Research Article
Securely Outsourcing ID3 Decision Tree in Cloud Computing
Algorithm 2
Secure equivalent testing protocol (SET).
| Two ciphertext are computed by the cloud as and . | | 1. The cloud computes and . | | 2. Check if or and computes | | if , . else if , . | | 3. The value of is computed as follows: | | . | | If , set . |
|