2021
DOI: 10.48550/arxiv.2105.07612
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

PPCA: Privacy-preserving Principal Component Analysis Using Secure Multiparty Computation(MPC)

Abstract: Privacy-preserving data mining has become an important topic. People have built several multi-party-computation (MPC)-based frameworks to provide theoretically guaranteed privacy, the poor performance of real-world algorithms have always been a challenge. Using Principal Component Analysis (PCA) as an example, we show that by considering the unique performance characters of the MPC platform, we can design highly effective algorithm-level optimizations, such as replacing expensive operators and batching up. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 47 publications
0
4
0
Order By: Relevance
“…Similiar to other main-stream privacy-preserving applications [45,46,47], we define our security model as honestmajority and semi-honest model [48] for practical performance. The above model assumes that during the ciphertext computation, no more than a half computation servers are corrupted together ( < 2 ) and the corrupted servers will follow the agreed protocol while try to learn as much information as possible about the others.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Similiar to other main-stream privacy-preserving applications [45,46,47], we define our security model as honestmajority and semi-honest model [48] for practical performance. The above model assumes that during the ciphertext computation, no more than a half computation servers are corrupted together ( < 2 ) and the corrupted servers will follow the agreed protocol while try to learn as much information as possible about the others.…”
Section: Security Analysismentioning
confidence: 99%
“…To make MPC general (i.e., to support arbitrary functions), researchers and engineers have proposed so-called general-purpose MPC platforms, which offers a series of basic secure operations like secure addition, subtraction, multiplication, comparison which can be composed together to support complex functions like square-root and division and more advanced functions like machine-learning functions (e.g., secure principal component analysis [47]). All the secure basic operations are cryptographic protocols among the computation servers and preserve the privacy of the secret input during the computation.…”
Section: A Secure Multi Party Computationmentioning
confidence: 99%
“…Note that PrivPy does not make a theoretical breakthrough in cryptographic protocols but instead building a practical system that enables elegant ML programming on mixed MPC frameworks and makes the right tradeoffs between efficiency and security. As a follow-up work of PrivPy, Fan et al [171] focus on the privacy-preserving principal component analysis (PCA) via demonstrating an end-to-end optimization of a data mining algorithm to run on the mixed-protocol MPC framework. To further improve the efficiency, CRYPTGPU [172] is proposed to accelerate the mixed-protocol MPC computation via GPU.…”
Section: Mixed-protocol Approachmentioning
confidence: 99%
“…Data randomly moves in this manner from high-dimensional to low-dimensional space [23]. In the geometric perturbation approach, perturbation is performed using a mixture of several techniques, including rotation transformation, translation transformation, and adding random value [24]- [26].…”
Section: Introductionmentioning
confidence: 99%