{"id":"https://openalex.org/W2970696446","doi":"https://doi.org/10.1109/tdsc.2019.2940020","title":"Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption","display_name":"Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2970696446","doi":"https://doi.org/10.1109/tdsc.2019.2940020","mag":"2970696446"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2019.2940020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2940020","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039640157","display_name":"Asma Aloufi","orcid":"https://orcid.org/0000-0002-8362-2432"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Asma Aloufi","raw_affiliation_strings":["Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY, United States"],"affiliations":[{"raw_affiliation_string":"Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY, United States","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090846864","display_name":"Peizhao Hu","orcid":"https://orcid.org/0000-0001-7260-6325"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peizhao Hu","raw_affiliation_strings":["Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY, United States"],"affiliations":[{"raw_affiliation_string":"Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY, United States","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101799360","display_name":"Harry W. H. Wong","orcid":"https://orcid.org/0009-0001-0443-2041"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Harry W. H. Wong","raw_affiliation_strings":["Department of Information Engineering, Chinese University of Hong Kong, Sha Tin, Hong Kong","Dept. Of Information Engineering, Chinese University of Hong Kong, Sha Tin, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, Chinese University of Hong Kong, Sha Tin, Hong Kong","institution_ids":["https://openalex.org/I177725633"]},{"raw_affiliation_string":"Dept. Of Information Engineering, Chinese University of Hong Kong, Sha Tin, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067752906","display_name":"Sherman S. M. Chow","orcid":"https://orcid.org/0000-0001-7306-453X"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sherman S. M. Chow","raw_affiliation_strings":["Department of Information Engineering, Chinese University of Hong Kong, Sha Tin, Hong Kong","Dept. Of Information Engineering, Chinese University of Hong Kong, Sha Tin, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, Chinese University of Hong Kong, Sha Tin, Hong Kong","institution_ids":["https://openalex.org/I177725633"]},{"raw_affiliation_string":"Dept. Of Information Engineering, Chinese University of Hong Kong, Sha Tin, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039640157"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":0.46085324,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.71095685,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8231664896011353},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7566052675247192},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7526156902313232},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.567571759223938},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5424365401268005},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5130154490470886},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5085316896438599},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.4429016709327698},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.43943512439727783},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.41297489404678345},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4114851951599121},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3907761871814728},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.26038727164268494},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24549531936645508},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0993422269821167}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8231664896011353},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7566052675247192},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7526156902313232},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.567571759223938},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5424365401268005},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5130154490470886},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5085316896438599},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4429016709327698},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.43943512439727783},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.41297489404678345},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4114851951599121},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3907761871814728},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26038727164268494},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24549531936645508},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0993422269821167},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2019.2940020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2940020","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"mag:2970696446","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2019/819.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","score":0.7200000286102295,"display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W179458199","https://openalex.org/W1819119697","https://openalex.org/W1974392920","https://openalex.org/W1988888548","https://openalex.org/W2031738616","https://openalex.org/W2071825329","https://openalex.org/W2077905990","https://openalex.org/W2132172731","https://openalex.org/W2152926062","https://openalex.org/W2156030242","https://openalex.org/W2164327070","https://openalex.org/W2398935881","https://openalex.org/W2534838589","https://openalex.org/W2587735315","https://openalex.org/W2681109946","https://openalex.org/W2701059868","https://openalex.org/W2744304370","https://openalex.org/W2765200655","https://openalex.org/W2766141585","https://openalex.org/W2907745774","https://openalex.org/W4210300416","https://openalex.org/W6602271536","https://openalex.org/W6603570079","https://openalex.org/W6608003078","https://openalex.org/W6609148260","https://openalex.org/W6677052498","https://openalex.org/W6677934245","https://openalex.org/W6697280430","https://openalex.org/W6718865826","https://openalex.org/W6729126140","https://openalex.org/W6742460939","https://openalex.org/W6745940941","https://openalex.org/W6752777271","https://openalex.org/W6760714629"],"related_works":["https://openalex.org/W2973081104","https://openalex.org/W2974369860","https://openalex.org/W2922208295","https://openalex.org/W2156800337","https://openalex.org/W2088339831","https://openalex.org/W2542416522","https://openalex.org/W2922480626","https://openalex.org/W3119528097","https://openalex.org/W2526708339","https://openalex.org/W2901391042","https://openalex.org/W2972653719","https://openalex.org/W1993820538","https://openalex.org/W2045597647","https://openalex.org/W2294326001","https://openalex.org/W3095102583","https://openalex.org/W2790905965","https://openalex.org/W2296500841","https://openalex.org/W3213783791","https://openalex.org/W1722462003","https://openalex.org/W54098397"],"abstract_inverted_index":{"Decision":[0],"tree":[1,31,46],"and":[2,19,162,180],"its":[3,54],"generalization":[4],"of":[5,40,53,91,131,188],"random":[6,132,159],"forests":[7,133],"are":[8],"a":[9,29,33,75,143,181],"simple":[10],"yet":[11],"powerful":[12],"machine":[13],"learning":[14],"model":[15,47,84],"for":[16,128],"many":[17],"classification":[18],"regression":[20],"problems.":[21],"Recent":[22],"works":[23,64],"propose":[24,123],"how":[25],"to":[26,69,82,109,142,194],"privately":[27],"evaluate":[28],"decision":[30,45],"in":[32],"two-party":[34],"setting":[35,73],"where":[36,74],"the":[37,41,44,50,71,83,86,107,111,116,124,148,152,164],"feature":[38],"vector":[39],"client":[42,108],"or":[43,85],"(such":[48],"as":[49],"threshold":[51],"values":[52],"nodes)":[55],"is":[56,169],"kept":[57],"secret":[58],"from":[59],"another":[60],"party.":[61],"However,":[62],"these":[63],"cannot":[65],"be":[66],"extended":[67],"trivially":[68],"support":[70,100],"outsourcing":[72],"third-party":[76,144],"who":[77],"should":[78],"not":[79,99],"have":[80],"access":[81],"query.":[87],"Furthermore,":[88],"their":[89],"use":[90],"an":[92],"interactive":[94],"comparison":[96,112,175],"protocol":[97,127],"does":[98],"branching":[101],"program,":[102],"hence":[103],"requires":[104],"interactions":[105],"with":[106],"determine":[110],"result":[113],"before":[114],"resuming":[115],"evaluation":[117,130,140],"task.":[118],"In":[119],"this":[120],"paper,":[121],"we":[122],"first":[125],"secure":[126,174,177],"collaborative":[129],"contributed":[134],"by":[135],"multiple":[136],"owners.":[137],"They":[138],"outsource":[139],"tasks":[141],"evaluator.":[145],"Upon":[146],"receiving":[147],"client's":[149],"encrypted":[150,158],"inputs,":[151],"cloud":[153],"evaluates":[154],"obliviously":[155],"on":[156,171,186],"individually":[157],"forest":[160],"models":[161],"calculates":[163],"aggregated":[165],"result.":[166],"The":[167],"system":[168],"based":[170],"our":[172],"new":[173],"protocol,":[176,179],"counting":[178],"multi-key":[182],"somewhat":[183],"homomorphic":[184],"encryption":[185],"top":[187],"symmetric-key":[189],"encryption.":[190],"This":[191],"allows":[192],"us":[193],"reduce":[195],"communication":[196],"overheads":[197],"while":[198],"achieving":[199],"round":[200],"complexity":[201],"lower":[202],"than":[203],"existing":[204],"work.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
