skip to main content
10.1145/3666025.3699391acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
poster

Poster: Practical Privacy-Preserving Decision Tree Evaluation for Resource-Constrained Devices

Published: 04 November 2024 Publication History

Abstract

We investigate the problem of private decision tree evaluation, which involves a server who holds a private decision tree, and a client who wants to classify its private attribute vector on the decision tree. The goal is to enable the client to learn the classification result while revealing nothing about both parties' inputs. We propose a novel secure two-party protocol for the problem of private decision tree evaluation based on symmetric encryption and oblivious transfer, which achieves higher efficiency and can be applied to scenarios involving resource-constrained devices.

References

[1]
Justin Brickell, Donald E. Porter, Vitaly Shmatikov, and Emmett Witchel. 2007. Privacy-preserving remote diagnostics. In Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28--31, 2007, Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson (Eds.). ACM, 498--507.
[2]
Anselme Tueno, Florian Kerschbaum, and Stefan Katzenbeisser. 2019. Private Evaluation of Decision Trees using Sublinear Cost. Proc. Priv. Enhancing Technol. 2019, 1 (2019), 266--286.

Index Terms

  1. Poster: Practical Privacy-Preserving Decision Tree Evaluation for Resource-Constrained Devices

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SenSys '24: Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems
      November 2024
      950 pages
      ISBN:9798400706974
      DOI:10.1145/3666025
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 November 2024

      Check for updates

      Author Tags

      1. multi-party computation
      2. oblivious transfer
      3. decision tree
      4. resource-constrained devices

      Qualifiers

      • Poster

      Conference

      Acceptance Rates

      Overall Acceptance Rate 198 of 990 submissions, 20%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 75
        Total Downloads
      • Downloads (Last 12 months)75
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 18 Feb 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media