2020
DOI: 10.1007/978-3-030-62576-4_15
|View full text |Cite
|
Sign up to set email alerts
|

Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(15 citation statements)
references
References 39 publications
0
0
0
Order By: Relevance
“…Existing private decision tree evaluation (PDTE) protocols rely on homomorphic encryption (HE) and garbled circuits (GC) [6,11,44,47,50], secret sharing (SS) schemes [27,36,46] or a combination of these primitives. The best choice depends on the environment because these primitives often have a trade-off regarding the required computation cost, communication cost, the targeted computed circuit size and scalability of the threat models.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Existing private decision tree evaluation (PDTE) protocols rely on homomorphic encryption (HE) and garbled circuits (GC) [6,11,44,47,50], secret sharing (SS) schemes [27,36,46] or a combination of these primitives. The best choice depends on the environment because these primitives often have a trade-off regarding the required computation cost, communication cost, the targeted computed circuit size and scalability of the threat models.…”
Section: Related Workmentioning
confidence: 99%
“…As opposed to the above approach, another line of research has proposed PDTE protocols [27,28,36,46] based on secret-sharing (SS) schemes. The advantage of SS-based protocols is their low computational cost and low communication volume, compared to HE-based and GC-based protocols, which generally require heavy computations.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations