x=(x1, . . . , xn) from a client; choosing a random mask μ0; calculating m0 and sending m0 to the client, wherein m0=xi0(0)−t0(0)+μ0 and t0(0) is a threshold value in the first node in the first level of a decision tree ′; performing a comparison protocol on m0 and μ0, wherein the server produces a comparison bit b0 and the client produces a comparison bit b′0; choosing a random bit s0∈{0,1} and when s0=1 switching a left and right subtrees of ′; sending b0⊕s0 to the client; and for each level =1, 2, . . . , d−1 of the decision tree ′, where d is the number of levels in the decision tree ′, perform the following steps: receiving from the client yk where k=0, 1, . . . , −1; performing a comparison protocol on and , wherein is a random mask and is based upon, x, , yk, and and the server produces a comparison bit and the client produces a comparison bit ; choosing a random bit ∈{0,1} and when =1 switching all left and right subtrees at level of ′; and sending ⊕ to the client."/>
首页>
外国专利>
Privacy-preserving evaluation of decision trees
Privacy-preserving evaluation of decision trees
展开▼
机译:决策树的隐私保护评估
展开▼
页面导航
摘要
著录项
相似文献
摘要
A method for performing a secure evaluation of a decision tree, including: receiving, by a processor of a server, an encrypted feature vector x=(x1, . . . , xn) from a client; choosing a random mask μ0; calculating m0 and sending m0 to the client, wherein m0=xi0(0)−t0(0)+μ0 and t0(0) is a threshold value in the first node in the first level of a decision tree ′; performing a comparison protocol on m0 and μ0, wherein the server produces a comparison bit b0 and the client produces a comparison bit b′0; choosing a random bit s0∈{0,1} and when s0=1 switching a left and right subtrees of ′; sending b0⊕s0 to the client; and for each level =1, 2, . . . , d−1 of the decision tree ′, where d is the number of levels in the decision tree ′, perform the following steps: receiving from the client yk where k=0, 1, . . . , −1; performing a comparison protocol on and , wherein is a random mask and is based upon, x, , yk, and and the server produces a comparison bit and the client produces a comparison bit ; choosing a random bit ∈{0,1} and when =1 switching all left and right subtrees at level of ′; and sending ⊕ to the client.
展开▼
机译:一种用于执行决策树的安全评估的方法,包括:由服务器的处理器接收加密的特征向量 x <图像alt =”自定义字符“ file =” US10764048-20200901-P00002.GIF“ he =” 3.22mm“ imgContent =” character “ imgFormat =” GIF“ wi =” 1.44mm“ /> ==(<图像alt =”自定义字符“ file =” US10764048-20200901-P00001.GIF“ he =” 3.22mm“ imgContent =” character“ imgFormat =” GIF “ wi =” 1.44mm“ /> x 1 Sub> <图片alt =”自定义字符“ file =” US10764048-20200901-P00002.GIF“ he =” 3.22mm“ imgContent =” character“ imgFormat = “ GIF” wi =“ 1.44mm” />,。。。 x n Sub> <图片alt =”自定义字符“ file =” US10764048-20200901-P00002.GIF“ he =” 3.22mm“ imgContent =” character“ imgFormat =来自客户的“ GIF” wi =“ 1.44mm” />);选择一个随机掩码μ 0 Sub>;计算 m 0 < / Sub> 并发送 m 0 Sub> 发送给客户端,其中 m 0 Sub> = x i Sub> 0 Sub> Sub> (0) Sup> Sub>- t 0 Sub> (0) Sup> +μ 0 Sub> 和t 0 Sub> (0) Sup>是第一个节点中的阈值在决策树的第一层';在m 0 Sub>和μ 0 Sub>上执行比较协议,其中服务器生成比较位b 0 Sub>,客户端生成比较位b' 0 Sub>;选择一个随机位s 0 Sub>∈{0,1},然后当s 0 Sub> = 1切换';向客户端发送b 0 Sub>⊕s 0 Sub>;对于每个级别 = 1, 2 ,。 。 。 ,决策树的d-1 ',其中d是决策树中的级别数,执行以下步骤:从客户端接收 y k Sub> <图像alt =“自定义字符” file =“ US10764048-20200901-P00002.GIF” he =“ 3.22mm” imgContent =“ character” imgFormat =“ GIF” wi =“ 1.44mm” />,其中k = 0,1,。 。 。 , − 1;在和<图片alt =“自定义字符” file =“ US10764048-20200901-P00007.GIF” he =“ 2.46mm” imgContent =“字符” imgFormat =“ GIF” wi =“ 2.79mm” />,其中是随机掩码,基于, x <图片alt =”自定义字符“ file =” US10764048-20200901-P00002。 GIF“ he =” 3.22mm“ imgContent =”字符“ imgFormat =” GIF“ wi =” 1.44mm“ />,<图像alt =“自定义字符” file =“ US10764048-20200901-P00010.GIF” he =“ 4.23mm” imgContent =“字符” imgFormat =“ GIF” wi =“ 4.23mm” />,<图像alt =“自定义字符” file =“ US10764048-20200901-P00001.GIF” he =“ 3.22mm” imgContent =“字符” imgFormat =“ GIF” wi =“ 1.44mm” /> y k Sub> ,和,服务器生成比较位,客户端生成一个比较位;选择随机位∈{0 ,1},并且当 = 1时在';;并发送⊕发送给客户端。
展开▼