{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:01:09Z","timestamp":1760576469380,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_22","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:17:07Z","timestamp":1760555827000},"page":"341-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Non-interactive Decision Tree Evaluation via\u00a0Fully Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Yiru","family":"Sun","sequence":"first","affiliation":[]},{"given":"Baodong","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Zhenwu","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Abdulqader, H.A., Abdulazeez, A.M.: A review on decision tree algorithm in healthcare applications. Indonesian J. Comput. Sci. 13(3) (2024)","DOI":"10.33022\/ijcs.v13i3.4026"},{"issue":"3","key":"22_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3517197","volume":"25","author":"A Akavia","year":"2022","unstructured":"Akavia, A., Leibovich, M., Resheff, Y.S., Ron, R., Shahar, M., Vald, M.: Privacy-preserving decision trees training and prediction. ACM Trans. Privacy Security 25(3), 1\u201330 (2022)","journal-title":"ACM Trans. Privacy Security"},{"key":"22_CR3","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-981-16-2972-3_10","volume-title":"Hybrid Artificial Intelligence and IoT in Healthcare","author":"JB Awotunde","year":"2021","unstructured":"Awotunde, J.B., Folorunso, S.O., Bhoi, A.K., Adebayo, P.O., Ijaz, M.F.: Disease diagnosis system for IoT-based wearable body sensors with machine learning algorithm. In: Kumar Bhoi, A., Mallick, P.K., Narayana Mohanty, M., Albuquerque, V.H.C. (eds.) Hybrid Artificial Intelligence and IoT in Healthcare. ISRL, vol. 209, pp. 201\u2013222. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-2972-3_10"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Bai, J., Song, X., Cui, S., Chang, E.C., Russello, G.: Scalable private decision tree evaluation with sublinear communication. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 843\u2013857 (2022)","DOI":"10.1145\/3488932.3517413"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-642-04444-1_26","volume-title":"Computer Security \u2013 ESORICS 2009","author":"M Barni","year":"2009","unstructured":"Barni, M., Failla, P., Kolesnikov, V., Lazzeretti, R., Sadeghi, A.-R., Schneider, T.: Secure evaluation of private linear branching programs with medical applications. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 424\u2013439. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04444-1_26"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Birkhoff, G.: Lattice Theory, vol.\u00a025. American Mathematical Society (1940)","DOI":"10.1090\/coll\/025"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-030-40186-3_17","volume-title":"Topics in Cryptology \u2013 CT-RSA 2020","author":"F Bourse","year":"2020","unstructured":"Bourse, F., Sanders, O., Traor\u00e9, J.: Improved secure integer comparison via homomorphic encryption. In: Jarecki, S. (ed.) CT-RSA 2020. LNCS, vol. 12006, pp. 391\u2013416. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-40186-3_17"},{"issue":"3","key":"22_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 6(3), 1\u201336 (2014)","journal-title":"ACM Trans. Comput. Theory (TOCT)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Brickell, J., Porter, D.E., Shmatikov, V., Witchel, E.: Privacy-preserving remote diagnostics. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 498\u2013507 (2007)","DOI":"10.1145\/1315245.1315307"},{"issue":"2","key":"22_CR10","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/TDSC.2017.2679189","volume":"16","author":"M Cock","year":"2017","unstructured":"Cock, M., et al.: Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation. IEEE Trans. Dependable Secure Comput. 16(2), 217\u2013230 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"22_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"22_CR12","doi-asserted-by":"publisher","first-page":"2624","DOI":"10.3390\/s23052624","volume":"23","author":"Y Hao","year":"2023","unstructured":"Hao, Y., Qin, B., Sun, Y.: Privacy-preserving decision-tree evaluation with low complexity for communication. Sensors 23(5), 2624 (2023)","journal-title":"Sensors"},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"246","DOI":"10.2478\/popets-2021-0046","volume":"2021","author":"I Iliashenko","year":"2021","unstructured":"Iliashenko, I., Zucca, V.: Faster homomorphic comparison operations for BGV and BFV. Proc. Privacy Enhancing Technol. 2021(3), 246\u2013264 (2021)","journal-title":"Proc. Privacy Enhancing Technol."},{"key":"22_CR14","unstructured":"Janneck, J., Boudi, A., Tueno, A., Akram, M.: Secure branching program evaluation. Cryptology ePrint Archive (2022)"},{"issue":"16","key":"22_CR15","doi-asserted-by":"publisher","first-page":"12528","DOI":"10.1109\/JIOT.2021.3066307","volume":"8","author":"J Liang","year":"2021","unstructured":"Liang, J., Qin, Z., Xue, L., Lin, X., Shen, X.: Efficient and privacy-preserving decision tree classification for health monitoring systems. IEEE Internet Things J. 8(16), 12528\u201312539 (2021)","journal-title":"IEEE Internet Things J."},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13190-5_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"V Lyubashevsky","year":"2010","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1\u201323. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_1"},{"key":"22_CR17","doi-asserted-by":"publisher","unstructured":"Ma, J.P.K., Tai, R.K.H., Zhao, Y., Chow, S.S.M.: Let\u2019s stride blindfolded in a forest: sublinear multi-client decision trees evaluation. In: Network and Distributed Systems Security (NDSS) Symposium 2021 (2021). https:\/\/doi.org\/10.14722\/ndss.2021.23166","DOI":"10.14722\/ndss.2021.23166"},{"key":"22_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100097","volume":"11","author":"E Mbunge","year":"2023","unstructured":"Mbunge, E., Batani, J.: Application of deep learning and machine learning models to improve healthcare in Sub-Saharan Africa: emerging opportunities, trends and implications. Telemat. Inform. Rep. 11, 100097 (2023)","journal-title":"Telemat. Inform. Rep."},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Pillai, S.E.V.S., Polimetla, K.: Enhancing network privacy through secure multi-party computation in cloud environments. In: 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), pp.\u00a01\u20136. IEEE (2024)","DOI":"10.1109\/ICICACS60521.2024.10498662"},{"key":"22_CR20","doi-asserted-by":"publisher","first-page":"124","DOI":"10.58496\/MJCSC\/2023\/015","volume":"2023","author":"R Qamar","year":"2023","unstructured":"Qamar, R., Zardari, B.A.: Artificial neural networks: an overview. Mesopotamian J. Comput. Sci. 2023, 124\u2013133 (2023)","journal-title":"Mesopotamian J. Comput. Sci."},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Quijano, A., Halkidis, S.T., Gallagher, K., Akkaya, K., Samaras, N.: Enhanced outsourced and secure inference for tall sparse decision trees. In: 2024 IEEE International Performance, Computing, and Communications Conference (IPCCC), pp.\u00a01\u20136. IEEE (2024)","DOI":"10.1109\/IPCCC59868.2024.10850192"},{"key":"22_CR22","unstructured":"Research, M.: Microsoft seal (release 3.2) (2019). https:\/\/github.com\/Microsoft\/SEAL, Microsoft Research, Redmond, WA"},{"issue":"07","key":"22_CR23","first-page":"3897","volume":"10","author":"K Sharifani","year":"2023","unstructured":"Sharifani, K., Amini, M.: Machine learning and deep learning: a review of methods and applications. World Inf. Technol. Eng. J. 10(07), 3897\u20133904 (2023)","journal-title":"World Inf. Technol. Eng. J."},{"key":"22_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-319-66399-9_27","volume-title":"Computer Security \u2013 ESORICS 2017","author":"RKH Tai","year":"2017","unstructured":"Tai, R.K.H., Ma, J.P.K., Zhao, Y., Chow, S.S.M.: Privacy-preserving decision trees evaluation via linear functions. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 494\u2013512. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_27"},{"key":"22_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-030-49669-2_10","volume-title":"Data and Applications Security and Privacy XXXIV","author":"A Tueno","year":"2020","unstructured":"Tueno, A., Boev, Y., Kerschbaum, F.: Non-interactive private decision tree evaluation. In: Singhal, A., Vaidya, J. (eds.) DBSec 2020. LNCS, vol. 12122, pp. 174\u2013194. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49669-2_10"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Tueno, A., Kerschbaum, F., Katzenbeisser, S.: Private evaluation of decision trees using sublinear cost. Proc. Privacy Enhancing Technol. (2019)","DOI":"10.2478\/popets-2019-0015"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Feng, T., Naehrig, M., Lauter, K.: Privately evaluating decision trees and random forests. Cryptology ePrint Archive (2015)","DOI":"10.1515\/popets-2016-0043"},{"key":"22_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.compstruct.2022.116397","volume":"304","author":"H Yin","year":"2023","unstructured":"Yin, H., Zhang, W., Zhu, L., Meng, F., Liu, J., Wen, G.: Review on lattice structures for energy absorption properties. Compos. Struct. 304, 116397 (2023)","journal-title":"Compos. Struct."},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, I., Tofigh, F., Piccardi, M., Abolhasan, M., Franklin, D., Lipman, J.: Secure multi-party computation for machine learning: a survey. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3388992"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, Z.H.: Open-environment machine learning. Natl. Sci. Rev. 9(8), nwac123 (2022)","DOI":"10.1093\/nsr\/nwac123"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:17:10Z","timestamp":1760555830000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}