Research Article

Securely Outsourcing ID3 Decision Tree in Cloud Computing

Algorithm 2

Secure equivalent testing protocol (SET).
Two ciphertext are computed by the cloud as and .
1. The cloud computes and .
2. Check if or and computes
if , . else if , .
3. The value of is computed as follows:
.
If , set .