“…In our scheme, two non-communicating servers perform evaluations based on the ciphertext of the data, the classifier in polynomial form and the evaluation key, respectively. Like related works [4], [6], [7], [16], [20], [21], [31], [33], we assume that the two servers are not colluding. This assumption is reasonable because the two servers do not need to interact at all, and each server performs evaluations independently.…”