sifier models. Classifier error rate is the percentage
of miss-predictions reported to the total number of
predictions. As we can observe the introduction of
a second step after the linear classifier allows to de-
crease the error rate by at least 6 percentage points.
Using 20 intermediate inner products allows further-
more to decrease the percentage of miss-predictions
by ≈ 2.5%. In contrast using 30 intermediate inner
products instead of 20 increase the performance by
less than 0.5%. We suppose that using different num-
ber of “artificial” sub-classes for each digit will allow
to obtain better results.
5 CONCLUSION AND FUTURE
WORK
In this work we have used an instantiation of an inner-
product functional encryption scheme in order to per-
form classification over encrypted data. The learning
process is kept secret and only linear classifiers coeffi-
cients are shared with the authority. In the protocol we
introduce, we have a trusted authority, some servers
computing classifications and the users who encrypt
their data. Obtained execution times are reasonably
small (a prediction is made in approximatively 69 sec-
onds without any parallelization) just like the size of
the ciphertexts. We have studied a method for ensur-
ing that we cannot find the original image from the
inner product values. In perspective, we consider to
study more deeply the information leakage of inner
product encryption schemes used in classification and
to propose methods to lower it. We also consider to
improve our implementation (with elliptic curve for
example) in order to have smaller sizes.
REFERENCES
Abdalla, M., Bourse, F., De Caro, A., and Pointcheval,
D. (2015). Simple functional encryption schemes for
inner products. In IACR International Workshop on
Public Key Cryptography, pages 733–751. Springer.
Agrawal, S., Libert, B., and Stehl
´
e, D. (2015). Fully secure
functional encryption for inner products, from stan-
dard assumptions.
Bishop, A., Jain, A., and Kowalczyk, L. (2015). Function-
hiding inner product encryption. In International Con-
ference on the Theory and Application of Cryptology
and Information Security, pages 470–491. Springer.
Boneh, D. (1998). The decision diffie-hellman problem.
In International Algorithmic Number Theory Sympo-
sium, pages 48–63. Springer.
Boneh, D., Sahai, A., and Waters, B. (2011). Functional
encryption: Definitions and challenges. In Theory of
Cryptography Conference, pages 253–273. Springer.
Bottou, L., Cortes, C., Denker, J. S., Drucker, H., Guyon,
I., Jackel, L. D., LeCun, Y., Muller, U. A., Sackinger,
E., Simard, P., et al. (1994). Comparison of classifier
methods: a case study in handwritten digit recogni-
tion. In International conference on pattern recogni-
tion, pages 77–77. IEEE Computer Society Press.
Brakerski, Z. and Segev, G. (2015). Function-private
functional encryption in the private-key setting. In
Theory of Cryptography Conference, pages 306–324.
Springer.
Dietterich, T. G. (2000). Ensemble methods in machine
learning. In International workshop on multiple clas-
sifier systems, pages 1–15. Springer.
Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A.,
and Waters, B. (2013). Candidate indistinguishabil-
ity obfuscation and functional encryption for all cir-
cuits. In Foundations of Computer Science (FOCS),
2013 IEEE 54th Annual Symposium on, pages 40–49.
IEEE.
Geurts, P., Ernst, D., and Wehenkel, L. (2006). Extremely
randomized trees. volume 63, pages 3–42. Springer.
Goldwasser, S., Kalai, Y., Popa, R. A., Vaikuntanathan, V.,
and Zeldovich, N. (2013). Reusable garbled circuits
and succinct functional encryption. In Proceedings of
the forty-fifth annual ACM symposium on Theory of
computing, pages 555–564. ACM.
Hart, W., Johansson, F., and Pancratz, S. (2013). FLINT:
Fast Library for Number Theory. Version 2.4.0,
http://flintlib.org.
ILOG, I. (2006). ILOG CPLEX: High-performance soft-
ware for mathematical programming and optimiza-
tion. http://www.ilog.com/products/cplex/.
LeCun, Y., Bottou, L., Bengio, Y., and Haffner, P. (1998).
Gradient-based learning applied to document recogni-
tion. volume 86, pages 2278–2324. IEEE.
LeCun, Y., Cortes, C., and Burges, C. J. The MNIST
Database. http://yann.lecun.com/exdb/mnist/.
Mangasarian, O. L., Wild, E. W., and Fung, G. M. (2008).
Privacy-preserving classification of vertically parti-
tioned data via random kernels. ACM Trans. Knowl.
Discov. Data, 2(3):12:1–12:16.
McCullagh, P. and Nelder, J. A. (1989). Generalized linear
models, volume 37. CRC press.
Safavian, S. R. and Landgrebe, D. A. (1991). A survey
of decision tree classifier methodology. volume 21,
pages 660–674.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based
encryption. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 457–473. Springer.
Shanks, D. (1971). Class number, a theory of factorization,
and genera. In Proc. Symp. Pure Math, volume 20,
pages 415–440.
Yang, Z., Zhong, S., and Wright, R. N. (2005). Privacy-
preserving classification of customer data without loss
of accuracy. In Proceedings of the 5th SIAM Interna-
tional Conference on Data Mining.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
430