{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:15:30Z","timestamp":1763723730047,"version":"3.45.0"},"reference-count":45,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Machine learning (ML) offers significant potential for disease prediction, clinical decision support, and medical data classification, but its reliance on sensitive patient data raises privacy and security concerns, particularly under strict healthcare regulations. Traditional encryption methods require data to be decrypted prior to computation, such as in ML workflows, thereby introducing risks of exposure and undermining data confidentiality. Homomorphic Encryption (HE) addresses this challenge by enabling computations directly on encrypted data, ensuring end-to-end privacy. This paper explores the integration of the Cheon-Kim-Kim-Song (CKKS) HE scheme into the inference phase of medical tabular data classification. We evaluate the performance of Logistic Regression (LR), Support Vector Machine (SVM), and a lightweight multilayer perceptron (MLP) under HE-based inference, and compare their classification accuracy, computational overhead, and latency against plaintext counterparts. Additionally, we propose two hybrid models (LR-MLP and SVM-MLP) to accelerate training convergence and enhance inference performance. Experimental results demonstrate that while HE-based inference introduces moderate computational cost and data transmission overheads, it maintains accuracy comparable to plaintext inference. These outcomes affirm the practical feasibility of HE for privacy-preserving machine learning in healthcare, while also highlighting key implementation trade-offs. Furthermore, the findings support the advancement of secure AI systems and promote the adoption of cryptographic techniques in digital health and other privacy-critical fields.<\/jats:p>","DOI":"10.3390\/a18120731","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:04:31Z","timestamp":1763723071000},"page":"731","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Classification of Medical Tabular Data with Homomorphic Encryption"],"prefix":"10.3390","volume":"18","author":[{"given":"Fairuz","family":"Haq","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Purdue University Fort Wayne, Fort Wayne, IN 46805, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7113-2211","authenticated-orcid":false,"given":"Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Purdue University Fort Wayne, Fort Wayne, IN 46805, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2771-2756","authenticated-orcid":false,"given":"Zesheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University Fort Wayne, Fort Wayne, IN 46805, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Alowais, S.A., Alghamdi, S.S., Alsuhebany, N., Alqahtani, T., Alshaya, A.I., Almohareb, S.N., Aldairem, A., Alrashed, M., Bin Saleh, K., and Badreldin, H.A. (2023). Revolutionizing healthcare: The role of artificial intelligence in clinical practice. BMC Med. Educ., 23.","DOI":"10.1186\/s12909-023-04698-z"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"e1490","DOI":"10.1002\/widm.1490","article-title":"Privacy-preserving data mining and machine learning in healthcare: Applications, challenges, and solutions","volume":"13","author":"Naresh","year":"2023","journal-title":"WIREs Data Min. Knowl. Discov."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"103605","DOI":"10.1016\/j.cose.2023.103605","article-title":"Preserving data privacy in machine learning systems","volume":"137","author":"Lenzini","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_4","unstructured":"Gentry, C. (June, January 31). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s10462-024-11076-8","article-title":"Approximate homomorphic encryption based privacy-preserving machine learning: A survey","volume":"58","author":"Yuan","year":"2025","journal-title":"Artif. Intell. Rev."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3394658","article-title":"Homomorphic encryption for machine learning in medicine and bioinformatics","volume":"53","author":"Wood","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1666","DOI":"10.1007\/s12083-021-01076-8","article-title":"Privacy-preserving neural networks with homomorphic encryption: Challenges and opportunities","volume":"14","author":"Tchernykh","year":"2021","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"117477","DOI":"10.1109\/ACCESS.2022.3219049","article-title":"A survey of deep learning architectures for privacy-preserving machine learning with fully homomorphic encryption","volume":"10","author":"Podschwadt","year":"2022","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., and Fei-Fei, L. (2009, January 20\u201325). ImageNet: A large-scale hierarchical image database. Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA.","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref_10","unstructured":"Raghu, M., Zhang, C., Kleinberg, J., and Bengio, S. (2019, January 8\u201314). Transfusion: Understanding transfer learning for medical imaging. Proceedings of the 33rd International Conference on Neural Information Processing Systems, Vancouver, BC, Canada."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1038\/s41597-022-01721-8","article-title":"MedMNIST v2\u2014A large-scale lightweight benchmark for 2D and 3D biomedical image classification","volume":"10","author":"Yang","year":"2023","journal-title":"Sci. Data"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"5261","DOI":"10.1007\/s10462-022-10304-3","article-title":"Explainable AI for clinical and remote health applications: A survey on tabular and time series data","volume":"56","author":"Delmastro","year":"2023","journal-title":"Artif. Intell. Rev."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Hager, P., Menten, M.J., and Rueckert, D. (2023, January 17\u201324). Best of both worlds: Multimodal contrastive learning with tabular and imaging data. Proceedings of the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Vancouver, BC, Canada.","DOI":"10.1109\/CVPR52729.2023.02291"},{"key":"ref_14","unstructured":"Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., and Wernsing, J. (2016, January 19\u201324). CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. Proceedings of the 33rd International Conference on Machine Learning, New York, NY, USA."},{"key":"ref_15","first-page":"1","article-title":"Privacy-preserving classification on deep neural network","volume":"35","author":"Chabanne","year":"2017","journal-title":"IACR Cryptol. Eprint Arch."},{"key":"ref_16","unstructured":"Brutzkus, A., Elisha, O., and Gilad-Bachrach, R. (2019). Low latency privacy preserving inference. arXiv."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","article-title":"Privacy-preserving machine learning with fully-homomorphic encryption for deep neural network","volume":"10","author":"Lee","year":"2022","journal-title":"IEEE Access"},{"key":"ref_18","unstructured":"McElfresh, D., Khandagale, S., Valverde, J., Prasad, C.V., Feuer, B., Hegde, C., Ramakrishnan, G., Goldblum, M., and White, C. (2023, January 10\u201316). When do neural nets outperform boosted trees on tabular data?. Proceedings of the 37th International Conference on Neural Information Processing Systems, New Orleans, LA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Chen, T., and Guestrin, C. (2016, January 13\u201317). XGBoost: A scalable tree boosting system. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA.","DOI":"10.1145\/2939672.2939785"},{"key":"ref_20","unstructured":"Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W., Ma, W., Ye, Q., and Liu, T.-Y. (2017, January 4\u20139). LightGBM: A highly efficient gradient boosting decision tree. Proceedings of the 31st Conference on Neural Information Processing Systems, Long Beach, CA, USA."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Cong, K., Das, D., Park, J., and Pereira, H.V.L. (2022, January 7\u201311). SortingHat: Efficient private decision tree evaluation via homomorphic encryption and transciphering. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3560702"},{"key":"ref_22","unstructured":"Mahdavi, R.A., Ni, H., Linkov, D., and Kerschbaum, F. (2023, January 26\u201330). Level up: Private non-interactive decision tree evaluation using levelled homomorphic encryption. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3517197","article-title":"Privacy-preserving decision trees training and prediction","volume":"25","author":"Akavia","year":"2022","journal-title":"ACM Trans. Priv. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Shin, H., Choi, J., Lee, D., Kim, K., and Lee, Y. (2024, January 16\u201320). Fully homomorphic training and inference on binary decision tree and random forest. Proceedings of the European Symposium on Research in Computer Security, Bydgoszcz, Poland.","DOI":"10.1007\/978-3-031-70896-1_11"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1186\/s40537-025-01098-6","article-title":"Exploring the future of privacy-preserving heart disease prediction: A fully homomorphic encryption-driven logistic regression approach","volume":"12","author":"Naresh","year":"2025","journal-title":"J. Big Data"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1186\/s13040-024-00379-9","article-title":"Private pathological assessment via machine learning and homomorphic encryption","volume":"17","author":"Badawi","year":"2024","journal-title":"BigData Min."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., and Song, Y. (2017, January 3\u20137). Homomorphic encryption for arithmetic of approximate numbers. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Hong Kong, China.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref_28","unstructured":"(2025, September 25). Breast Cancer Wisconsin (Diagnostic)\u2014UCI Machine Learning Repository. Available online: https:\/\/archive.ics.uci.edu\/dataset\/17\/breast+cancer+wisconsin+diagnostic."},{"key":"ref_29","unstructured":"(2025, September 25). Heart Disease\u2014UCI Machine Learning Repository. Available online: https:\/\/archive.ics.uci.edu\/dataset\/45\/Heart+Disease."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2535925","article-title":"On ideal lattices and learning with errors over rings","volume":"60","author":"Lyubashevsky","year":"2013","journal-title":"J. ACM"},{"key":"ref_31","unstructured":"Benaissa, A., Retaiat, B., Cebere, B., and Belfedhal, A.E. (2021). TenSEAL: A library for encrypted tensor operations using homomorphic encryption. arXiv."},{"key":"ref_32","unstructured":"(2025, September 25). Microsoft SEAL. Available online: https:\/\/github.com\/Microsoft\/SEAL."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1016\/S1532-0464(03)00034-0","article-title":"Logistic regression and artificial neural network classification models: A methodology review","volume":"35","author":"Dreiseitl","year":"2022","journal-title":"J. Biomed. Inform."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1023\/A:1022627411411","article-title":"Support-Vector Networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Mach. Learn."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_36","unstructured":"OpenMined\/TenSEAL (2025, September 25). Tutorial 2\u2014Working with Approximate Numbers. Available online: https:\/\/github.com\/OpenMined\/TenSEAL\/blob\/main\/tutorials%2FTutorial%202%20-%20Working%20with%20Approximate%20Numbers.ipynb."},{"key":"ref_37","unstructured":"OpenMined\/TenSEAL (2025, September 25). Tutorial 4\u2014Encrypted Convolution on MNIST. Available online: https:\/\/github.com\/OpenMined\/TenSEAL\/blob\/main\/tutorials\/Tutorial%204%20-%20Encrypted%20Convolution%20on%20MNIST.ipynb."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Hicks, S.A., Str\u00fcmke, I., Thambawita, V., Hammou, M., Riegler, M.A., Halvorsen, P., and Parasa, S. (2022). On evaluation metrics for medical applications of artificial intelligence. Sci. Rep., 12.","DOI":"10.1038\/s41598-022-09954-8"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Saito, T., and Rehmsmeier, M. (2015). The precision-recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets. PLoS ONE, 10.","DOI":"10.1371\/journal.pone.0118432"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Varma, S., and Simon, R. (2006). Bias in error estimation when using cross-validation for model selection. BMC Bioinfomatics, 7.","DOI":"10.1186\/1471-2105-7-91"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kim, A., Song, Y., Kim, M., Lee, K., and Cheon, J.H. (2018). Logistic regression model training based on the approximate homomorphic encryption. BMC Med. Genom., 11.","DOI":"10.1186\/s12920-018-0401-7"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"57414","DOI":"10.1109\/ACCESS.2020.2981818","article-title":"HE-friendly algorithm for privacy-preserving SVM training","volume":"8","author":"Park","year":"2020","journal-title":"IEEE Access"},{"key":"ref_43","unstructured":"Mihara, K., Yamaguchi, R., Mitsuishi, M., and Maruyama, Y. (2020). Neural network training with homomorphic encryption. arXiv."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Frimpong, E., Nguyen, K., Budzys, M., Khan, T., and Michalas, A. (2024, January 8\u201312). GuardML: Efficient privacy-preserving machine learning services through hybrid homomorphic encryption. Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing, Avila, Spain.","DOI":"10.1145\/3605098.3635983"},{"key":"ref_45","unstructured":"Lee, S., Lee, G., Kim, J.W., Shin, J., and Lee, M.K. (2023, January 23\u201329). HETAL: Efficient privacy-preserving transfer learning with homomorphic encryption. Proceedings of the 40th International Conference on Machine Learning, Honolulu, HI, USA."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/18\/12\/731\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:11:22Z","timestamp":1763723482000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/18\/12\/731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"references-count":45,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["a18120731"],"URL":"https:\/\/doi.org\/10.3390\/a18120731","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,21]]}}}