Abstract
This paper considers a scenario where two parties having private databases wish to cooperate by computing a data mining algorithm on the union of their databases without revealing any unnecessary information. In particular, they want to apply the decision tree learning algorithm ID3 in a privacy preserving manner. Lindell and Pinkas (2002) have presented a protocol for this purpose, which enjoys a formal proof of privacy and is considerably more efficient than generic solutions. The crucial point of their protocol is the approximation of the logarithm function by a truncated Taylor series. The present paper improves this approximation by using a suitable Chebyshev expansion. This approach results in a considerably more efficient new version of the protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Algesheimer, J., Camenisch, J.L., Shoup, V.: Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 417–432. Springer, Heidelberg (2002)
Bulirsch, R., Stoer, J.: Darstellung von Funktionen in Rechenautomaten. In: Sauer, R., Szabó, I. (eds.) Mathematische Hilfsmittel des Ingenieurs. Grundlehren der mathematischen Wissenschaften, vol. 141, pp. 352–446. Springer, Berlin (1968)
Catalano, D.: Efficient distributed computation modulo a shared secret. In: Catalano, D., Cramer, R., Damgård, I., Di Crescenco, G., Pointcheval, D., Takagi, T. (eds.) Contemporary Cryptology. Advanced Courses in Mathematics, CRM Barcelona, pp. 1–39. Birkhäuser, Basel (2005)
Du, W., Zhan, Z.: Bulding decision tree classifier on private data. In: Proceedings of the IEEE International Conference on Data Mining (ICDM), Workshop on Privacy, Security and Data Mining, Maebashi City, Japan (2002)
Gennaro, R., Rabin, M.O., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Coan, B., Afek, Y. (eds.) Proceedings of the 17th ACM Symposium on Principles of Distributed Computing (PODC 1998), pp. 101–111. ACM Press (1998)
Kiltz, E., Leander, G., Malone-Lee, J.: Secure Computation of the Mean and Related Statistics. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 283–302. Springer, Heidelberg (2005)
Koschuch, M., Hudler, M., Krüger, M., Lory, P., Wenzl, J.: Optimizing cryptographic threshold schemes for the use in wireless sensor networks. In: Obaidat, M.S., Sevillano, J.L., Ortega, E.C. (eds.) Proceedings of DCNET 2011 – International Conference on Data Communication Networking, Seville, Spain, pp. 75–78 (2011)
Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology 15, 177–206 (2002)
Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. Journal of Privacy and Confidentiality 1(1), 59–98 (2009)
Lory, P.: Reducing the complexity in the distributed multiplication protocol of two polynomially shared values. In: Proceedings of the 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS 207), vol. 1 of AINA 2007, pp. 404–408. IEEE Computer Society (2007)
Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman & Hall/CRC, Boca Raton (2003)
Mitchell, T.M.: Machine Learning. McGraw-Hill, New York (1997)
Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Vitter, J.S., Larmore, L., Leighton, T. (eds.) Proceedings of the 31st ACM Symposium on Theory of Computing (STOC 1999), pp. 245–254. ACM Press (1999)
Naor, M., Pinkas, B.: Oblivious polynomial evaluation. SIAM Journal on Computing 35(5), 1254–1281 (2006)
Pinkas, B.: Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explorations Newsletter 4(2), 12–19 (2003)
Quinlan, J.R.: Introduction to decision trees. Machine Learning 1(1), 81–106 (1986)
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14, 1–37 (2008)
Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th Symposium on Foundations of Computer Science (FOCS), pp. 162–167. IEEE (1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lory, P. (2012). Enhancing the Efficiency in Privacy Preserving Learning of Decision Trees in Partitioned Databases. In: Domingo-Ferrer, J., Tinnirello, I. (eds) Privacy in Statistical Databases. PSD 2012. Lecture Notes in Computer Science, vol 7556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33627-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-33627-0_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33626-3
Online ISBN: 978-3-642-33627-0
eBook Packages: Computer ScienceComputer Science (R0)