2023
DOI: 10.1109/tifs.2022.3231784
|View full text |Cite
|
Sign up to set email alerts
|

PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 55 publications
0
2
0
Order By: Relevance
“…Like most privacy-preserving techniques based on FSS [28,[40][41][42], their schemes derive correlated randomness through a third party. However, the role of the third party can be jointly simulated by the two parties using either generic two-party secure protocols such as garbled circuits (GCs) [43] and GMW [44], or specifc techniques [45].…”
Section: Related Workmentioning
confidence: 99%
“…Like most privacy-preserving techniques based on FSS [28,[40][41][42], their schemes derive correlated randomness through a third party. However, the role of the third party can be jointly simulated by the two parties using either generic two-party secure protocols such as garbled circuits (GCs) [43] and GMW [44], or specifc techniques [45].…”
Section: Related Workmentioning
confidence: 99%
“…Device-to-device (D2D) networks are considered as an innovative feature of the 5G/6G communications [10]. Thus, many previous works also study using UAVs as aerial relays in the D2D networks [11] [12].…”
Section: Introductionmentioning
confidence: 99%