pith. sign in

arxiv: 1801.07301 · v2 · pith:4LUIM3RXnew · submitted 2018-01-22 · 💻 cs.DS · cs.CG· cs.CR

Secure k-ish Nearest Neighbors Classifier

classification 💻 cs.DS cs.CGcs.CR
keywords classifierneighborsnearestcoin-tossdatabaseimplementedk-ishprobability
0
0 comments X p. Extension
pith:4LUIM3RX Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{4LUIM3RX}

Prints a linked pith:4LUIM3RX badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

In machine learning, classifiers are used to predict a class of a given query based on an existing (classified) database. Given a database S of n d-dimensional points and a d-dimensional query q, the k-nearest neighbors (kNN) classifier assigns q with the majority class of its k nearest neighbors in S. In the secure version of kNN, S and q are owned by two different parties that do not want to share their data. Unfortunately, all known solutions for secure kNN either require a large communication complexity between the parties, or are very inefficient to run. In this work we present a classifier based on kNN, that can be implemented efficiently with homomorphic encryption (HE). The efficiency of our classifier comes from a relaxation we make on kNN, where we allow it to consider kappa nearest neighbors for kappa ~ k with some probability. We therefore call our classifier k-ish Nearest Neighbors (k-ish NN). The success probability of our solution depends on the distribution of the distances from q to S and increase as its statistical distance to Gaussian decrease. To implement our classifier we introduce the concept of double-blinded coin-toss. In a doubly-blinded coin-toss the success probability as well as the output of the toss are encrypted. We use this coin-toss to efficiently approximate the average and variance of the distances from q to S. We believe these two techniques may be of independent interest. When implemented with HE, the k-ish NN has a circuit depth that is independent of n, therefore making it scalable. We also implemented our classifier in an open source library based on HELib and tested it on a breast tumor database. The accuracy of our classifier (F_1 score) were 98\% and classification took less than 3 hours compared to (estimated) weeks in current HE implementations.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Lightweight, Practical Encrypted Face Recognition with GPU Support

    cs.CR 2026-04 unverdicted novelty 5.0

    BSGS-Diagonal and fused GPU kernels reduce memory and computation for FHE-based face recognition, enabling sub-second encrypted matching on databases up to 32K entries with 91% fewer rotation keys.