{"id":"https://openalex.org/W4229052361","doi":"https://doi.org/10.1145/3488932.3517413","title":"Scalable Private Decision Tree Evaluation with Sublinear Communication","display_name":"Scalable Private Decision Tree Evaluation with Sublinear Communication","publication_year":2022,"publication_date":"2022-05-24","ids":{"openalex":"https://openalex.org/W4229052361","doi":"https://doi.org/10.1145/3488932.3517413"},"language":"en","primary_location":{"id":"doi:10.1145/3488932.3517413","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488932.3517413","pdf_url":null,"source":{"id":"https://openalex.org/S4363609011","display_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2205.01284","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079507661","display_name":"Jianli Bai","orcid":"https://orcid.org/0000-0001-6468-629X"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Jianli Bai","raw_affiliation_strings":["University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021399321","display_name":"Xiangfu Song","orcid":"https://orcid.org/0000-0001-9927-0534"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Xiangfu Song","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103162802","display_name":"Shujie Cui","orcid":"https://orcid.org/0000-0001-8124-6800"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shujie Cui","raw_affiliation_strings":["Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105408906","display_name":"Ee\u2010Chien Chang","orcid":"https://orcid.org/0000-0003-4613-0866"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ee-Chien Chang","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072751099","display_name":"Giovanni Russello","orcid":"https://orcid.org/0000-0001-6987-0803"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Giovanni Russello","raw_affiliation_strings":["University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5079507661"],"corresponding_institution_ids":["https://openalex.org/I154130895"],"apc_list":null,"apc_paid":null,"fwci":1.7801,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.86791753,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"843","last_page":"857"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7898496389389038},{"id":"https://openalex.org/keywords/sublinear-function","display_name":"Sublinear function","score":0.7686624526977539},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7471203804016113},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.670698881149292},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5048142075538635},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5028929114341736},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4719223976135254},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.4438631236553192},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4215392768383026},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36308345198631287},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3319932818412781},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13543739914894104},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12988805770874023},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11680465936660767}],"concepts":[{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7898496389389038},{"id":"https://openalex.org/C117160843","wikidata":"https://www.wikidata.org/wiki/Q338652","display_name":"Sublinear function","level":2,"score":0.7686624526977539},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7471203804016113},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.670698881149292},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5048142075538635},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5028929114341736},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4719223976135254},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.4438631236553192},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4215392768383026},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36308345198631287},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3319932818412781},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13543739914894104},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12988805770874023},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11680465936660767},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3488932.3517413","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488932.3517413","pdf_url":null,"source":{"id":"https://openalex.org/S4363609011","display_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2205.01284","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2205.01284","pdf_url":"https://arxiv.org/pdf/2205.01284","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2205.01284","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2205.01284","pdf_url":"https://arxiv.org/pdf/2205.01284","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W58354739","https://openalex.org/W139740867","https://openalex.org/W173953576","https://openalex.org/W644599125","https://openalex.org/W1502935422","https://openalex.org/W1524288918","https://openalex.org/W1577715605","https://openalex.org/W1584935767","https://openalex.org/W1819119697","https://openalex.org/W1969009977","https://openalex.org/W2013623332","https://openalex.org/W2027471022","https://openalex.org/W2031738616","https://openalex.org/W2051576234","https://openalex.org/W2104290684","https://openalex.org/W2114277262","https://openalex.org/W2132172731","https://openalex.org/W2155040491","https://openalex.org/W2233233025","https://openalex.org/W2286670277","https://openalex.org/W2398935881","https://openalex.org/W2533357737","https://openalex.org/W2573908344","https://openalex.org/W2744061387","https://openalex.org/W2766831041","https://openalex.org/W2866649234","https://openalex.org/W2899635708","https://openalex.org/W2907745774","https://openalex.org/W2943847483","https://openalex.org/W2949844816","https://openalex.org/W2951956578","https://openalex.org/W2953030092","https://openalex.org/W2953483183","https://openalex.org/W2972310509","https://openalex.org/W3097937526","https://openalex.org/W3136975558","https://openalex.org/W3205746744","https://openalex.org/W4378527334"],"related_works":["https://openalex.org/W90906771","https://openalex.org/W2018828772","https://openalex.org/W2529185025","https://openalex.org/W2052708136","https://openalex.org/W2809723425","https://openalex.org/W2005302727","https://openalex.org/W4289097813","https://openalex.org/W3082028334","https://openalex.org/W1973725449","https://openalex.org/W2144839145"],"abstract_inverted_index":{"Private":[0],"decision":[1,7],"tree":[2,8],"evaluation":[3,157],"(PDTE)":[4],"allows":[5],"a":[6,12,16,28,66,80,91,135],"holder":[9],"to":[10,35,64,89,113],"run":[11],"secure":[13],"protocol":[14,69,121,141,161],"with":[15,48,70,142],"feature":[17,24],"provider.":[18],"By":[19],"running":[20],"the":[21,23,43,49,125,143],"protocol,":[22],"provider":[25],"will":[26],"learn":[27],"classification":[29],"result.":[30],"Nothing":[31],"more":[32,165],"is":[33,54,79,122,162],"revealed":[34],"either":[36],"party.":[37],"In":[38],"most":[39],"existing":[40,171],"PDTE":[41,68,120],"protocols,":[42,103],"required":[44],"communication":[45,72,109,148],"grows":[46],"exponentially":[47],"tree's":[50],"depth":[51],"d,":[52],"which":[53,106],"highly":[55],"inefficient":[56],"for":[57],"large":[58,168],"trees.":[59],"This":[60],"shortcoming":[61],"motivated":[62],"us":[63],"design":[65],"sublinear":[67,108,119],"$O(d)$":[71],"complexity.":[73],"The":[74,155],"core":[75],"of":[76,105,147],"our":[77,140,160],"construction":[78],"shared":[81],"oblivious":[82,93],"selection":[83],"(SOS)":[84],"functionality,":[85],"allowing":[86],"two":[87,101],"parties":[88],"perform":[90],"secret-shared":[92],"read":[94],"operation":[95],"from":[96],"an":[97],"array.":[98],"We":[99,138],"provide":[100],"SOS":[102,127],"both":[104],"achieve":[107],"and":[110,129,149,164],"propose":[111],"optimizations":[112],"further":[114],"improve":[115],"their":[116],"efficiency.":[117],"Our":[118],"based":[123],"on":[124],"proposed":[126],"functionality":[128],"we":[130],"prove":[131],"its":[132],"security":[133],"under":[134,151],"semi-honest":[136],"adversary.":[137],"compare":[139],"state-of-the-art,":[144],"in":[145],"terms":[146],"computation,":[150],"various":[152],"network":[153],"settings.":[154],"performance":[156],"shows":[158],"that":[159],"practical":[163],"scalable":[166],"over":[167],"trees":[169],"than":[170],"solutions.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
