoqian Jiang, Miran Kim, Kristin Lauter, and Yongsoo Song. 2018. Secure Outsourced Matrix Computation and Application to Neural Networks. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18). ACM, New York, NY, USA, 1209--1222. https://doi.org/10.1145/3243734.3243837
[13]
Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In Proceedings of the 27th USENIX Conference on Security Symposium (SEC'18). USENIX Association, Berkeley, CA, USA, 1651--1668. http://dl.acm.org/citation.cfm?id=3277203.3277326
[14]
Seny Kamara, Payman Mohassel, and Mariana Raykova. 2011. Outsourcing Multi-Party Computation. Cryptology ePrint Archive, Report 2011/272.
[15]
Yehuda Lindell and Benny Pinkas. 2000. Privacy Preserving Data Mining. In Advances in Cryptology -- CRYPTO 2000, Mihir Bellare (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 36--54.
[16]
Gary C. McDonald. 2009. Ridge regression. Wiley Interdisciplinary Reviews: Computational Statistics, Vol. 1, 1 (2009), 93--100.
[17]
Payman Mohassel and Peter Rindal. 2018. ABY(^mbox3 ): A Mixed Protocol Framework for Machine Learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15--19, 2018, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 35--52. https://doi.org/10.1145/3243734.3243760
[18]
Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. 19--38. https://doi.org/10.1109/SP.2017.12
[19]
Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, and Nina Taft. 2013. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. In Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP '13). IEEE Computer Society, Washington, DC, USA, 334--348. https://doi.org/10.1109/SP.2013.30
[20]
Oded Regev. 2009. On lattices, learning with errors, random linear codes, and cryptography. J. ACM, Vol. 56, 6 (2009), 34:1--34:40.
[21]
Kenneth H. Rosen. 1993. Elementary number theory and its applications (3. ed.) .Addison-Wesley.
[22]
Nigel P Smart and Frederik Vercauteren. 2014. Fully homomorphic SIMD operations. Designs, codes and cryptography (2014), 1--25.
[23]
Paul S. Wang, M. J. T. Guy, and James H. Davenport. 1982. P-adic reconstruction of rational numbers. ACM SIGSAM Bulletin, Vol. 16, 2 (1982), 2--3. https://doi.org/10.1145/1089292.1089293
[24]
Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS '86). IEEE Computer Society, Washington, DC, USA, 162--167. https://doi.org/10.1109/SFCS.1986.25

Cited By

View all
  • (2024)Privacy-preserving biological age prediction over federated human methylation data using fully homomorphic encryptionGenome Research10.1101/gr.279071.12434:9(1324-1333)Online publication date: 5-Sep-2024
  • (2024)Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryptionPeer-to-Peer Networking and Applications10.1007/s12083-024-01740-917:5(3182-3199)Online publication date: 26-Jun-2024
  • (2024)Achievable CCA2 Relaxation for Homomorphic EncryptionJournal of Cryptology10.1007/s00145-024-09526-138:1Online publication date: 26-Nov-2024
  • Show More Cited By

Index Terms

  1. Linear-Regression on Packed Encrypted Data in the Two-Server Model

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WAHC'19: Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography
    November 2019
    74 pages
    ISBN:9781450368292
    DOI:10.1145/3338469
    This work is licensed under a Creative Commons Attribution-ShareAlike International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 November 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. homomorphic encryption
    2. linear regression
    3. packing
    4. privacy-preserving machine learning
    5. rlwe
    6. single instruction multiple data

    Qualifiers

    • Research-article

    Funding Sources

    • Israel National Cyber Directorate

    Conference

    CCS '19
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6 of 17 submissions, 35%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)162
    • Downloads (Last 6 weeks)31
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Privacy-preserving biological age prediction over federated human methylation data using fully homomorphic encryptionGenome Research10.1101/gr.279071.12434:9(1324-1333)Online publication date: 5-Sep-2024
    • (2024)Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryptionPeer-to-Peer Networking and Applications10.1007/s12083-024-01740-917:5(3182-3199)Online publication date: 26-Jun-2024
    • (2024)Achievable CCA2 Relaxation for Homomorphic EncryptionJournal of Cryptology10.1007/s00145-024-09526-138:1Online publication date: 26-Nov-2024
    • (2024)Approaches for Writing HE ApplicationsHomomorphic Encryption for Data Science (HE4DS)10.1007/978-3-031-65494-7_4(69-108)Online publication date: 25-Jul-2024
    • (2024)Privacy-Preserving Machine Learning with HEHomomorphic Encryption for Data Science (HE4DS)10.1007/978-3-031-65494-7_10(235-270)Online publication date: 25-Jul-2024
    • (2023)Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location DataIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.328213318(3414-3429)Online publication date: 2023
    • (2023)A Privacy-Preserving State Estimation Scheme for Smart GridsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321001720:5(3940-3956)Online publication date: 1-Sep-2023
    • (2023)Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE2023 IEEE 36th Computer Security Foundations Symposium (CSF)10.1109/CSF57540.2023.00012(489-504)Online publication date: Jul-2023
    • (2023)Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an ExampleInformation Security Practice and Experience10.1007/978-981-99-7032-2_17(284-298)Online publication date: 8-Nov-2023
    • (2023)Private Epigenetic PaceMaker Detector Using Homomorphic Encryption - Extended AbstractBioinformatics Research and Applications10.1007/978-3-031-23198-8_6(52-61)Online publication date: 1-Jan-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media