2019
DOI: 10.1609/aaai.v33i01.33019466
|View full text |Cite
|
Sign up to set email alerts
|

Logistic Regression on Homomorphic Encrypted Data at Scale

Abstract: Machine learning on (homomorphic) encrypted data is a cryptographic method for analyzing private and/or sensitive data while keeping privacy. In the training phase, it takes as input an encrypted training data and outputs an encrypted model without ever decrypting. In the prediction phase, it uses the encrypted model to predict results on new encrypted data. In each phase, no decryption key is needed, and thus the data privacy is ultimately guaranteed. It has many applications in various areas such as finance,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
90
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 79 publications
(91 citation statements)
references
References 16 publications
1
90
0
Order By: Relevance
“…We denote this as packed-matrix encoding . All matrix products in steps 2 through 8 of Algorithm 3 use the rotation-based SUMROWVEC and SUMCOLVEC procedures from [ 5 ]. Later in the algorithm (starting from step 9), the solution switches to single-integer ciphertexts for X and the vectors and matrices derived from X and y .…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We denote this as packed-matrix encoding . All matrix products in steps 2 through 8 of Algorithm 3 use the rotation-based SUMROWVEC and SUMCOLVEC procedures from [ 5 ]. Later in the algorithm (starting from step 9), the solution switches to single-integer ciphertexts for X and the vectors and matrices derived from X and y .…”
Section: Methodsmentioning
confidence: 99%
“…The first stage, the estimation of θ,θ , was widely addressed in the literature, in particular in the iDASH'17 secure genome analysis competition [4][5][6][7][8].…”
Section: Semi-parallel Approach Of Sikorska Et Al [3]mentioning
confidence: 99%
“…At the expense of this bit accuracy, HEAAN supports very fast arithmetic operations on word-sized encrypted data. is fast computation speed allows HEAAN to be used in many fields such as machine learning and machine control [17,18]. In addition, unlike TFHE, HEAAN has the advantage of providing a complete SIMD function.…”
Section: Heaan Heaan's Ciphertext Can Contain Multiplementioning
confidence: 99%
“…Since IRs might leak training data information [1,9], they are mostly protected by additively homomorphic encryption (HE) [20,29] and secure multi-party computation (MPC) [27] in existing VFL, thanks to the sufficient computation power and network bandwidth of enterprise-level participants. In addition, given by the similar settings and assumptions, most existing VFL algorithms follow traditional privacypreserving multi-party machine learning methods [36,4,18,3,8], by applying Taylor approximation to the loss functions, so that HE can be adopted to protect the calculation of polynomial tasks in VFL's joint training.…”
Section: Introductionmentioning
confidence: 99%