Journal on Communications ›› 2021, Vol. 42 ›› Issue (5): 137-148.doi: 10.11959/j.issn.1000-436x.2021089

• Papers • Previous Articles     Next Articles

BCP-based joint delegation learning model and protocol

Sheng GAO1,2, Kang XIANG1,3, Youliang TIAN1,3, Weijie TAN1, Tao FENG4, Xiaoxue WU5   

  1. 1 State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China
    2 School of Information, Central University of Finance and Economics, Beijing 100081, China
    3 Institute of Cryptography and Data Security, Guizhou University, Guiyang 550025, China
    4 School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
    5 Institute for Metrology and Calibration of Guizhou, Guiyang 550000, China
  • Revised:2021-03-26 Online:2021-05-25 Published:2021-05-01
  • Supported by:
    The National Natural Science Foundation of China(61662009);The National Natural Science Foundation of China(61772008);The National Natural Science Foundation of China(U1836205);The National Natural Science Foundation of China(62072487);Science and Technology Major Support Program of Guizhou Province(20183001);Science and Technology Program of Guizhou Province([2019]1098);Science and Technology Program of Guizhou Province([2019]5703);Project of High-level Innovative Talents of Guizhou Province([2020]6008);Research Project of Guizhou University for Talent Introduction([2020]61);Cultivation Project of Guizhou University([2019]56)

Abstract:

In order to realize data security sharing and reduce the computing costs of clients in data mining process, a joint delegation learning model and protocol based on BCP homomorphic encryption algorithm was proposed.Firstly, a privacy preserving method based on false records was proposed for the security of decision tree model.Secondly, in view of the vertical and horizontal distribution of data, the corresponding delegation learning protocols based on privacy preserving delegation dot product algorithm and privacy preserving delegation entropy algorithm was proposed.Finally, the security proof and the performance analysis of delegation learning protocols and decision tree model structure were given.The results show that the privacy protection method based on false records does not affect the final model construction, and the final model obtained by each client is the same as that constructed by real data.

Key words: delegation learning, decision tree, BCP homomorphic encryption, data mining

CLC Number: 

No Suggested Reading articles found!