{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T06:10:36Z","timestamp":1772777436053,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001120C0087"],"award-info":[{"award-number":["HR001120C0087"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DARPA","award":["N66001-15-C-4066"],"award-info":[{"award-number":["N66001-15-C-4066"]}]},{"name":"National Science Foundation(NSF)","award":["TWC-1518899"],"award-info":[{"award-number":["TWC-1518899"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417278","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:02Z","timestamp":1604341622000},"page":"2039-2053","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":63,"title":["Zero Knowledge Proofs for Decision Tree Predictions and Accuracy"],"prefix":"10.1145","author":[{"given":"Jiaheng","family":"Zhang","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Zhiyong","family":"Fang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Yupeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_17"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_23"},{"key":"e_1_3_2_2_5_1","volume-title":"CRYPTO 2013 .","author":"Ben-Sasson Eli"},{"key":"e_1_3_2_2_6_1","volume-title":"Advances in Cryptology textendash EUROCRYPT","author":"Ben-Sasson Eli","year":"2019"},{"key":"e_1_3_2_2_7_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Ben-Sasson Eli","year":"2014"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_16"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_12"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70700-6_12"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03326-2_20"},{"key":"e_1_3_2_2_12_1","first-page":"4325","article-title":"Machine learning classification over encrypted data","volume":"4324","author":"Bost Raphael","year":"2015","journal-title":"NDSS"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522733"},{"key":"e_1_3_2_2_14_1","volume-title":"Bulletproofs: Short Proofs for Confidential Transactions and More. In Proceedings of the Symposium on Security and Privacy (SP)","volume":"00","author":"B\u00fcnz B.","year":"2018"},{"key":"e_1_3_2_2_15_1","volume-title":"CCS 2019 .","author":"Campanelli Matteo"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134060"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Craig Costello C\u00e9 dric Fournet Jon Howell Markulf Kohlweiss Benjamin Kreuter Michael Naehrig Bryan Parno and Samee Zahur. [n.d.]. Geppetto: Versatile Verifiable Computation. In S&P 2015 .  Craig Costello C\u00e9 dric Fournet Jon Howell Markulf Kohlweiss Benjamin Kreuter Michael Naehrig Bryan Parno and Samee Zahur. [n.d.]. Geppetto: Versatile Verifiable Computation. In S&P 2015 .","DOI":"10.1109\/SP.2015.23"},{"key":"e_1_3_2_2_18_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml  Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_2_19_1","unstructured":"Amos Fiat and Adi Shamir. [n.d.]. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Crypto 1986 .  Amos Fiat and Adi Shamir. [n.d.]. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Crypto 1986 ."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978368"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_22_1","volume-title":"Safetynets: Verifiable execution of deep neural networks on an untrusted cloud. In Advances in Neural Information Processing Systems. 4672--4681.","author":"Ghodsi Zahra","year":"2017"},{"key":"e_1_3_2_2_23_1","series-title":"SIAM Journal on computing","volume-title":"The knowledge complexity of interactive proof systems","author":"Goldwasser Shafi","year":"1989"},{"key":"e_1_3_2_2_24_1","volume-title":"Advances in Cryptology-CRYPTO 2009","author":"Groth Jens"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/129712.129782"},{"key":"e_1_3_2_2_27_1","volume-title":"Fast Software Encryption","author":"Lyubashevsky Vadim"},{"key":"e_1_3_2_2_28_1","volume-title":"CRYPTO","author":"Merkle Ralph C.","year":"1989"},{"key":"e_1_3_2_2_29_1","series-title":"SIAM J. Comput. (2000)","volume-title":"Computationally Sound Proofs","author":"Micali Silvio"},{"key":"e_1_3_2_2_30_1","volume-title":"Pinocchio: Nearly practical verifiable computation. In S&P 2013 . 238--252.","author":"Parno Bryan","year":"2013"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09519-5_72"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39658-1_2"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0015"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_11"},{"key":"e_1_3_2_2_35_1","volume-title":"Zuocheng Ren, Andrew J Blumberg, and Michael Walfish.","author":"Wahby Riad S","year":"2015"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00060"},{"key":"e_1_3_2_2_37_1","volume-title":"Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Advances in Cryptology (CRYPTO) .","author":"Xie Tiacheng","year":"2019"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Jiaheng Zhang Tiancheng Xie Yupeng Zhang and Dawn Song. [n.d.]. Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof. In S&P 2020 .  Jiaheng Zhang Tiancheng Xie Yupeng Zhang and Dawn Song. [n.d.]. Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof. In S&P 2020 .","DOI":"10.1109\/SP40000.2020.00052"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.43"},{"key":"e_1_3_2_2_40_1","unstructured":"Yupeng Zhang Daniel Genkin Jonathan Katz Dimitrios Papadopoulos and Charalampos Papamanthou. 2017b. A Zero-Knowledge Version of vSQL . Cryptology ePrint.  Yupeng Zhang Daniel Genkin Jonathan Katz Dimitrios Papadopoulos and Charalampos Papamanthou. 2017b. A Zero-Knowledge Version of vSQL . Cryptology ePrint."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00013"},{"key":"e_1_3_2_2_42_1","volume-title":"VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. arXiv preprint arXiv:1909.06961","author":"Zhao Lingchen","year":"2019"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09519-5_73"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417278","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:31Z","timestamp":1750197691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":43,"alternative-id":["10.1145\/3372297.3417278","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417278","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}