Research Article
Securely Outsourcing ID3 Decision Tree in Cloud Computing
Algorithm 2
Secure equivalent testing protocol (SET).
Two ciphertext are computed by the cloud as and . | 1. The cloud computes and . | 2. Check if or and computes | if , . else if , . | 3. The value of is computed as follows: | . | If , set . |
|