Faster private decision tree evaluation for batched input from homomorphic encryption

K Cong, J Kang, G Nicolas, J Park - International Conference on Security …, 2024 - Springer
Privacy-preserving decision tree evaluation (PDTE) allows a client that holds feature vectors
to perform inferences against a decision tree model on the server side without revealing …

Private approximate nearest neighbor search for on-chain data based on locality-sensitive hashing

S Shang, X Du, X Wang, A Liu - Future Generation Computer Systems, 2025 - Elsevier
Blockchain manages data with immutability, decentralization and traceability, offering new
solutions for traditional information systems and greatly facilitating data sharing. However …

UFC: A Unified Accelerator for Fully Homomorphic Encryption

M Zhou, Y Nam, X Wang, Y Lee… - 2024 57th IEEE/ACM …, 2024 - ieeexplore.ieee.org
Fully homomorphic encryption (FHE) is crucial for post-quantum privacy-preserving
computing. Researchers have proposed various FHE schemes that excel at different …

GraSS: Graph-based Similarity Search on Encrypted Query

D Kim, Y Nam, W Wang, H Gong, I Bhati… - Cryptology ePrint …, 2024 - eprint.iacr.org
Similarity search, ie, retrieving vectors in a database that are similar to a query, is the
backbone of many applications. Especially, graph-based methods show state-of-the-art …