Cryptographic methods for privacy aware computing: applications Outline Review: three basic methods Two applications Distributed decision tree with horizontally partitioned…