2017
DOI: 10.1007/978-3-319-66399-9_27
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Decision Trees Evaluation via Linear Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
79
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 74 publications
(89 citation statements)
references
References 28 publications
1
79
0
Order By: Relevance
“…Existing privacy-preserving protocols [5]- [7] follow the clientserver model where the server owns the random forest and the client inputs encrypted features to start the evaluation. Comparison at each node is carried out using the secure comparison protocol proposed by Damgård, Geisler, and Krøigaard (DGK protocol) [8] which takes inputs in binary and produces a list of intermediate results that are either encryption of zero or non-zero integer.…”
Section: Current Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Existing privacy-preserving protocols [5]- [7] follow the clientserver model where the server owns the random forest and the client inputs encrypted features to start the evaluation. Comparison at each node is carried out using the secure comparison protocol proposed by Damgård, Geisler, and Krøigaard (DGK protocol) [8] which takes inputs in binary and produces a list of intermediate results that are either encryption of zero or non-zero integer.…”
Section: Current Solutionsmentioning
confidence: 99%
“…These state-of-the-art works [5]- [7] use additive homomorphic encryption (HE) and cannot be easily extended to work in a collaborative setting which naturally requires multiplication of two ciphertexts. A best-effort workaround is to have the client sends separate requests to each model owner, as illustrated in Fig.…”
Section: Current Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Nikolaenko et al (2013) designed a privacy-preserving ridge regression on hundreds of data records, which can be regard as a building block for many machine learning operations. Raymond et al Tai et al (2017) studied privacy-preserving decision trees evaluation via linear functions, and more. Generally speaking, privacy-preserving machine learning can be roughly divided into two research goals, data perturbation and cryptographic tools.…”
Section: Related Workmentioning
confidence: 99%
“…Another interesting approach is machine learning classification over encrypted data [14], in which a private decision tree classifier allows the server to traverse a binary decision tree using the client's input, such that the server does not learn the input x and the client does not learn the structure of the tree and the thresholds at each node. A recent work [15] proposes privacy-preserving decision tree evaluation protocols which hide the sensitive inputs from the counterparty using an additively homomorphic encryption (AHE), which are similar to the ElGamal encryption procedure.…”
Section: Introductionmentioning
confidence: 99%