{"id":"https://openalex.org/W4411160686","doi":"https://doi.org/10.32604/cmc.2025.064161","title":"HEaaN-ID3: Fully Homomorphic Privacy-Preserving ID3-Decision Trees Using CKKS","display_name":"HEaaN-ID3: Fully Homomorphic Privacy-Preserving ID3-Decision Trees Using CKKS","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411160686","doi":"https://doi.org/10.32604/cmc.2025.064161"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064161","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064161","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064161","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115596091","display_name":"Dain Lee","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dain Lee","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102943596","display_name":"Hojune Shin","orcid":"https://orcid.org/0009-0008-8804-963X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hojune Shin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Jihyeon Choi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jihyeon Choi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5007851185","display_name":"Younho Lee","orcid":"https://orcid.org/0000-0003-1767-6165"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Younho Lee","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115596091"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06119441,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"2","first_page":"3673","last_page":"3705"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8789991140365601},{"id":"https://openalex.org/keywords/id3","display_name":"ID3","score":0.7381575107574463},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.661811888217926},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6568289995193481},{"id":"https://openalex.org/keywords/id3-algorithm","display_name":"ID3 algorithm","score":0.6502441167831421},{"id":"https://openalex.org/keywords/decision-tree-learning","display_name":"Decision tree learning","score":0.35385873913764954},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3109264373779297},{"id":"https://openalex.org/keywords/incremental-decision-tree","display_name":"Incremental decision tree","score":0.23086288571357727},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21636366844177246},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08344674110412598}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8789991140365601},{"id":"https://openalex.org/C174599459","wikidata":"https://www.wikidata.org/wiki/Q1054220","display_name":"ID3","level":4,"score":0.7381575107574463},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.661811888217926},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6568289995193481},{"id":"https://openalex.org/C183931066","wikidata":"https://www.wikidata.org/wiki/Q1653378","display_name":"ID3 algorithm","level":5,"score":0.6502441167831421},{"id":"https://openalex.org/C5481197","wikidata":"https://www.wikidata.org/wiki/Q16766476","display_name":"Decision tree learning","level":3,"score":0.35385873913764954},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3109264373779297},{"id":"https://openalex.org/C10229987","wikidata":"https://www.wikidata.org/wiki/Q17083028","display_name":"Incremental decision tree","level":4,"score":0.23086288571357727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21636366844177246},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08344674110412598}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064161","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064161","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064161","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064161","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1974392920","https://openalex.org/W1990836268","https://openalex.org/W2013587512","https://openalex.org/W2106463421","https://openalex.org/W2149706766","https://openalex.org/W2573908344","https://openalex.org/W2737716759","https://openalex.org/W2894620203","https://openalex.org/W2947459187","https://openalex.org/W3011466468","https://openalex.org/W3108285671","https://openalex.org/W3129529823","https://openalex.org/W3184223012","https://openalex.org/W3190854914","https://openalex.org/W3205746744","https://openalex.org/W4205474236","https://openalex.org/W4297957988","https://openalex.org/W4361986437","https://openalex.org/W4376481107","https://openalex.org/W4392406060","https://openalex.org/W4400076000","https://openalex.org/W4401326250","https://openalex.org/W4409156291"],"related_works":["https://openalex.org/W2592385415","https://openalex.org/W2188355725","https://openalex.org/W2169280041","https://openalex.org/W2392018731","https://openalex.org/W1701900888","https://openalex.org/W2360524490","https://openalex.org/W2072960953","https://openalex.org/W2372542353","https://openalex.org/W2372022658","https://openalex.org/W2352546091"],"abstract_inverted_index":{"In":[0,112],"this":[1],"study,":[2],"we":[3,92,114],"investigated":[4],"privacy-preserving":[5],"ID3":[6,39,60],"Decision":[7],"Tree":[8],"(PPID3)":[9],"training":[10,65,154,192],"and":[11,66,155,173,193],"inference":[12,67,156,177,194],"based":[13],"on":[14,144],"fully":[15,115,152],"homomorphic":[16],"encryption":[17],"(FHE),":[18],"which":[19,72],"has":[20],"not":[21],"been":[22],"actively":[23],"explored":[24],"due":[25],"to":[26,47,103,126,180,199],"the":[27,51,57,117,159,164],"high":[28],"computational":[29,90],"cost":[30],"associated":[31],"with":[32,170],"managing":[33],"numerous":[34],"child":[35],"nodes":[36],"in":[37,158,183],"an":[38],"tree.":[40],"We":[41,162],"propose":[42],"HEaaN-ID3,":[43],"a":[44,82,94,151],"novel":[45],"approach":[46],"realize":[48],"PPID3":[49],"using":[50,167],"Cheon-Kim-Kim-Song":[52],"(CKKS)":[53],"scheme.":[54],"HEaaN-ID3":[55,189],"is":[56,73,86],"first":[58],"FHE-based":[59,201],"framework":[61],"that":[62,136,188],"completes":[63],"both":[64,171],"without":[68],"any":[69],"intermediate":[70],"decryption,":[71],"especially":[74],"valuable":[75],"when":[76],"decryption":[77,138],"keys":[78],"are":[79],"inaccessible":[80],"or":[81,142],"single-cloud":[83],"security":[84],"domain":[85],"assumed.":[87],"To":[88],"enhance":[89],"efficiency,":[91],"adopt":[93],"modified":[95],"Gini":[96],"impurity":[97],"(MGI)":[98],"score":[99],"instead":[100],"of":[101,124],"entropy":[102],"evaluate":[104],"information":[105],"gain,":[106],"thereby":[107],"avoiding":[108],"costly":[109],"inverse":[110],"operations.":[111],"addition,":[113],"leverage":[116],"Single":[118],"Instruction":[119],"Multiple":[120],"Data":[121],"(SIMD)":[122],"property":[123],"CKKS":[125],"parallelize":[127],"computations":[128],"at":[129,139],"multiple":[130],"tree":[131],"nodes.":[132],"Unlike":[133],"previous":[134],"approaches":[135],"require":[137],"each":[140],"node":[141,197],"rely":[143],"two-party":[145],"secure":[146],"computation,":[147],"our":[148],"method":[149],"enables":[150],"non-interactive":[153],"pipeline":[157],"encrypted":[160],"domain.":[161],"validated":[163],"proposed":[165],"scheme":[166],"UCI":[168],"datasets":[169],"numerical":[172],"nominal":[174],"features,":[175],"demonstrating":[176],"accuracy":[178],"comparable":[179],"plaintext":[181],"implementations":[182],"Scikit-Learn.":[184],"Moreover,":[185],"experiments":[186],"show":[187],"significantly":[190],"reduces":[191],"time":[195],"per":[196],"relative":[198],"earlier":[200],"approaches.":[202]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
