Cryptology ePrint Archive: Report 2015/386

Privately Evaluating Decision Trees and Random Forests

David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter

Abstract: Decision trees and random forests are common classifiers with widespread use. In this paper, we develop two protocols for privately evaluating decision trees and random forests. We operate in the standard two-party setting where the server holds a model (either a tree or a forest), and the client holds an input (a feature vector). At the conclusion of the protocol, the client learns only the model's output on its input and a few generic parameters concerning the model; the server learns nothing. The first protocol we develop provides security against semi-honest adversaries. We then give an extension of the semi-honest protocol that is robust against malicious adversaries. We implement both protocols and show that both variants are able to process trees with several hundred decision nodes in just a few seconds and a modest amount of bandwidth. Compared to previous semi-honest protocols for private decision tree evaluation, we demonstrate a tenfold improvement in computation and bandwidth.

Category / Keywords: cryptographic protocols / public-key cryptography, applications, machine learning

Original Publication (with major differences): PETS 2016
DOI:
popets-2016-0043

Date: received 24 Apr 2015, last revised 26 May 2016

Contact author: dwu4 at cs stanford edu

Available format(s): PDF | BibTeX Citation

Note: Extended version of paper appearing in PETS 2016.

Version: 20160526:210652 (All versions of this report)

Short URL: ia.cr/2015/386

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]