Paper 2023/852

Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification

Kelong Cong, Zama
Robin Geelen, KU Leuven
Jiayi Kang, KU Leuven
Jeongeun Park, Norwegian University of Science and Technology
Abstract

An oblivious Top-k algorithm selects the k smallest elements from d elements while ensuring the sequence of operations and memory accesses do not depend on the input. In 1969, Alekseev proposed an oblivious Top- algorithm with complexity , which was later improved by Yao in 1980 for small . In this paper, we revisit the literature on oblivious Top- and propose another improvement of Alekseev's method that outperforms both for large . Our construction is equivalent to applying a new truncation technique to Batcher's odd-even sorting algorithm. In addition, we propose a combined network to take advantage of both Yao's and our technique that achieves the best concrete performance, in terms of the number of comparators, for any . To demonstrate the efficiency of our combined Top- network, we implement a secure non-interactive -nearest neighbors classifier using homomorphic encryption as an application. Compared with the work of Zuber and Sirdey (PoPETS 2021) where oblivious Top- was realized with complexity , our experimental results show a speedup of up to 47 times (not accounting for difference in CPU) for .

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Minor revision. SAC 2024
Keywords
Top-k selectionHomomorphic encryptionMachine learningk-nearest neighborsSorting networksTFHE
Contact author(s)
kelong cong @ zama ai
robin geelen @ esat kuleuven be
jiayi kang @ esat kuleuven be
jeongeun park @ ntnu no
History
2024-08-06: last of 2 revisions
2023-06-06: received
See all versions
Short URL
https://ia.cr/2023/852
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/852,
      author = {Kelong Cong and Robin Geelen and Jiayi Kang and Jeongeun Park},
      title = {Revisiting Oblivious Top-$k$ Selection with Applications to Secure $k$-{NN} Classification},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/852},
      year = {2023},
      url = {https://eprint.iacr.org/2023/852}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.