{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T16:53:39Z","timestamp":1772211219376,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MBIE-funded programme STRATUS","award":["UOWX1503"],"award-info":[{"award-number":["UOWX1503"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3517413","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"843-857","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Scalable Private Decision Tree Evaluation with Sublinear Communication"],"prefix":"10.1145","author":[{"given":"Jianli","family":"Bai","sequence":"first","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"given":"Xiangfu","family":"Song","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Shujie","family":"Cui","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Ciphers for MPC and FHE. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 430--454","author":"Albrecht Martin R","year":"2015","unstructured":"Martin R Albrecht , Christian Rechberger , Thomas Schneider , Tyge Tiessen , and Michael Zohner . 2015 . Ciphers for MPC and FHE. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 430--454 . Martin R Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, and Michael Zohner. 2015. Ciphers for MPC and FHE. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 430--454."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_26"},{"key":"e_1_3_2_2_3_1","volume-title":"Annual International Cryptology Conference. Springer, 420--432","author":"Beaver Donald","year":"1991","unstructured":"Donald Beaver . 1991 . Efficient multiparty protocols using circuit randomization . In Annual International Cryptology Conference. Springer, 420--432 . Donald Beaver. 1991. Efficient multiparty protocols using circuit randomization. In Annual International Cryptology Conference. Springer, 420--432."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_8"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_12"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978429"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248644"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315307"},{"key":"e_1_3_2_2_10_1","volume-title":"International Joint Conferences on Artificial Intelligence. Citeseer, 764--769","author":"Catlett Jason","year":"1991","unstructured":"Jason Catlett . 1991 . Overprvning Large Decision Trees .. In International Joint Conferences on Artificial Intelligence. Citeseer, 764--769 . Jason Catlett. 1991. Overprvning Large Decision Trees.. In International Joint Conferences on Artificial Intelligence. Citeseer, 764--769."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_30"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2679189"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133967"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_35"},{"key":"e_1_3_2_2_16_1","volume-title":"Foundations of cryptography","author":"Goldreich Oded","unstructured":"Oded Goldreich . 2009. Foundations of cryptography : volume 2 , basic applications .Cambridge university press. Oded Goldreich. 2009. Foundations of cryptography: volume 2, basic applications .Cambridge university press."},{"key":"e_1_3_2_2_17_1","volume-title":"Efficient secure two-party protocols: Techniques and constructions","author":"Hazay Carmit","unstructured":"Carmit Hazay and Yehuda Lindell . 2010. Efficient secure two-party protocols: Techniques and constructions . Springer Science & Business Media . Carmit Hazay and Yehuda Lindell. 2010. Efficient secure two-party protocols: Techniques and constructions .Springer Science & Business Media."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"e_1_3_2_2_19_1","volume-title":"UC Secure Private Branching Program and Decision Tree Evaluation. Cryptology ePrint Archive","author":"Ji Keyu","year":"2021","unstructured":"Keyu Ji , Bingsheng Zhang , Tianpei Lu , Lichun Li , and Kui Ren . 2021. UC Secure Private Branching Program and Decision Tree Evaluation. Cryptology ePrint Archive ( 2021 ). Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, and Kui Ren. 2021. UC Secure Private Branching Program and Decision Tree Evaluation. Cryptology ePrint Archive (2021)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95729-6_16"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0026"},{"key":"e_1_3_2_2_22_1","first-page":"96","article-title":"A two-step method to construct credit scoring models with data mining techniques","volume":"1","author":"Koh Hian Chye","year":"2006","unstructured":"Hian Chye Koh , Wei Chin Tan , and Chwee Peng Goh . 2006 . A two-step method to construct credit scoring models with data mining techniques . International Journal of Business and Information , Vol. 1 , 1 (2006), 96 -- 118 . Hian Chye Koh, Wei Chin Tan, and Chwee Peng Goh. 2006. A two-step method to construct credit scoring models with data mining techniques. International Journal of Business and Information , Vol. 1, 1 (2006), 96--118.","journal-title":"International Journal of Business and Information"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_4"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2922958"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30619-9_26"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23166"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.025"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the Nineteenth ACM Symp. on Theory of Computing, STOC. ACM, 218--229","author":"Micali Silvio","year":"1987","unstructured":"Silvio Micali , Oded Goldreich , and Avi Wigderson . 1987 . How to play any mental game . In Proceedings of the Nineteenth ACM Symp. on Theory of Computing, STOC. ACM, 218--229 . Silvio Micali, Oded Goldreich, and Avi Wigderson. 1987. How to play any mental game. In Proceedings of the Nineteenth ACM Symp. on Theory of Computing, STOC. ACM, 218--229."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_2_30_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Patra Arpita","year":"2021","unstructured":"Arpita Patra , Thomas Schneider , Ajith Suresh , and Hossein Yalame . 2021 . ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation . In 30th USENIX Security Symposium (USENIX Security 21) . 2165--2182. Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. 2021. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. In 30th USENIX Security Symposium (USENIX Security 21). 2165--2182."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016409317640"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_27"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0015"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813634"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0043"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_2"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","location":"Nagasaki Japan","acronym":"ASIA CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3517413","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3517413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:30Z","timestamp":1750193310000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3517413"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":36,"alternative-id":["10.1145\/3488932.3517413","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3517413","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}