Level up: Private non-interactive decision tree evaluation using levelled homomorphic encryption

R Akhavan Mahdavi, H Ni, D Linkov… - Proceedings of the 2023 …, 2023 - dl.acm.org
As machine learning as a service continues gaining popularity, concerns about privacy and
intellectual property arise. Users often hesitate to disclose their private information to obtain …

Fully homomorphic training and inference on binary decision tree and random forest

H Shin, J Choi, D Lee, K Kim, Y Lee - European Symposium on Research …, 2024 - Springer
This paper introduces a new method for training decision trees and random forests using
CKKS homomorphic encryption (HE) in cloud environments, enhancing data privacy from …

Faster private decision tree evaluation for batched input from homomorphic encryption

K Cong, J Kang, G Nicolas, J Park - International Conference on Security …, 2024 - Springer
Privacy-preserving decision tree evaluation (PDTE) allows a client that holds feature vectors
to perform inferences against a decision tree model on the server side without revealing …

Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption

K Xu, BHM Tan, LP Wang, KMM Aung… - Journal of Information …, 2023 - Elsevier
A decision tree is a common algorithm in machine learning, which performs classification
prediction based on a tree structure. In real-world scenarios, input attribute values may be …

A non-comparison oblivious sort and its application to private k-NN

S Azogagh, MO Killijian, F Larose-Gervais - Cryptology ePrint Archive, 2024 - eprint.iacr.org
This paper introduces a novel adaptation of counting sort that enables sorting of encrypted
data using Fully Homomorphic Encryption (FHE). Our approach represents the first known …

Oblivious Turing Machine

S Azogagh, V Delfour… - 2024 19th European …, 2024 - ieeexplore.ieee.org
In the ever-evolving landscape of Information Technologies, private decentralized
computing on an honest yet curious server has emerged as a prominent paradigm. While …

cuxcmp: Cuda-accelerated private comparison based on homomorphic encryption

H Yang, S Shen, Z Liu, Y Zhao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Private comparison schemes constructed on homomorphic encryption offer the
noninteractive and parallelizable features, and have advantages in communication …

Secure Range-Searching Using Copy-And-Recurse

E Kushnir, G Moshkowich, H Shaul - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract {\em Range searching} is the problem of preprocessing a set of points $ P $, such
that given a query range $\gamma $ we can efficiently compute some function $ f …

Privacy-Preserving Rule Induction using CKKS

J Choi, J Choi, Y Lee, JS Hong - IEEE Access, 2024 - ieeexplore.ieee.org
Rule-based learning involves using specific rules to categorize or identify datasets. This
study introduces a new approach called homomorphic encryption-based rule induction …

Random forest evaluation using multi-key homomorphic encryption and lookup tables

DE Petrean, R Potolea - International Journal of Information Security, 2024 - Springer
In recent years, machine learning (ML) has become increasingly popular in various fields of
activity. Cloud platforms have also grown in popularity, as they offer services that are more …