Acknowledgements
This research was part of the collaboration between IBM Research and Banco Bradesco SA to in-
vestigate the feasibility of utilizing homomorphic encryption technology to protect and preserve the
privacy and confidentiality of financial data utilized in machine learning based predictive modeling.
The views and conclusions contained in this document are those of the authors and should not be
interpreted as representing the official policies, either expressed or implied, of Banco Bradesco SA.
References
1. Archer, D., Chen, L., Cheon, J.H., Gilad-Bachrach, R., Hallman, R.A., Huang, Z., Jiang, X., Kumaresan, R.,
Malin, B.A., Sofia, H., Song, Y., Wang, S.: Applications of homomorphic encryption. Tech. rep., Homomorphi-
cEncryption.org (July 2017)
2. Bergamaschi, F., Halevi, S., Halevi, T.T., Hunt, H.: Homomorphic training of 30, 000 logistic regression models.
In: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia,
June 5-7, 2019, Proceedings. pp. 592–611 (2019)
3. Blatt, M., Gusev, A., Polyakov, Y., Rohloff, K., Vaikuntanathan, V.: Optimized homomorphic encryption solution
for secure genome-wide association studies. IACR Cryptology ePrint Archive 2019, 223 (2019)
4. Bonte, C., Vercauteren, F.: Privacy-preserving logistic regression training. BMC Medical Genomics 11((Suppl
4)) (2018)
5. Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (leveled) fully homomorphic encryption without bootstrapping.
ACM Transactions on Computation Theory 6(3), 13:1–13:36 (2014)
6. Brutzkus, A., Gilad-Bachrach, R., Elisha, O.: Low latency privacy preserving inference. In: Proceedings of the
36th International Conference on Machine Learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA.
pp. 812–821 (2019)
7. Bubeck, S.: ORF523: Nesterov’s accelerated gradient descent. https://blogs.princeton.edu/imabandit/2013/
04/01/acceleratedgradientdescent, accessed January 2019 (2013)
8. Chen, H., Gilad-Bachrach, R., Han, K., Huang, Z., Jalali, A., Laine, K., Lauter, K.: Logistic regression over
encrypted data from fully homomorphic encryption. BMC Medical Genomics 11((Suppl 4)) (2018)
9. Cheon, J.H., Kim, A., Kim, M., Song, Y.S.: Homomorphic encryption for arithmetic of approximate numbers. In:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of
Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. pp. 409–437
(2017)
10. Crawford, J.L.H., Gentry, C., Halevi, S., Platt, D., Shoup, V.: Doing real work with FHE: the case of logistic re-
gression. In: Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography,
WAHC@CCS 2018, Toronto, ON, Canada, October 19, 2018. pp. 1–12 (2018)
11. Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves. In: Machine Learning, Pro-
ceedings of the Twenty-Third International Conference (ICML 2006), Pittsburgh, Pennsylvania, USA, June 25-29,
2006. pp. 233–240 (2006)
12. Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive
2012, 144 (2012)
13. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Sympo-
sium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009. pp. 169–178 (2009)
14. Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K.E., Naehrig, M., Wernsing, J.: Cryptonets: Applying neu-
ral networks to encrypted data with high throughput and accuracy. In: Proceedings of the 33nd International
Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016. pp. 201–210 (2016)
15. Halevi, S., Shoup, V.: HElib - An Implementation of homomorphic encryption. https://github.com/homenc/
HElib (Accessed August 2019)
16. Han, K., Hong, S., Cheon, J.H., Park, D.: Efficient logistic regression on large encrypted data. IACR Cryptology
ePrint Archive 2018, 662 (2018)
17. Hastie, T., Friedman, J.H., Tibshirani, R.: The Elements of Statistical Learning: Data Mining, Inference, and
Prediction. Springer Series in Statistics, Springer (2001)
18. iDASH: Integrating Data for Analysis, Anonymization and SHaring (iDASH). http://www.humangenomeprivacy.
org
19