Cryptology ePrint Archive: Report 2021/768

Privacy-Preserving Decision Trees Training and Prediction

Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald

Abstract: In the era of cloud computing and machine learning, data has become a highly valuable resource. Recent history has shown that the benefits brought forth by this data driven culture come at a cost of potential data leakage. Such breaches have a devastating impact on individuals and industry, and lead the community to seek privacy preserving solutions. A promising approach is to utilize Fully Homomorphic Encryption (FHE) to enable machine learning over encrypted data, thus providing resiliency against information leakage. However, computing over encrypted data incurs a high computational overhead, thus requiring the redesign of algorithms, in an ``FHE-friendly" manner, to maintain their practicality. In this work we focus on the ever-popular tree based methods (e.g., boosting, random forests), and propose a new privacy-preserving solution to training and prediction for trees. Our solution employs a low-degree approximation for the step-function together with a lightweight interactive protocol, to replace components of the vanilla algorithm that are costly over encrypted data. Our protocols for decision trees achieve practical usability demonstrated on standard UCI datasets encrypted with fully homomorphic encryption. In addition, the communication complexity of our protocols is independent of the tree size and dataset size in prediction and training, respectively, which significantly improves on prior works.

Category / Keywords: cryptographic protocols / fully homomorphic encryption, privacy preserving machine learning, decision trees, training, prediction

Original Publication (with major differences): Machine Learning and Knowledge Discovery in Databases - European Conference, {ECML} {PKDD} 2020, Ghent, Belgium, September 14-18, 2020, Proceedings
DOI:
10.1007/978-3-030-67658-2_9

Date: received 8 Jun 2021

Contact author: adi akavia at gmail com, margarita vald at cs tau ac il

Available format(s): PDF | BibTeX Citation

Version: 20210609:062424 (All versions of this report)

Short URL: ia.cr/2021/768


[ Cryptology ePrint archive ]