{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:51:31Z","timestamp":1763344291361,"version":"3.45.0"},"reference-count":69,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064161","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T03:15:10Z","timestamp":1749438910000},"page":"3673-3705","source":"Crossref","is-referenced-by-count":0,"title":["HEaaN-ID3: Fully Homomorphic Privacy-Preserving ID3-Decision Trees Using CKKS"],"prefix":"10.32604","volume":"84","author":[{"given":"Dain","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hojune","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Jihyeon","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Younho","family":"Lee","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","article-title":"A 3D memristive cubic map with dual discrete memristors: design, implementation, and application in image encryption","author":"Gao","year":"2025","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref2","series-title":"Proceedings of the International Conference on Machine Learning (ICML); 2023 Jul 23\u201329; Honolulu, HI, USA","first-page":"19010","article-title":"HETAL: efficient privacy-preserving transfer learning with homomorphic encryption","author":"Lee"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1224","DOI":"10.1109\/TDSC.2023.3275649","article-title":"HEaaN-STAT: a privacy-preserving statistical analysis toolkit for large-scale numerical, ordinal, and categorical data","volume":"21","author":"Lee","year":"2023","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref4","unstructured":"Gul M. Fully homomorphic encryption with applications to privacy-preserving machine learning; [bachelor\u2019s thesis], Cambridge, MA, USA: Harvard College; 2023."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2175","DOI":"10.1109\/TIFS.2023.3263631","article-title":"Optimized privacy-preserving CNN inference with fully homomorphic encryption","volume":"18","author":"Kim","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"6693","DOI":"10.1109\/TIFS.2024.3420126","article-title":"A robust privacy-preserving federated learning model against model poisoning attacks","volume":"19","author":"Yazdinejad","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1023\/A:1022643204877","article-title":"Induction of decision trees","volume":"1","author":"Quinlan","year":"1986","journal-title":"Mach Learn"},{"key":"ref8","series-title":"International Conference on the Theory and Application of Cryptology and Information Security","first-page":"409","article-title":"Homomorphic encryption for arithmetic of approximate numbers","author":"Cheon","year":"2017 Dec 3\u20137"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2914","DOI":"10.1109\/TIFS.2020.2980192","article-title":"Towards practical privacy-preserving decision tree training and evaluation in the cloud","volume":"15","author":"Liu","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3517197","article-title":"Privacy-preserving decision trees training and prediction","volume":"25","author":"Akavia","year":"2022","journal-title":"ACM Trans Priv Secur"},{"key":"ref11","series-title":"2020 24th International Conference on System Theory, Control and Computing (ICSTCC)","first-page":"208","article-title":"Experiments for a better Gini index splitting criterion for data mining decision trees algorithms","author":"B\u0103dulescu","year":"2020 Oct 8\u201310"},{"key":"ref12","series-title":"International Conference on the Theory and Application of Cryptology and Information Security","article-title":"Efficient homomorphic comparison methods with optimal complexity","author":"Cheon","year":"2020 Dec 7\u201311"},{"key":"ref13","unstructured":"Markelle Kelly KN Rachel Longjohn. The UCI machine learning repository [Internet]; 2023 [cited 2025 Apr 28]. Available from: https:\/\/archive.ics.uci.edu."},{"key":"ref14","first-page":"2825","article-title":"Scikit-learn: machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref15","series-title":"Computer Security\u2014ESORICS 2009: 14th European Symposium on Research in Computer Security","first-page":"424","article-title":"Secure evaluation of private linear branching programs with medical applications","author":"Barni","year":"2009 Sep 21\u201323"},{"article-title":"Machine learning classification over encrypted data","series-title":"NDSS Symposium 2015; 2015 Feb 8\u201311; San Diego, CA, USA","author":"Bost","key":"ref16"},{"key":"ref17","series-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","first-page":"498","article-title":"Privacy-preserving remote diagnostics","author":"Brickell","year":"2007 Nov 2\u2013Oct 31"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/TDSC.2017.2679189","article-title":"Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation","volume":"16","author":"De Cock","year":"2017","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref19","series-title":"Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 Conference, DBSec 2018","first-page":"243","article-title":"Private yet efficient decision tree evaluation","author":"Joye","year":"2018 Jul 16\u201318"},{"key":"ref20","series-title":"Financial Cryptography and Data Security: 18th International Conference, FC 2014","first-page":"179","article-title":"Practical secure decision tree learning in a teletreatment application","author":"De Hoogh","year":"2014 Mar 3\u20137"},{"key":"ref21","series-title":"CRPIT \u201914: Proceedings of the IEEE International Conference on Privacy, Security and Data Mining","first-page":"1","article-title":"Building decision tree classifier on private data","author":"Du","year":"2002 Dec 1"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.datak.2007.02.004","article-title":"Privacy preserving decision tree learning over multiple parties","volume":"63","author":"Emek\u00e7i","year":"2007","journal-title":"Data Knowl Eng"},{"key":"ref23","series-title":"Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data","first-page":"439","article-title":"Privacy-preserving data mining","author":"Agrawal","year":"2000 May 15\u201318"},{"key":"ref24","series-title":"Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2012","first-page":"322","article-title":"Enhancing the efficiency in privacy preserving learning of decision trees in partitioned databases","author":"Lory","year":"2012 Sep 26\u201328"},{"key":"ref25","series-title":"2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)","first-page":"548","article-title":"Privacy-preserving ID3 data mining over encrypted data in outsourced environments with multiple keys","author":"Li","year":"2017 Jul 21\u201324"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"12528","DOI":"10.1109\/JIOT.2021.3066307","article-title":"Efficient and privacy-preserving decision tree classification for health monitoring systems","volume":"8","author":"Liang","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TDSC.2020.3040012","article-title":"Securely and efficiently outsourcing decision tree inference","volume":"19","author":"Zheng","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref28","series-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","first-page":"563","article-title":"SortingHat: efficient private decision tree evaluation via homomorphic encryption and transciphering","author":"Cong","year":"2022 Nov 7\u201311"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1186\/s12920-017-0280-3","article-title":"Secure searching of biomarkers through hybrid homomorphic encryption scheme","volume":"10","author":"Kim","year":"2017","journal-title":"BMC Med Genomics"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"484","DOI":"10.3390\/electronics10040484","article-title":"An efficient search algorithm for large encrypted data by homomorphic encryption","volume":"10","author":"Kim","year":"2021","journal-title":"Electron"},{"key":"ref31","series-title":"Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. WAHC\u201922","first-page":"23","article-title":"PROBONITE: private one-branch-only non-interactive decision tree evaluation","author":"Azogagh","year":"2022 Nov 7"},{"key":"ref32","first-page":"397","article-title":"Constant-round private decision tree evaluation for secret shared data","volume":"2024","author":"Cheng","year":"2024","journal-title":"Proc Priv Enhanc Technol"},{"key":"ref33","series-title":"Proceedings of the 39th Annual Computer Security Applications Conference","first-page":"799","article-title":"Mostree: malicious secure private decision tree evaluation with sublinear communication","author":"Bai","year":"2023 Dec 4\u20138"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"2836","DOI":"10.1109\/TDSC.2022.3202916","article-title":"UC secure private branching program and decision tree evaluation","volume":"20","author":"Ji","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"5228","DOI":"10.1109\/TDSC.2024.3372505","article-title":"Secure outsourcing evaluation for sparse decision trees","volume":"21","author":"Zhang","year":"2024","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref36","doi-asserted-by":"crossref","unstructured":"Wang Q, Cui S, Zhou L, Dong Y, Bai J, Koh YS, et al. GTree: GPU-friendly privacy-preserving decision tree training and inference. arXiv:230500645. 2023.","DOI":"10.1109\/TrustCom63139.2024.00118"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1007\/s00778-006-0041-y","article-title":"Privacy-preserving naive bayes classification","volume":"17","author":"Vaidya","year":"2008","journal-title":"VLDB J"},{"key":"ref38","series-title":"AAAI\u201906: Proceedings of the 21st National Conference on Artificial Intelligence","first-page":"293","article-title":"Classification spanning private databases","author":"Wang","year":"2006 Jul 16\u201320"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"2385150","DOI":"10.1155\/2018\/2385150","article-title":"Securely outsourcing ID3 decision tree in cloud computing","volume":"2018","author":"Li","year":"2018","journal-title":"Wirel Commun Mob Comput"},{"key":"ref40","series-title":"2017 IEEE Trustcom\/BigDataSE\/ICESS","first-page":"1070","article-title":"Outsourcing privacy preserving ID3 decision tree algorithm over encrypted data-sets for two-parties","author":"Li","year":"2017 Aug 1\u20134"},{"key":"ref41","series-title":"2008 IEEE\/ACS International Conference on Computer Systems and Applications","first-page":"645","article-title":"Privacy preserving ID3 using Gini index over horizontally partitioned data","author":"Samet","year":"2008 Mar 31\u2013Apr 4"},{"key":"ref42","series-title":"Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT\u201905)","first-page":"239","article-title":"Privacy preserving ID3 algorithm over horizontally partitioned data","author":"Xiao","year":"2005 Dec 5\u20138"},{"key":"ref43","first-page":"187","article-title":"SoK: modular and efficient private decision tree evaluation","volume":"2019","author":"Kiss","year":"2019","journal-title":"Proc Priv Enh Technol"},{"key":"ref44","series-title":"Computer Security\u2013ESORICS 2017: 22nd European Symposium on Research in Computer Security","first-page":"494","article-title":"Privacy-preserving decision trees evaluation via linear functions","author":"Tai","year":"2017 Sep 11\u201315"},{"key":"ref45","first-page":"335","article-title":"Privately evaluating decision trees and random forests","volume":"4","author":"Wu","year":"2016","journal-title":"Proc Priv Enh Technol"},{"key":"ref46","first-page":"266","article-title":"Private evaluation of decision trees using sublinear cost","volume":"2019","author":"Tueno","year":"2019","journal-title":"Proc Priv Enh Technol"},{"article-title":"Non-interactive and output expressive private comparison from homomorphic encryption","series-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security; 2018 Jun 4; Incheon, Republic of Korea","author":"Wj","key":"ref47"},{"key":"ref48","series-title":"Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 Conference, DBSec 2020","first-page":"174","article-title":"Non-interactive private decision tree evaluation","author":"Tueno","year":"Jun 25\u201326"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.dss.2010.12.003","article-title":"An empirical evaluation of the comprehensibility of decision table, tree and rule based predictive models","volume":"51","author":"Huysmans","year":"2011","journal-title":"Decis Support Syst"},{"journal-title":"C4.5: programs for machine learning","year":"1993","author":"Quinlan","key":"ref50"},{"key":"ref51","first-page":"77","article-title":"Improved use of continuous attributes in C4.5","volume":"4","author":"Quinlan","year":"1996","journal-title":"J Artif Intell"},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.1201\/9781315139470","author":"Breiman","year":"2017","journal-title":"Classification and regression trees"},{"key":"ref53","series-title":"VLDB \u201996: Proceedings of the 22th International Conference on Very Large Data Bases","first-page":"544","article-title":"SPRINT: a scalable parallel classifier for data mining","author":"Shafer","year":"1996 Sep 3\u20136"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"541","DOI":"10.3390\/e21060541","article-title":"Approximate entropy and sample entropy: a comprehensive tutorial","volume":"21","author":"Delgado-Bonal","year":"2019","journal-title":"Entropy"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"114","DOI":"10.46586\/tches.v2021.i4.114-148","article-title":"Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs","volume":"2021","author":"Jung","year":"2021","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref56","series-title":"Cryptographers\u2019 Track at the RSA Conference","first-page":"364","article-title":"Better bootstrapping for approximate homomorphic encryption","author":"Han","year":"2020 Feb 24\u201328"},{"key":"ref57","series-title":"International Conference on Selected Areas in Cryptography","first-page":"347","article-title":"A full RNS variant of approximate homomorphic encryption","author":"Cheon","year":"2018 Aug 15\u201317"},{"key":"ref58","series-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"618","article-title":"High-precision bootstrapping of RNS-CKKS homomorphic encryption using optimal minimax polynomial approximation and inverse sine function","author":"Lee","year":"2021 Oct 17\u201321"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"110762","DOI":"10.1109\/ACCESS.2024.3438161","article-title":"HEaaN-NB: non-interactive privacy-preserving Naive Bayes using CKKS for secure outsourced cloud computing","volume":"12","author":"Han","year":"2024","journal-title":"IEEE Access"},{"article-title":"Fully homomorphic training and inference on binary decision tree and random forest","series-title":"Computer Security\u2014ESORICS 2024: 29th European Symposium on Research in Computer Security; 2024 Sep 16\u201320; Bydgoszcz, Poland","author":"Shin","key":"ref60"},{"journal-title":"Cryptology EPrint Archive","article-title":"Remark on the security of ckks scheme in practice","author":"Cheon","key":"ref61"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/507533.507538","article-title":"A preprocessing scheme for high-cardinality categorical attributes in classification and prediction problems","volume":"3","author":"Micci-Barreca","year":"2001","journal-title":"ACM SIGKDD Explor Newsletter"},{"key":"ref63","first-page":"119","article-title":"Machine learning with adversaries: byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref64","series-title":"International Conference on Machine Learning","first-page":"5650","article-title":"Byzantine-robust distributed learning: towards optimal statistical rates","author":"Yin","year":"2018 Jul 10\u201315"},{"key":"ref65","series-title":"Topics in Cryptology\u2013CT-RSA 2006: The Cryptographers\u2019 Track at the RSA Conference 2006","first-page":"1","article-title":"Cache attacks and countermeasures: the case of AES","author":"Osvik","year":"2005 Feb 13\u201317"},{"key":"ref66","series-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","first-page":"1322","article-title":"Model inversion attacks that exploit confidence information and basic countermeasures","author":"Fredrikson","year":"2015 Oct 12\u201316"},{"key":"ref67","series-title":"2019 IEEE Symposium on Security and Privacy (SP)","first-page":"739","article-title":"Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning","author":"Nasr","year":"2019 May 19\u201323"},{"key":"ref68","series-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","first-page":"308","article-title":"Deep learning with differential privacy","author":"Abadi","year":"2016 Oct 24\u201328"},{"key":"ref69","first-page":"3517","article-title":"Certified defenses for data poisoning attacks","volume":"30","author":"Steinhardt","year":"2017","journal-title":"Adv Neural Inf Process Syst"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_64161\/TSP_CMC_64161.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:49:40Z","timestamp":1763344180000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":69,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064161","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}