Enhancing the efficiency in privacy preserving learning of decision trees in partitioned databases

作者: Peter Lory

DOI: 10.1007/978-3-642-33627-0_25

关键词:

摘要: This paper considers a scenario where two parties having private databases wish to cooperate by computing data mining algorithm on the union of their without revealing any unnecessary information. In particular, they want apply decision tree learning ID3 in privacy preserving manner. Lindell and Pinkas (2002) have presented protocol for this purpose, which enjoys formal proof is considerably more efficient than generic solutions. The crucial point approximation logarithm function truncated Taylor series. present improves using suitable Chebyshev expansion. approach results new version protocol.

参考文章(21)
Peter Lory, Jürgen Wenzl, Matthias Hudler, Michael Krüger, Manuel Koschuch, Optimizing cryptographic threshold schemes for the use in wireless sensor networks SciTePress - Science and Technology Publications. ,(2011)
Zhijun Zhan, Wenliang Du, Building decision tree classifier on private data CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14. pp. 1- 8 ,(2002)
Joy Algesheimer, Jan Camenisch, Victor Shoup, Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products Advances in Cryptology — CRYPTO 2002. pp. 417- 432 ,(2002) , 10.1007/3-540-45708-9_27
Moni Naor, Benny Pinkas, None, Oblivious Polynomial Evaluation SIAM Journal on Computing. ,vol. 35, pp. 1254- 1281 ,(2006) , 10.1137/S0097539704383633
Benny Pinkas, Cryptographic techniques for privacy-preserving data mining Sigkdd Explorations. ,vol. 4, pp. 12- 19 ,(2002) , 10.1145/772862.772865
Moni Naor, Benny Pinkas, Oblivious transfer and polynomial evaluation Proceedings of the thirty-first annual ACM symposium on Theory of computing - STOC '99. pp. 245- 254 ,(1999) , 10.1145/301250.301312
Rosario Gennaro, Michael O. Rabin, Tal Rabin, Simplified VSS and fast-track multiparty computations with applications to threshold cryptography principles of distributed computing. pp. 101- 111 ,(1998) , 10.1145/277697.277716
Lindell, Pinkas, Privacy Preserving Data Mining Journal of Cryptology. ,vol. 15, pp. 177- 206 ,(2002) , 10.1007/S00145-001-0019-2
Peter Lory, Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values advanced information networking and applications. ,vol. 1, pp. 404- 408 ,(2007) , 10.1109/AINAW.2007.307
Theodore J. Rivlin, The Chebyshev polynomials ,(1974)