Privacy preserving n-party scalar product protocol

by   Florian van Daalen, et al.

Privacy-preserving machine learning enables the training of models on decentralized datasets without the need to reveal the data, both on horizontal and vertically partitioned data. However, it relies on specialized techniques and algorithms to perform the necessary computations. The privacy preserving scalar product protocol, which enables the dot product of vectors without revealing them, is one popular example for its versatility. Unfortunately, the solutions currently proposed in the literature focus mainly on two-party scenarios, even though scenarios with a higher number of data parties are becoming more relevant. For example when performing analyses that require counting the number of samples which fulfill certain criteria defined across various sites, such as calculating the information gain at a node in a decision tree. In this paper we propose a generalization of the protocol for an arbitrary number of parties, based on an existing two-party method. Our proposed solution relies on a recursive resolution of smaller scalar products. After describing our proposed method, we discuss potential scalability issues. Finally, we describe the privacy guarantees and identify any concerns, as well as comparing the proposed method to the original solution in this aspect.


page 1

page 2

page 3

page 4


ABG: A Multi-Party Mixed Protocol Framework for Privacy-Preserving Cooperative Learning

Cooperative learning, that enables two or more data owners to jointly tr...

A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"

Privacy-preserving scalar product (PPSP) protocols are an important buil...

VertiBayes: Learning Bayesian network parameters from vertically partitioned data with missing values

Federated learning makes it possible to train a machine learning model o...

Secure Evaluation of Knowledge Graph Merging Gain

Finding out the differences and commonalities between the knowledge of t...

Highly Scalable Beaver Triple Generator from Additive-only Homomorphic Encryption

In a convolution neural network, a composition of linear scalar product,...

Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext

Using the computational resources of an untrusted third party to crack a...

A Practical Scheme for Two-Party Private Linear Least Squares

Privacy-preserving machine learning is learning from sensitive datasets ...

Please sign up or login with your details

Forgot password? Click here to reset