Cryptology ePrint Archive: Report 2020/1514

Improved privacy-preserving training using fixed-Hessian minimisation

Tabitha Ogilvie and Rachel Player and Joe Rowell

Abstract: The fixed-Hessian minimisation method can be used to implement privacy-preserving machine learning training from homomorphic encryption. This is a relatively under-explored part of the literature, with the main prior work being that of Bonte and Vercauteren (BMC Medical Genomics, 2018), who proposed a simplified Hessian method for logistic regression training over the BFV homomorphic encryption scheme. Our main contribution is to revisit the fixed- Hessian approach for logistic regression training over the CKKS homomorphic encryption scheme. We improve on the prior work in several aspects, most notably showing how the native encoding in CKKS can be used to take advantage of SIMD operations. We implement our new fixed-Hessian approach in SEAL and compare it to more commonly-used minimisation methods, based on Gradient Descent and Nesterovís Accelerated Gradient Descent. We find that the fixed-Hessian approach exhibits fast run time and comparable accuracy to these alternative approaches. Moreover, it can be argued to be more practical in the privacy-preserving training context, as no step size parameter needs to be chosen.

As an additional contribution, we describe and implement three distinct training algorithms, based on Gradient Descent, Nesterovís Accelerated Gradient Descent, and a fixed-Hessian method respec- tively, to achieve privacy-preserving ridge regression training from homomorphic encryption. To the best of our knowledge, this is the first time homomorphic encryption has been used to implement ridge regression training on encrypted data.

Category / Keywords: applications / homomorphic encryption, fixed Hessian, logistic regression, ridge regression, privacy-preserving training

Original Publication (with minor differences): WAHC 2020 Ė 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography

Date: received 2 Dec 2020, last revised 11 Dec 2020

Contact author: Tabitha Ogilvie 2019 at live rhul ac uk,rachel player@rhul ac uk,Joe Rowell 2015@live rhul ac uk

Available format(s): PDF | BibTeX Citation

Version: 20201211:163319 (All versions of this report)

Short URL: ia.cr/2020/1514


[ Cryptology ePrint archive ]