Blind Evaluation Framework for Fully Homomorphic Encryption and Privacy-Preserving Machine Learning (2310.13140v4)
Abstract: In the domain of Privacy-Preserving Machine Learning (PPML), Fully Homomorphic Encryption (FHE) is often used for encrypted computation to allow secure and privacy-preserving outsourcing of machine learning modeling. While FHE enables encrypted arithmetic operations, execution of programmatic logic such as control structures or conditional programming have remained a challenge. As a result, progress in encrypted training of PPML with FHE has been relatively stagnant compared to encrypted inference owing to the considerably higher logical complexity required in training. In addition, prior works that have demonstrated encrypted training use Interactive Rounds of Decryption and Evaluation (IRDE), where certain operations are decrypted and evaluated in plaintext using interactive rounds between the untrusted computing party (server) and the trusted private-key owner (client). In decision tree training for example, the current state-of-the-art requires d-rounds of IRDE for tree-depth of d. To address this issue in PPML and FHE, we introduce the Blind Evaluation Framework (BEF), a cryptographically secure programming framework that enables blind, but correct, execution of programming logic without IRDE. This is achieved by deconstructing programming logic into binary circuits and binary arithmetic to find alternative representations of logical statements, and adopting them to FHE for secure logical programming. To the best of our knowledge, this is the first framework to enable both training and inference of PPML models with FHE without decryption rounds. By advancing the state-of-the-art in IRDE efficiency by eliminating IRDE entirely, BEF enables adoption of FHE in use-cases where large amounts of computing services are available without the ability to have trusted clients available to perform decryption rounds.
- Privacy-preserving decision trees training and prediction. ACM Transactions on Privacy and Security 25, 3 (2022), 1–30.
- Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 2945–2958.
- Satyajit Anand Anjuli and A Satjajit. 2013. 2-bit magnitude comparator design using different logic styles. International Journal of Engineering Science Invention 2, 1 (2013), 13–24.
- Secure evaluation of private linear branching programs with medical applications. In Computer Security–ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 14. Springer, 424–439.
- Machine learning classification over encrypted data. Cryptology ePrint Archive (2014).
- Chimera: Combining ring-lwe-based fully homomorphic encryption schemes. Journal of Mathematical Cryptology 14, 1 (2020), 316–338.
- Privacy-preserving remote diagnostics. In Proceedings of the 14th ACM conference on Computer and communications security. 498–507.
- Homomorphic encryption for arithmetic of approximate numbers. In Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I 23. Springer, 409–437.
- TFHE: fast fully homomorphic encryption over the torus. Journal of Cryptology 33, 1 (2020), 34–91.
- Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks. Cryptology ePrint Archive, Paper 2021/091. https://doi.org/10.1007/978-3-030-78086-9_1
- Sortinghat: Efficient private decision tree evaluation via homomorphic encryption and transciphering. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 563–577.
- Multiparty computation from threshold homomorphic encryption. In Advances in Cryptology—EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings 20. Springer, 280–300.
- Multiparty computation from somewhat homomorphic encryption. In Annual Cryptology Conference. Springer, 643–662.
- Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation. IEEE Transactions on Dependable and Secure Computing 16, 2 (2017), 217–230.
- Practical secure decision tree learning in a teletreatment application. In Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers 18. Springer, 179–194.
- Wenliang Du and Zhijun Zhan. 2002. Building decision tree classifier on private data. (2002).
- Privacy preserving decision tree learning over multiple parties. Data & Knowledge Engineering 63, 2 (2007), 348–361.
- Privacy-Preserving Tree-Based Inference with TFHE. In International Conference on Mobile, Secure, and Programmable Networking. Springer, 139–156.
- A new nano design for implementation of a digital comparator based on quantum-dot cellular automata. International Journal of Theoretical Physics 60 (2021), 2358–2367.
- Craig Gentry. 2009. Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing. 169–178.
- Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International conference on machine learning. PMLR, 201–210.
- Privacy-preserving machine learning as a service. Proc. Priv. Enhancing Technol. 2018, 3 (2018), 123–142.
- Marc Joye and Fariborz Salehi. 2018. Private yet efficient decision tree evaluation. In Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings 32. Springer, 243–259.
- Logistic regression model training based on the approximate homomorphic encryption. BMC medical genomics 11, 4 (2018), 23–31.
- Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR medical informatics 6, 2 (2018), e8805.
- Sok: Modular and efficient private decision tree evaluation. Proceedings on Privacy Enhancing Technologies (2019).
- Hunjae Lee. 2023. Privacy Preserving Decision Tree Training and Prediction with No Decryption - Implementation. https://github.com/timlee0131/Privacy-Preserving-Decision-Tree-Training-and-Prediction-with-No-Decryption—Implementation.
- Fully Homomorphic Encryption with Table Lookup for Privacy-Preserving Smart Grid. In 2019 IEEE International Conference on Smart Computing (SMARTCOMP). 19–24. https://doi.org/10.1109/SMARTCOMP.2019.00023
- Yehuda Lindell and Benny Pinkas. 2000. Privacy Preserving Data Mining. In Advances in Cryptology — CRYPTO 2000 (Lecture Notes in Computer Science, Vol. 1880). Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44598-6_3
- Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud. IEEE Transactions on Information Forensics and Security 15 (2020), 2914–2929. https://doi.org/10.1109/TIFS.2020.2980192
- Non-interactive and output expressive private comparison from homomorphic encryption. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security. 67–74.
- Saeed Samet and Ali Miri. 2008. Privacy preserving ID3 using Gini index over horizontally partitioned data. In 2008 IEEE/ACS International Conference on Computer Systems and Applications. IEEE, 645–651.
- Pranay Singh and Pramod Kumar Jain. 2018. Design and analysis of low power, high speed 4-bit magnitude comparator. In 2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE). IEEE, 1680–1683.
- Private machine learning classification based on fully homomorphic encryption. IEEE Transactions on Emerging Topics in Computing 8, 2 (2018), 352–364.
- Non-interactive private decision tree evaluation. In Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings 34. Springer, 174–194.
- Zama. 2022. TFHE-rs: A Pure Rust Implementation of the TFHE Scheme for Boolean and Integer Arithmetics Over Encrypted Data. https://github.com/zama-ai/tfhe-rs.