The following publications are possibly variants of this publication:
- Private Decision Tree Evaluation with Malicious Security via Function Secret SharingJiaxuan Fu, Ke Cheng 0001, Yuheng Xia, Anxiao Song, Qianxing Li, Yulong Shen. esorics 2024: 310-330 [doi]
- Outsourced Secure Cross-Modal Retrieval Based on Secret Sharing for Lightweight ClientsZiyu Niu, Hao Wang 0007, Zhi Li, Ye Su 0001, Lijuan Xu 0001, Yudi Zhang, Willy Susilo. iotj, 12(14):28543-28555, July 2025. [doi]
- Secure Sorting and Selection via Function Secret SharingAmit Agarwal, Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta 0001, Yuval Ishai, Mahimna Kelkar, Yiping Ma 0001. ccs 2024: 3023-3037 [doi]