TY - GEN
T1 - Efficient Secure Ridge Regression from Randomized Gaussian Elimination
AU - Blom, Frank
AU - Bouman, Niek J.
AU - Schoenmakers, Berry
AU - de Vreede, Niels
N1 - Publisher Copyright:
© 2021, Springer Nature Switzerland AG.
PY - 2021
Y1 - 2021
N2 - In this paper we present practical protocols for secure ridge regression. We develop the necessary secure linear algebra tools, using only basic arithmetic over prime fields. In particular, we will show how to solve linear systems of equations and compute matrix inverses efficiently, using appropriate secure random self-reductions of these problems. The distinguishing feature of our approach is that the use of secure fixed-point arithmetic is avoided entirely, while circumventing the need for secure rational reconstruction at any stage as well. In fact, in recent follow-up works, our results have already been applied and extended to several other settings. We demonstrate the potential of our protocols in a standard setting for information-theoretically secure multiparty computation, tolerating a dishonest minority of passively corrupt parties. Using the MPyC framework, which is based on threshold secret sharing over finite fields, we show how to handle large datasets efficiently, achieving practically the same root-mean-square errors as Scikit-learn. Moreover, our protocols are designed with the outsourcing scenario in mind, which makes our protocols much more versatile than existing solutions. In the outsourcing scenario one does not assume that (any part of) the dataset is held privately by any of the parties performing the multiparty computation—in contrast to federated learning, for instance, where the dataset is partitioned either horizontally or vertically between these parties.
AB - In this paper we present practical protocols for secure ridge regression. We develop the necessary secure linear algebra tools, using only basic arithmetic over prime fields. In particular, we will show how to solve linear systems of equations and compute matrix inverses efficiently, using appropriate secure random self-reductions of these problems. The distinguishing feature of our approach is that the use of secure fixed-point arithmetic is avoided entirely, while circumventing the need for secure rational reconstruction at any stage as well. In fact, in recent follow-up works, our results have already been applied and extended to several other settings. We demonstrate the potential of our protocols in a standard setting for information-theoretically secure multiparty computation, tolerating a dishonest minority of passively corrupt parties. Using the MPyC framework, which is based on threshold secret sharing over finite fields, we show how to handle large datasets efficiently, achieving practically the same root-mean-square errors as Scikit-learn. Moreover, our protocols are designed with the outsourcing scenario in mind, which makes our protocols much more versatile than existing solutions. In the outsourcing scenario one does not assume that (any part of) the dataset is held privately by any of the parties performing the multiparty computation—in contrast to federated learning, for instance, where the dataset is partitioned either horizontally or vertically between these parties.
UR - https://www.scopus.com/pages/publications/85111998404
U2 - 10.1007/978-3-030-78086-9_23
DO - 10.1007/978-3-030-78086-9_23
M3 - Conference contribution
AN - SCOPUS:85111998404
SN - 9783030780852
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 301
EP - 316
BT - Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings
A2 - Dolev, Shlomi
A2 - Margalit, Oded
A2 - Pinkas, Benny
A2 - Schwarzmann, Alexander
PB - Springer
T2 - 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021
Y2 - 8 July 2021 through 9 July 2021
ER -