{"id":"https://openalex.org/W2907745774","doi":"https://doi.org/10.2478/popets-2019-0015","title":"Private Evaluation of Decision Trees using Sublinear Cost","display_name":"Private Evaluation of Decision Trees using Sublinear Cost","publication_year":2018,"publication_date":"2018-12-24","ids":{"openalex":"https://openalex.org/W2907745774","doi":"https://doi.org/10.2478/popets-2019-0015","mag":"2907745774"},"language":"en","primary_location":{"id":"doi:10.2478/popets-2019-0015","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0015","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/1/article-p266.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/1/article-p266.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055500838","display_name":"Anselme Tueno","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133614","display_name":"Systems, Applications & Products in Data Processing (United Kingdom)","ror":"https://ror.org/04k7gd586","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210132444","https://openalex.org/I4210133614"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Anselme Tueno","raw_affiliation_strings":["SAP SE"],"affiliations":[{"raw_affiliation_string":"SAP SE","institution_ids":["https://openalex.org/I4210133614"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102985450","display_name":"Florian Kerschbaum","orcid":"https://orcid.org/0000-0003-4288-2286"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["University of Waterloo ,"],"affiliations":[{"raw_affiliation_string":"University of Waterloo ,","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036400192","display_name":"Stefan Katzenbeisser","orcid":"https://orcid.org/0009-0005-3608-874X"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan Katzenbeisser","raw_affiliation_strings":["TU Darmstadt ,"],"affiliations":[{"raw_affiliation_string":"TU Darmstadt ,","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055500838"],"corresponding_institution_ids":["https://openalex.org/I4210133614"],"apc_list":null,"apc_paid":null,"fwci":4.7236,"has_fulltext":false,"cited_by_count":64,"citation_normalized_percentile":{"value":0.959479,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"2019","issue":"1","first_page":"266","last_page":"286"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7797905206680298},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.7114058136940002},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.6036731004714966},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.5665598511695862},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.5351914167404175},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4952971041202545},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.47880324721336365},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.47407904267311096},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.4329526424407959},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4212297797203064},{"id":"https://openalex.org/keywords/k-ary-tree","display_name":"K-ary tree","score":0.4105612635612488},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3526381850242615},{"id":"https://openalex.org/keywords/tree-structure","display_name":"Tree structure","score":0.27040478587150574},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2544684410095215},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23833513259887695},{"id":"https://openalex.org/keywords/binary-tree","display_name":"Binary tree","score":0.23798921704292297},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21691909432411194},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21604609489440918},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18528896570205688},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18388137221336365},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1526978313922882}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7797905206680298},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.7114058136940002},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.6036731004714966},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.5665598511695862},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.5351914167404175},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4952971041202545},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.47880324721336365},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.47407904267311096},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.4329526424407959},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4212297797203064},{"id":"https://openalex.org/C100560664","wikidata":"https://www.wikidata.org/wiki/Q3608019","display_name":"K-ary tree","level":4,"score":0.4105612635612488},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3526381850242615},{"id":"https://openalex.org/C163797641","wikidata":"https://www.wikidata.org/wiki/Q2067937","display_name":"Tree structure","level":3,"score":0.27040478587150574},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2544684410095215},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23833513259887695},{"id":"https://openalex.org/C197855036","wikidata":"https://www.wikidata.org/wiki/Q380172","display_name":"Binary tree","level":2,"score":0.23798921704292297},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21691909432411194},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21604609489440918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18528896570205688},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18388137221336365},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1526978313922882},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2478/popets-2019-0015","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0015","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/1/article-p266.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0b2b0a5929dc4209a6352eafd5634266","is_oa":true,"landing_page_url":"https://doaj.org/article/0b2b0a5929dc4209a6352eafd5634266","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2019, Iss 1, Pp 266-286 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.2478/popets-2019-0015","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0015","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/1/article-p266.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2907745774.pdf","grobid_xml":"https://content.openalex.org/works/W2907745774.grobid-xml"},"referenced_works_count":74,"referenced_works":["https://openalex.org/W58354739","https://openalex.org/W133884053","https://openalex.org/W173953576","https://openalex.org/W181837502","https://openalex.org/W359581522","https://openalex.org/W780859780","https://openalex.org/W1480225633","https://openalex.org/W1485800369","https://openalex.org/W1515227130","https://openalex.org/W1520270249","https://openalex.org/W1521253015","https://openalex.org/W1525012278","https://openalex.org/W1528076390","https://openalex.org/W1534636449","https://openalex.org/W1538012297","https://openalex.org/W1545698365","https://openalex.org/W1570448133","https://openalex.org/W1577715605","https://openalex.org/W1600010237","https://openalex.org/W1635361314","https://openalex.org/W1666126665","https://openalex.org/W1772045830","https://openalex.org/W1819119697","https://openalex.org/W1826277484","https://openalex.org/W1895164037","https://openalex.org/W1969009977","https://openalex.org/W1982146060","https://openalex.org/W1984680759","https://openalex.org/W1988374166","https://openalex.org/W2001084165","https://openalex.org/W2005756274","https://openalex.org/W2006453614","https://openalex.org/W2010317729","https://openalex.org/W2013623332","https://openalex.org/W2019891719","https://openalex.org/W2023951105","https://openalex.org/W2024197950","https://openalex.org/W2031738616","https://openalex.org/W2047370889","https://openalex.org/W2051267297","https://openalex.org/W2051576234","https://openalex.org/W2061619267","https://openalex.org/W2080911030","https://openalex.org/W2092422002","https://openalex.org/W2096232592","https://openalex.org/W2099221302","https://openalex.org/W2106217851","https://openalex.org/W2111446139","https://openalex.org/W2114277262","https://openalex.org/W2116025923","https://openalex.org/W2120202298","https://openalex.org/W2134340933","https://openalex.org/W2155040491","https://openalex.org/W2181401201","https://openalex.org/W2188232729","https://openalex.org/W2275295769","https://openalex.org/W2398935881","https://openalex.org/W2402235285","https://openalex.org/W2461943168","https://openalex.org/W2512472178","https://openalex.org/W2522469987","https://openalex.org/W2539273492","https://openalex.org/W2571561236","https://openalex.org/W2573908344","https://openalex.org/W2701059868","https://openalex.org/W2744061387","https://openalex.org/W2766831041","https://openalex.org/W2767201895","https://openalex.org/W2949933192","https://openalex.org/W2951239014","https://openalex.org/W2951468471","https://openalex.org/W3106106428","https://openalex.org/W3141585064","https://openalex.org/W3141796657"],"related_works":["https://openalex.org/W209676231","https://openalex.org/W2584255950","https://openalex.org/W2392337114","https://openalex.org/W1985727224","https://openalex.org/W4383878951","https://openalex.org/W2908418870","https://openalex.org/W2738041616","https://openalex.org/W2108908993","https://openalex.org/W1488047477","https://openalex.org/W2907745774"],"abstract_inverted_index":{"Abstract":[0],"Decision":[1],"trees":[2],"are":[3,128,265],"widespread":[4],"machine":[5],"learning":[6],"models":[7],"used":[8],"for":[9,277,286],"data":[10,290],"classification":[11,74,94],"and":[12,53,85,135,211,249,301],"have":[13],"many":[14,124],"applications":[15],"in":[16,131,148,234,241,313],"areas":[17],"such":[18],"as":[19,123,126,164],"healthcare,":[20],"remote":[21],"diagnostics,":[22],"spam":[23],"filtering,":[24],"etc.":[25],"In":[26,42],"this":[27,43,232],"paper,":[28],"we":[29,168,264],"address":[30],"the":[31,45,54,64,73,77,82,86,90,93,99,106,132,138,162,173,176,193,196,201,204,209,212,235,242,245,254,271,283,287,302,319],"problem":[32],"of":[33,79,115,119,155,175,192,195,244],"privately":[34],"evaluating":[35],"a":[36,48,112,185,262,314],"decision":[37,50,83,129,141],"tree":[38,51,84,134,142,163,177,210],"on":[39],"private":[40,49,60,66],"data.":[41],"scenario,":[44],"server":[46],"holds":[47],"model":[52],"client":[55,87],"wants":[56],"to":[57,71,98,105,160,203,269,296,308,318],"classify":[58],"its":[59],"attribute":[61,213],"vector":[62],"using":[63,184,220,253],"server\u2019s":[65],"model.":[67],"The":[68,152],"goal":[69],"is":[70,96,103,159,182],"obtain":[72],"while":[75,101],"preserving":[76],"privacy":[78],"both":[80],"\u2013":[81,172,178],"input.":[88],"After":[89],"computation,":[91],"only":[92,170,267],"result":[95],"revealed":[97,104],"client,":[100],"nothing":[102],"server.":[107],"Many":[108],"existing":[109],"protocols":[110,121],"require":[111],"constant":[113],"number":[114],"rounds.":[116],"However,":[117],"some":[118],"these":[120],"perform":[122],"comparisons":[125],"there":[127],"nodes":[130],"entire":[133],"others":[136],"transform":[137],"whole":[139],"plaintext":[140],"into":[143],"an":[144,165],"oblivious":[145,217],"program,":[146],"resulting":[147],"higher":[149],"communication":[150,284],"costs.":[151],"main":[153],"idea":[154],"our":[156,251],"novel":[157],"solution":[158,252],"represent":[161],"array.":[166],"Then":[167],"execute":[169],"d":[171],"depth":[174],"comparisons.":[179],"Each":[180],"comparison":[181,205],"performed":[183],"small":[186],"garbled":[187,222],"circuit,":[188],"which":[189],"output":[190],"secret-shares":[191],"index":[194],"next":[197],"node.":[198],"We":[199,215,247],"get":[200],"inputs":[202],"by":[206],"obliviously":[207],"indexing":[208,219,257],"vector.":[214],"implement":[216],"array":[218,256],"either":[221],"circuits,":[223],"Oblivious":[224,227],"Transfer":[225],"or":[226],"RAM":[228],"(ORAM).":[229],"Using":[230],"ORAM,":[231],"results":[233],"first":[236,272],"protocol":[237,273],"with":[238,274],"sub-linear":[239],"cost":[240,276,285],"size":[243],"tree.":[246],"implemented":[248],"evaluated":[250],"different":[255],"procedures":[258],"mentioned":[259],"above.":[260],"As":[261],"result,":[263],"not":[266],"able":[268],"provide":[270],"sublinear":[275],"large":[278,288],"trees,":[279],"but":[280],"also":[281],"reduce":[282],"real-world":[289],"set":[291],"\u201cSpambase\u201d":[292],"from":[293,305],"18":[294],"MB":[295,300],"1":[297,311],"[triangleright]":[298],"2":[299],"computation":[303],"time":[304],"17":[306],"seconds":[307],"less":[309],"than":[310],"second":[312],"LAN":[315],"setting,":[316],"compared":[317],"best":[320],"related":[321],"work.":[322]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-01-11T00:00:00"}
