Skip to main navigation Skip to search Skip to main content

Securing Decision Tree Inference Using Order-Preserving Cryptography

    • Center for Cyber-Physical Systems
    • Technology Innovation Institute

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations

    Abstract

    In machine learning (ML) inference, two parties, Alice and Bob, are engaged in a transaction where Alice is the owner of a decision tree model but does not want to reveal its parameters to Bob, who has private data. Bob wants to use Alice's model for inference, but does not want to reveal his data. Knowing the heavy computational cost of fully homomorphic encryption, Alice and Bob agree to use order-preserving encryption (OPE) for running the inference engine in full confidence without revealing either the decision tree model or the private data. In this paper, we describe how such an OPE computation is established between Alice and Bob. Specifically, we demonstrate how to secure full confidentiality in decision tree inference on an FPGA accelerator embodying an OPE protocol. A finite-state machine design of the encrypted decision tree is evaluated for throughput and resource utilization on an Intel Cyclone V FPGA using the MNIST dataset.

    Original languageBritish English
    Title of host publicationAICAS 2023 - IEEE International Conference on Artificial Intelligence Circuits and Systems, Proceeding
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Electronic)9798350332674
    DOIs
    StatePublished - 2023
    Event5th IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2023 - Hangzhou, China
    Duration: 11 Jun 202313 Jun 2023

    Publication series

    NameAICAS 2023 - IEEE International Conference on Artificial Intelligence Circuits and Systems, Proceeding

    Conference

    Conference5th IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2023
    Country/TerritoryChina
    CityHangzhou
    Period11/06/2313/06/23

    Fingerprint

    Dive into the research topics of 'Securing Decision Tree Inference Using Order-Preserving Cryptography'. Together they form a unique fingerprint.

    Cite this