HEaaN-ID3: Fully Homomorphic Privacy-Preserving ID3-Decision Trees Using CKKS

Dain Lee, Hojune Shin, Jihyeon Choi, Younho Lee

Research output: Contribution to journalArticlepeer-review

Abstract

In this study, we investigated privacy-preserving ID3 Decision Tree (PPID3) training and inference based on fully homomorphic encryption (FHE), which has not been actively explored due to the high computational cost associated with managing numerous child nodes in an ID3 tree. We propose HEaaN-ID3, a novel approach to realize PPID3 using the Cheon-Kim-Kim-Song (CKKS) scheme. HEaaN-ID3 is the first FHE-based ID3 framework that completes both training and inference without any intermediate decryption, which is especially valuable when decryption keys are inaccessible or a single-cloud security domain is assumed. To enhance computational efficiency, we adopt a modified Gini impurity (MGI) score instead of entropy to evaluate information gain, thereby avoiding costly inverse operations. In addition, we fully leverage the Single Instruction Multiple Data (SIMD) property of CKKS to parallelize computations at multiple tree nodes. Unlike previous approaches that require decryption at each node or rely on two-party secure computation, our method enables a fully non-interactive training and inference pipeline in the encrypted domain. We validated the proposed scheme using UCI datasets with both numerical and nominal features, demonstrating inference accuracy comparable to plaintext implementations in Scikit-Learn. Moreover, experiments show that HEaaN-ID3 significantly reduces training and inference time per node relative to earlier FHE-based approaches.

Original languageEnglish
Pages (from-to)3673-3705
Number of pages33
JournalComputers, Materials and Continua
Volume84
Issue number2
DOIs
StatePublished - 2025

Keywords

  • Homomorphic encryption
  • applied cryptography
  • information security
  • privacy preserving machine learning

Fingerprint

Dive into the research topics of 'HEaaN-ID3: Fully Homomorphic Privacy-Preserving ID3-Decision Trees Using CKKS'. Together they form a unique fingerprint.

Cite this