Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200115-9.doi: 10.11896/jsjkx.241200115

• Information Security • Previous Articles     Next Articles

Design and Application of Decision Tree Algorithms for Privacy-preserving

LI Jincheng, LI Yingna, FU Guoqing   

  1. School of Information Engineering and Automation,Kunming University of Science and Technology,Kunming 650500,China
    Yunnan Provincial Key Laboratory of Computer Technology Application,Kunming 650500,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    Major Science and Technology Project of Yunnan(202302AD080002,202402AD080003).

Abstract: In the digital era,data has emerged as a critical asset.Data sharing not only fuels advancements in the artificial intelligence sector,but also poses the threat of privacy violations.Fully Homomorphic Encryption(FHE) technology offers a secure solution for executing various machine learning algorithms on encrypted data,bypassing the risks associated with data exposure.Nonetheless,operations on encrypted data demand a significant computational overhead,prompting the need for algorithms to be redesigned with FHE optimization in mind.This paper introduces a novel privacy-preserving decision tree scheme based on the CKKS fully homomorphic encryption algorithm.It utilizes a low-degree approximate step function and a lightweight interaction protocol to supplant complex nonlinear operations,enabling the training and inference of decision trees directly on encrypted data.Extensive experiments on four benchmark UCI datasets reveal that the proposed scheme achieves an average AUC of 0.92 and an average F1-Score of 0.77,outperforming both the PrivaTree and SecDT schemes while also exhibiting greater stability.

Key words: Fully homomorphic encryption, Privacy-preserving, Decision tree

CLC Number: 

  • TP311
[1]OLINDER N,FEDYAKIN K,KORNEEVA E.Personal dataprotection in the internet of things [C]//Proceedings of the 1st International Scientific Conference Legal Regulation of the Digital Economy and Digital Relations:Problems and Prospects of Development.New York,USA:Atlantis Press,2021:227-232.
[2]ZHANG J,CHEN B,ZHAO Y,et al.Data security and privacy-preserving in edge computing paradigm:Survey and open issues [J].IEEE Access,2018,6:18209-18237.
[3]SACHDEV A,BHANSALI M.Enhancing cloud computing security using AES algorithm [J].International Journal of Computer Applications,2013,67(9):19-23.
[4]BRAKERSKI Z.Fully homomorphic encryption without modulus switching from classical GapSVP [C]//Annual Cryptology Conference.Heidelberg,Germany:Springer,2012:868-886.
[5]CHEON J H,KIM A,KIM M,et al.Homomorphic encryption for arithmetic of approximate numbers [C]//Advances in Cryptology-ASIACRYPT 2017.Heidelberg,Germany:Springer International Publishing,2017:409-437.
[6]MASAHIRO Y.Fully Homomorphic encryption without bootstrapping [M].Saarbrücken,Germany:LAP LAMBERT Academic Publishing,2015.
[7]FAN J,VERCAUTEREN F.Somewhat practical fully homo-morphic encryption [EB/OL].[2012-03-22].https://ia.cr/2012/144.
[8]ALLOGHANI M,ALANI M M,AL-JUMEILY D,et al.A systematic review on the status and progress of homomorphic encryption technologies [J].Journal of Information Security and Applications,2019,48:102362.
[9]CHEN H,GILAD-BACHRACH R,HAN K,et al.Logistic regression over encrypted data from fully homomorphic encryption [J].BMC Medical Genomics,2018,11(4):3-12.
[10]CROCKETT E.A low-depth homomorphic circuit for logisticregression model training [EB/OL].[2024-05-01].https://ia.cr/2020/1483.
[11]GILAD-BACHRACH R,DOWLIN N,LAINE K,et al.Cryp-tonets:Applying neural networks to encrypted data with high throughput and accuracy [C]//International Conference on Machine Learning.New York,USA:PMLR,2016:201-210.
[12]BOST R,POPA R A,TU S,et al.Machine learning classification over encrypted data [EB/OL].[2015-01-12].https://ia.cr/2014/331.
[13]COCK M D,DOWSLEY R,HORST C,et al.Efficient and pri-vate scoring of decision trees,support vector machines and logistic regression models based on pre-computation[J].IEEE Transactions on Dependable and Secure Computing,2019,16(2):217-230.
[14]ZHAO J,ZHU H,WANG F,et al.Efficient and privacy-preserving tree-based inference via additive homomorphic encryption [J].Information Sciences,2023,650:119480.
[15]TUENO A,BOEV Y,KERSCHBAUM F.Non-interactive private decision tree evaluation [C]//34th Annual IFIP WG 11.3 Conference.Berlin,Germany:Springer International Publishing,2020:174-194.
[16]XU K,TAN B H M,WANG L P,et al.Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption [J].Journal of Information Security and Applications,2023,77:103582.
[17]TUENO A,KERSCHBAUM F,KATZENBEISSER S.Private evaluation of decision trees using sublinear cost [J].Proceedings on Privacy Enhancing Technologies,2019(1):266-286.
[18]LU W J,ZHOU J J,SAKUMA J.Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption [C]//Proceedings of the 2018 on Asia Conference on Computer and Communications Security.New York,USA:ACM,2018:67-74.
[19]HAN Z,GE C,WU B,et al.Privet:A privacy-preserving federated incremental decision trees [J].IEEE Transactions on Ser-vices Computing,2023,16(3):1964-1975.
[20]ZHENG Y,XU S,WANG S,et al.Privet:A privacy-preserving vertical federated learning service for gradient boosted decision tables [J].IEEE Transactions on Services Computing,2023,16(5):3604-3620.
[21]YAMAMOT F,OZAWA S,WANG L.eFL-Boost:Efficientfederated learning for gradient boosting decision trees [J].IEEE Access,2022,10:43954-43963.
[22]ZHAO J,ZHU H,XU W,et al.SGBoost:An efficient and priva-cy-preserving vertical federated tree boosting framework [J].IEEE Transactions on Information Forensics and Security,2023,18:1022-1036.
[23]BLATT M,GUSEV A,POLYAKOV Y,et al.Optimized homomorphic encryption solution for secure genome-wide association studies [J].BMC Medical Genomics,2020,13(7):83.
[24]BOURA C,GAMA N,GEORGIEVA M,et al.Chimera:Combining ring-lwe-based fully homomorphic encryption schemes [J].Journal of Mathematical Cryptology,2020,14(1):316-338.
[25]EL ZEIN Y,LEMAY M,HUGUENIN K.PrivaTree:Collabora-tive privacy-preserving training of decision trees on biomedical data [J].IEEE/ACM Transactions on Computational Biology and Bioinformatics,2023,21(1):1-13.
[26]CHEN Y C,CHANG C C,HUNG C C,et al.SecDT:privacy-preserving outsourced decision tree classification without polynomial forms in edge-cloud computing [J].IEEE Transactions on Signal and Information Processing over Networks,2022,8:1037-1048.
[1] HAN Yingmei, LI Bin, LI Kun, ZHOU Qinglei, YU Shiliang. Efficient Hardware Implementation of Pipelined NTT for Dynamic Rotation Factor Generation [J]. Computer Science, 2025, 52(9): 160-169.
[2] JIANG Wenhui, YE Jianhong, GAO Lingting, HUANG Yifan. Fairness-enhancing Decision Tree Algorithm [J]. Computer Science, 2025, 52(11A): 241200119-9.
[3] HE Yuyu, ZHOU Feng, TIAN Youliang, XIONG Wei, WANG Shuai. Lightweight Privacy-preserving Mobile Sensing Classification Framework Based on AddictiveSecret Sharing [J]. Computer Science, 2025, 52(11): 415-424.
[4] LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8.
[5] WANG Chengzhang, BAI Xiaoming, TANG Wenying, CHEN Shuhan. Evolutionary CatBoost Based Housing Price Prediction Model [J]. Computer Science, 2024, 51(11A): 240300180-5.
[6] ZENG Congai, LIU Yali, CHEN Shuyi, ZHU Xiuping, NING Jianting. Multi-type K-nearest Neighbor Query Scheme with Mutual Privacy-preserving in Road Networks [J]. Computer Science, 2024, 51(11): 400-417.
[7] KE Haiping, MAO Yijun, GU Wanrong. Recommendation Model Based on Decision Tree and Improved Deep & Cross Network [J]. Computer Science, 2023, 50(6A): 220300084-7.
[8] SHI Liang, WEN Liangming, LEI Sheng, LI Jianhui. Virtual Machine Consolidation Algorithm Based on Decision Tree and Improved Q-learning by Uniform Distribution [J]. Computer Science, 2023, 50(6): 36-44.
[9] ZHANG Zelun, YANG Zhibin, LI Xiaojie, ZHOU Yong, LI Wei. Machine Learning Based Environment Assumption Automatic Generation for Compositional Verification of SCADE Models [J]. Computer Science, 2023, 50(6): 297-306.
[10] ZHAO Min, TIAN Youliang, XIONG Jinbo, BI Renwan, XIE Hongtao. Neural Network Model Training Method Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(5): 372-381.
[11] ZHANG Lianfu, TAN Zuowen. Federated Learning Privacy-preserving Approach for Multimodal Medical Data [J]. Computer Science, 2023, 50(11A): 230800021-8.
[12] CHEN Depeng, LIU Xiao, CUI Jie, HE Daojing. Survey of Membership Inference Attacks for Machine Learning [J]. Computer Science, 2023, 50(1): 302-317.
[13] LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325.
[14] LI Li, HE Xin, HAN Zhi-jie. Review of Privacy-preserving Mechanisms in Crowdsensing [J]. Computer Science, 2022, 49(5): 303-310.
[15] QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!