Efficient homomorphic evaluation of <i>k</i>-NN classifiers

نویسندگان

چکیده

Abstract We design and implement an efficient, secure, homomorphic k-Nearest Neighbours determination algorithm, to be used for regression or classification over private data. Our algorithm runs in quadratic complexity with regard the size of database but is only one literature make secure completely non-interactively. show that our both efficient accurate when applied problems requiring a small set model vectors, still scales larger sets vectors high accuracy yet at greater (sequential) computational costs.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Evaluation of k-NN Queries Using Spatial Mashups

K-nearest-neighbor (k-NN) queries have been widely studied in time-independent and time-dependent spatial networks. In this paper, we focus on k-NN queries in time-dependent spatial networks where the driving time between two locations may vary significantly at different time of the day. In practice, it is costly for a database server to collect real-time traffic data from vehicles or roadside ...

متن کامل

Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE

In this paper, we introduce new methods to evaluate integer polynomials with GSW FHE. Our solution has much slower noise growth and per homomorphic integer multiplication cost, which is only O( (log k) w+1 kw·n ) percent of the original GSW scheme, where k is the input plaintext width, n is the LWE dimention, and ω = 2.373. Technically, we reduce the integer multiplication noise by performing t...

متن کامل

Efficient Integer Vector Homomorphic Encryption

Homomorphic Encryption yields deliberately malleable ciphertext, allowing operations on encrypted data. We outline and implement a homomorphic encryption scheme as suggested by Zhou and Wornell [1] that encrypts integer vectors to allow computation of arbitrary polynomials in the encrypted domain with a bounded degree. This finds applications particularly in cloud computation, when one is inter...

متن کامل

Hierarchical Cascade of Classifiers for Efficient Poselet Evaluation

Poselets [1] have been used in a variety of computer vision tasks, such as detection, segmentation, action classification, pose estimation and action recognition, often achieving state-of-the-art performance. Poselets are part classifiers trained to detect part of a human pose under a given viewpoint. Examples of poselet classifiers are a frontal face, a part of a face and left shoulder, or a h...

متن کامل

Depth Optimized Efficient Homomorphic Sorting

We introduce a sorting scheme which is capable of efficiently sorting encrypted data without the secret key. The technique is obtained by focusing on the multiplicative depth of the sorting circuit alongside the more traditional metrics such as number of comparisons and number of iterations. The reduced depth allows much reduced noise growth and thereby makes it possible to select smaller param...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2021

ISSN: ['2299-0984']

DOI: https://doi.org/10.2478/popets-2021-0020