{"id":"https://openalex.org/W4308632301","doi":"https://doi.org/10.1145/3548606.3560702","title":"SortingHat","display_name":"SortingHat","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308632301","doi":"https://doi.org/10.1145/3548606.3560702"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3560702","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560702","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068879175","display_name":"Kelong Cong","orcid":"https://orcid.org/0000-0002-2636-4406"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Kelong Cong","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009147281","display_name":"Debajyoti Das","orcid":"https://orcid.org/0000-0002-6777-0566"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Debajyoti Das","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089474589","display_name":"Jeongeun Park","orcid":"https://orcid.org/0000-0002-0557-3540"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Jeongeun Park","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062966441","display_name":"Hilder V. L. Pereira","orcid":"https://orcid.org/0000-0003-1303-3760"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Hilder V.L. Pereira","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068879175"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":4.1742,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.95437202,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"563","last_page":"577"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9407460689544678},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.797357439994812},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.7251670360565186},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6261297464370728},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5375854969024658},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5359675884246826},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4943366050720215},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4663383662700653},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45580554008483887},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4182508587837219},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33794185519218445},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.329620361328125},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2525838613510132},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17952874302864075},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16981232166290283}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9407460689544678},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.797357439994812},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.7251670360565186},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6261297464370728},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5375854969024658},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5359675884246826},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4943366050720215},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4663383662700653},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45580554008483887},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4182508587837219},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33794185519218445},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.329620361328125},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2525838613510132},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17952874302864075},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16981232166290283},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3548606.3560702","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560702","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/723480","is_oa":false,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/723480","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 7-11 November 2022","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1570448133","https://openalex.org/W2001664720","https://openalex.org/W2031738616","https://openalex.org/W2102182691","https://openalex.org/W2114277262","https://openalex.org/W2132862423","https://openalex.org/W2134340933","https://openalex.org/W2152926062","https://openalex.org/W2156030242","https://openalex.org/W2170696315","https://openalex.org/W2398935881","https://openalex.org/W2400112050","https://openalex.org/W2554750353","https://openalex.org/W2590349999","https://openalex.org/W2806373377","https://openalex.org/W2907745774","https://openalex.org/W2942255051","https://openalex.org/W2974369860","https://openalex.org/W2985716091","https://openalex.org/W2990280959","https://openalex.org/W2997591727","https://openalex.org/W3081517513","https://openalex.org/W3085701114","https://openalex.org/W3109192485","https://openalex.org/W3151268345","https://openalex.org/W3157813311","https://openalex.org/W4236137412","https://openalex.org/W4246165039","https://openalex.org/W4246484440"],"related_works":["https://openalex.org/W170547082","https://openalex.org/W2136735429","https://openalex.org/W2587876411","https://openalex.org/W3028898974","https://openalex.org/W2384844478","https://openalex.org/W1755636270","https://openalex.org/W3192883662","https://openalex.org/W4386907889","https://openalex.org/W4388894064","https://openalex.org/W2912162584"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"as":[2],"a":[3,38,48,57,60,66,121,204,225,234,261],"service":[4],"scenario":[5],"typically":[6],"requires":[7],"the":[8,12,22,71,80,83,87,145,175,178,184,188,199],"client":[9,67],"to":[10,69,73,86,116,161,198,250],"trust":[11],"server":[13,58],"and":[14,65,153,187,253],"provide":[15],"sensitive":[16],"data":[17,77,81],"in":[18,25,37,131,144,227,244],"plaintext.":[19],"However,":[20],"with":[21,157,257],"recent":[23],"improvements":[24],"fully":[26],"homomorphic":[27,123,151,159,196],"encryption":[28],"(FHE)":[29],"schemes,":[30],"many":[31],"such":[32,47],"applications":[33],"can":[34,129],"be":[35,130],"designed":[36],"privacy-preserving":[39],"way.":[40],"In":[41],"this":[42],"work,":[43],"we":[44,98,110,119,135,149,181,207,232],"focus":[45],"on":[46,102],"problem,":[49],"private":[50,76,163],"decision":[51,61,140,164],"tree":[52,62,141,165],"evaluation":[53,142],"(PDTE)":[54],"---":[55],"where":[56,126],"has":[59,260],"classification":[63,84],"model,":[64],"wants":[68],"use":[70],"model":[72],"classify":[74],"her":[75],"without":[78,238],"revealing":[79],"or":[82],"result":[85],"server.":[88],"We":[89,222],"present":[90,224,233],"an":[91,137],"efficient":[92,138],"non-interactive":[93],"design":[94,136],"of":[95,107,171,177,191,229,236,246],"PDTE,":[96],"that":[97,209,240,259],"call":[99,150],"SortingHat,":[100],"based":[101],"FHE":[103,146],"techniques.":[104],"As":[105],"part":[106],"our":[108,158,195,210],"design,":[109],"solve":[111],"multiple":[112],"cryptographic":[113],"problems":[114],"related":[115],"FHE:":[117],"(1)":[118],"propose":[120],"fast":[122],"comparison":[124,160,197],"function":[125],"one":[127],"input":[128],"plaintext":[132],"format;":[133],"(2)":[134],"binary":[139],"technique":[143],"setting,":[147],"which":[148],"traversal,":[152],"apply":[154],"it":[155],"together":[156],"evaluate":[162],"classifiers,":[166],"obtaining":[167],"running":[168,271],"times":[169,217,267],"orders":[170],"magnitude":[172],"faster":[173,218],"than":[174,219],"state":[176],"art;":[179],"(3)":[180],"improve":[182],"both":[183],"communication":[185,262],"cost":[186,248,263],"time":[189],"complexity":[190],"transciphering,":[192],"by":[193],"applying":[194],"FiLIP":[200],"stream":[201],"cipher.":[202],"Through":[203],"prototype":[205],"implementation,":[206],"demonstrate":[208],"improved":[211],"transciphering":[212,239,258],"solution":[213],"runs":[214],"around":[215],"400":[216],"previous":[220],"works.":[221],"finally":[223],"choice":[226],"terms":[228,245],"PDTE":[230],"design:":[231],"version":[235,255],"SortingHat":[237],"achieves":[241],"significant":[242],"improvement":[243],"computation":[247],"compared":[249],"prior":[251],"works,":[252],"another":[254],"t-SortingHat":[256],"about":[264],"20":[265],"thousand":[266],"smaller":[268],"but":[269],"comparable":[270],"time.":[272]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2022-11-13T00:00:00"}
