{"id":"https://openalex.org/W2899635708","doi":"https://doi.org/10.2478/popets-2019-0026","title":"SoK: Modular and Efficient Private Decision Tree Evaluation","display_name":"SoK: Modular and Efficient Private Decision Tree Evaluation","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2899635708","doi":"https://doi.org/10.2478/popets-2019-0026","mag":"2899635708"},"language":"en","primary_location":{"id":"doi:10.2478/popets-2019-0026","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0026","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/2/article-p187.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/2/article-p187.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103702026","display_name":"\u00c1gnes Kiss","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"\u00c1gnes Kiss","raw_affiliation_strings":["TU Darmstadt ,"],"affiliations":[{"raw_affiliation_string":"TU Darmstadt ,","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001782514","display_name":"Masoud Naderpour","orcid":"https://orcid.org/0000-0002-6661-2590"},"institutions":[{"id":"https://openalex.org/I133731052","display_name":"University of Helsinki","ror":"https://ror.org/040af2s02","country_code":"FI","type":"education","lineage":["https://openalex.org/I133731052"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Masoud Naderpour","raw_affiliation_strings":["University of Helsinki ,"],"affiliations":[{"raw_affiliation_string":"University of Helsinki ,","institution_ids":["https://openalex.org/I133731052"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030344367","display_name":"Jian Liu","orcid":"https://orcid.org/0000-0001-7962-2547"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jian Liu","raw_affiliation_strings":["University of California , Berkeley , (This work was done when the author was in Aalto University)"],"affiliations":[{"raw_affiliation_string":"University of California , Berkeley , (This work was done when the author was in Aalto University)","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016685507","display_name":"N. Asokan","orcid":"https://orcid.org/0000-0002-5093-9871"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"N. Asokan","raw_affiliation_strings":["Aalto University ,"],"affiliations":[{"raw_affiliation_string":"Aalto University ,","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100724917","display_name":"Thomas Schneider","orcid":"https://orcid.org/0000-0001-8090-1316"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Schneider","raw_affiliation_strings":["TU Darmstadt ,"],"affiliations":[{"raw_affiliation_string":"TU Darmstadt ,","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103702026"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":5.7883,"has_fulltext":false,"cited_by_count":70,"citation_normalized_percentile":{"value":0.96757955,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"2019","issue":"2","first_page":"187","last_page":"208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8360939025878906},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8237448334693909},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.6261105537414551},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5535436868667603},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.5424900054931641},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5262573957443237},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5254337191581726},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.49566781520843506},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4865040183067322},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4466198682785034},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4336458146572113},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.42849332094192505},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4110623896121979},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39274686574935913},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3598519563674927},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22536534070968628}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8360939025878906},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8237448334693909},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.6261105537414551},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5535436868667603},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5424900054931641},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5262573957443237},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5254337191581726},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.49566781520843506},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4865040183067322},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4466198682785034},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4336458146572113},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.42849332094192505},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4110623896121979},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39274686574935913},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3598519563674927},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22536534070968628},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.2478/popets-2019-0026","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0026","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/2/article-p187.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:aaltodoc.aalto.fi:123456789/43107","is_oa":true,"landing_page_url":"https://research.aalto.fi/en/publications/9ec7a6b2-23ca-4257-b71c-a0e8d31959e5","pdf_url":null,"source":{"id":"https://openalex.org/S4306401663","display_name":"Aaltodoc (Aalto University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9927081","host_organization_name":"Aalto University","host_organization_lineage":["https://openalex.org/I9927081"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},{"id":"pmh:oai:doaj.org/article:6aae723cae984cdcb4e0082102844fc6","is_oa":true,"landing_page_url":"https://doaj.org/article/6aae723cae984cdcb4e0082102844fc6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2019, Iss 2, Pp 187-208 (2019)","raw_type":"article"},{"id":"pmh:oai:helda.helsinki.fi:10138/312401","is_oa":true,"landing_page_url":"http://hdl.handle.net/10138/312401","pdf_url":null,"source":{"id":"https://openalex.org/S4210213322","display_name":"Ty\u00f6v\u00e4entutkimus Vuosikirja","issn_l":"0784-1272","issn":["0784-1272","1459-7780"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.2478/popets-2019-0026","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0026","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/2/article-p187.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2899635708.pdf","grobid_xml":"https://content.openalex.org/works/W2899635708.grobid-xml"},"referenced_works_count":79,"referenced_works":["https://openalex.org/W84835382","https://openalex.org/W113737010","https://openalex.org/W114088334","https://openalex.org/W137928579","https://openalex.org/W142017860","https://openalex.org/W173953576","https://openalex.org/W780859780","https://openalex.org/W1502935422","https://openalex.org/W1518622464","https://openalex.org/W1528076390","https://openalex.org/W1534388293","https://openalex.org/W1534636449","https://openalex.org/W1538012297","https://openalex.org/W1541307921","https://openalex.org/W1544327602","https://openalex.org/W1572902997","https://openalex.org/W1577715605","https://openalex.org/W1772045830","https://openalex.org/W1819119697","https://openalex.org/W1826277484","https://openalex.org/W1933989114","https://openalex.org/W1969009977","https://openalex.org/W2002616520","https://openalex.org/W2004881597","https://openalex.org/W2011849452","https://openalex.org/W2019891719","https://openalex.org/W2031738616","https://openalex.org/W2039605106","https://openalex.org/W2047370889","https://openalex.org/W2085909071","https://openalex.org/W2106525823","https://openalex.org/W2107139227","https://openalex.org/W2108821163","https://openalex.org/W2113474134","https://openalex.org/W2114277262","https://openalex.org/W2121423622","https://openalex.org/W2130051287","https://openalex.org/W2132172731","https://openalex.org/W2134340933","https://openalex.org/W2137596716","https://openalex.org/W2149603017","https://openalex.org/W2156001253","https://openalex.org/W2157314106","https://openalex.org/W2206700814","https://openalex.org/W2275295769","https://openalex.org/W2398935881","https://openalex.org/W2461943168","https://openalex.org/W2483852738","https://openalex.org/W2522469987","https://openalex.org/W2535690855","https://openalex.org/W2573908344","https://openalex.org/W2594894582","https://openalex.org/W2603766943","https://openalex.org/W2610556663","https://openalex.org/W2679684481","https://openalex.org/W2701059868","https://openalex.org/W2744061387","https://openalex.org/W2765200655","https://openalex.org/W2767640994","https://openalex.org/W2769337162","https://openalex.org/W2783769334","https://openalex.org/W2789401365","https://openalex.org/W2791332649","https://openalex.org/W2800449371","https://openalex.org/W2805215324","https://openalex.org/W2806521799","https://openalex.org/W2808649067","https://openalex.org/W2811323882","https://openalex.org/W2866649234","https://openalex.org/W2886689407","https://openalex.org/W2887461714","https://openalex.org/W2888889871","https://openalex.org/W2907745774","https://openalex.org/W2949933192","https://openalex.org/W2963106566","https://openalex.org/W2963465081","https://openalex.org/W2963509633","https://openalex.org/W2963733194","https://openalex.org/W2969695741"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W4256358502","https://openalex.org/W2625655658","https://openalex.org/W2771047361","https://openalex.org/W2403663234"],"abstract_inverted_index":{"Abstract":[0],"Decision":[1],"trees":[2],"and":[3,23,46,74,86,106,134,144,182,225,228],"random":[4],"forests":[5],"are":[6,49,175],"widely":[7],"used":[8],"classifiers":[9],"in":[10,19],"machine":[11],"learning.":[12],"Service":[13],"providers":[14],"often":[15],"host":[16],"classification":[17],"models":[18],"a":[20,139,158],"cloud":[21],"service":[22,66],"provide":[24,207,229],"an":[25],"interface":[26],"for":[27,59,83,113,129,186],"clients":[28],"to":[29,118,199],"use":[30,152],"the":[31,35,41,43,53,57,65,71,75,80,87,94,120,125,187,233],"model":[32,36,81],"remotely.":[33],"While":[34],"is":[37,138,166],"sensitive":[38,50],"information":[39,51],"of":[40,52,97,115,161,190,203,219],"server,":[42],"input":[44,73],"query":[45],"prediction":[47],"results":[48],"client.":[54],"This":[55],"motivates":[56],"need":[58],"private":[60,98,191],"decision":[61,99,192],"tree":[62,100,193],"evaluation,":[63],"where":[64],"provider":[67],"does":[68,77],"not":[69,78],"learn":[70,79],"client\u2019s":[72],"client":[76],"except":[82],"its":[84],"size":[85],"result.":[88],"In":[89],"this":[90],"work,":[91],"we":[92,179,214],"identify":[93,119,200],"three":[95,188],"phases":[96,117,189],"evaluation":[101],"protocols:":[102],"feature":[103],"selection,":[104],"comparison,":[105],"path":[107],"evaluation.":[108,194],"We":[109],"systematize":[110],"constant-round":[111],"protocols":[112,185,205,221],"each":[114],"these":[116,147,204,220],"best":[121],"available":[122],"instantiations":[123],"using":[124],"two":[126,148],"main":[127],"paradigms":[128],"secure":[130],"computation:":[131],"garbling":[132,150],"techniques":[133,151],"homomorphic":[135,164],"encryption.":[136],"There":[137],"natural":[140],"tradeoff":[141],"between":[142],"runtime":[143,226],"communication":[145,224],"considering":[146],"paradigms:":[149],"fast":[153],"symmetric-key":[154],"operations":[155],"but":[156,169],"require":[157],"large":[159],"amount":[160],"communication,":[162],"while":[163],"encryption":[165],"computationally":[167],"heavy":[168],"requires":[170],"little":[171],"communication.":[172],"Our":[173,195],"contributions":[174],"as":[176],"follows:":[177],"Firstly,":[178],"systematically":[180],"review":[181],"analyse":[183],"state-of-the-art":[184],"methodology":[196],"allows":[197],"us":[198],"novel":[201],"combinations":[202,218],"that":[206],"better":[208],"tradeoffs":[209],"than":[210],"existing":[211],"protocols.":[212],"Thereafter,":[213],"empirically":[215],"evaluate":[216],"all":[217],"by":[222],"providing":[223],"measures,":[227],"recommendations":[230],"based":[231],"on":[232],"identified":[234],"concrete":[235],"tradeoffs.":[236]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":3}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
