{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T22:43:22Z","timestamp":1778539402032,"version":"3.51.4"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031732089","type":"print"},{"value":"9783031732096","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73209-6_17","type":"book-chapter","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T15:02:57Z","timestamp":1730386977000},"page":"288-305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CipherDM: Secure Three-Party Inference for\u00a0Diffusion Model Sampling"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5730-7534","authenticated-orcid":false,"given":"Xin","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0362-847X","authenticated-orcid":false,"given":"Xiaojun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xudong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"He","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tingyu","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, ACM, October 2016. https:\/\/doi.org\/10.1145\/2976749.2978318, http:\/\/dx.doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"key":"17_CR2","unstructured":"Asi, H., Duchi, J.C.: Near instance-optimality in differential privacy (2020)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) lwe. Cryptology ePrint Archive, Paper 2011\/344 (2011). https:\/\/eprint.iacr.org\/2011\/344, https:\/\/eprint.iacr.org\/2011\/344","DOI":"10.1109\/FOCS.2011.12"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-lwe and security for key dependent messages. In: Annual International Cryptology Conference (2011), https:\/\/api.semanticscholar.org\/CorpusID:11312215","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"17_CR5","doi-asserted-by":"publisher","unstructured":"Braun, L., Demmler, D., Schneider, T., Tkachenko, O.: Motion - a framework for mixed-protocol multi-party computation. Cryptology ePrint Archive, Paper 2020\/1137 (2020). https:\/\/doi.org\/10.1145\/3490390, https:\/\/eprint.iacr.org\/2020\/1137","DOI":"10.1145\/3490390"},{"key":"17_CR6","unstructured":"Brown, T.B., et al.: Language models are few-shot learners. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, 6\u201312 December 2020, virtual (2020)"},{"key":"17_CR7","unstructured":"Byali, M., Chaudhari, H., Patra, A., Suresh, A.: Flash: Fast and robust framework for privacy-preserving machine learning. Cryptology ePrint Archive, Paper 2019\/1365 (2019). https:\/\/eprint.iacr.org\/2019\/1365"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Canonne, C.L., Kamath, G., Steinke, T.: The discrete gaussian for differential privacy (2021)","DOI":"10.29012\/jpc.784"},{"key":"17_CR9","unstructured":"Dalskov, A., Escudero, D., Keller, M.: Fantastic four: honest-majority four-party secure computation with malicious security. Cryptology ePrint Archive, Paper 2020\/1330 (2020). https:\/\/eprint.iacr.org\/2020\/1330"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Demmler, D., Schneider, T., Zohner, M.: ABY - A framework for efficient mixed-protocol secure two-party computation. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, 8-11 February 2015, The Internet Society (2015)","DOI":"10.14722\/ndss.2015.23113"},{"key":"17_CR11","unstructured":"Dockhorn, T., Cao, T., Vahdat, A., Kreis, K.: Differentially private diffusion models. Transactions on Machine Learning Research (2023). https:\/\/openreview.net\/forum?id=ZPpQk7FJXF"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Dong, Y., Chen, X., Jing, W., Li, K., Wang, W.: Meteor: improved secure 3-party neural network inference with reducing online communication costs. Cryptology ePrint Archive, Paper 2023\/100 (2023). https:\/\/eprint.iacr.org\/2023\/100","DOI":"10.1145\/3543507.3583272"},{"key":"17_CR13","unstructured":"Dong, Y., et al.: PUMA: secure inference of llama-7b in five minutes. CoRR abs\/2307.12533 (2023), https:\/\/doi.org\/10.48550\/arXiv.2307.12533"},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Dwork, C.: Differential privacy, pp. 338\u2013340. Springer US, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_752","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"17_CR15","unstructured":"Goodfellow, I.J., et al.: Generative adversarial networks (2014)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Gu, J.C., Tao, C., Ling, Z.H., Xu, C., Geng, X., Jiang, D.: MPC-BERT: a pre-trained language model for multi-party conversation understanding (2021)","DOI":"10.18653\/v1\/2021.acl-long.285"},{"key":"17_CR17","unstructured":"Harvey, W., Saeid\u00a0Naderiparizi, V.M., Weilbach, C., Wood, F.: Flexible diffusion modeling of long videos (2022)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"He, X., Zhu, M., Chen, D., Wang, N., Gao, X.: Diff-privacy: diffusion-based face privacy protection (2023)","DOI":"10.1109\/TCSVT.2024.3449290"},{"key":"17_CR19","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. CoRR abs\/2006.11239 (2020), https:\/\/arxiv.org\/abs\/2006.11239"},{"key":"17_CR20","unstructured":"Ho, J., Saharia, C., Chan, W., Fleet, D.J., Norouzi, M., Salimans, T.: Cascaded diffusion models for high fidelity image generation (2021)"},{"key":"17_CR21","unstructured":"Ho, J., Salimans, T., Gritsenko, A., Chan, W., Norouzi, M., Fleet, D.J.: Video diffusion models (2022)"},{"key":"17_CR22","unstructured":"Hou, X., et al.: Ciphergpt: Secure two-party GPT inference. Cryptology ePrint Archive, Paper 2023\/1147 (2023). https:\/\/eprint.iacr.org\/2023\/1147, https:\/\/eprint.iacr.org\/2023\/1147"},{"key":"17_CR23","unstructured":"Huang, Z., jie Lu, W., Hong, C., Ding, J.: Cheetah: lean and fast secure two-party deep neural network inference. Cryptology ePrint Archive, Paper 2022\/207 (2022). https:\/\/eprint.iacr.org\/2022\/207"},{"key":"17_CR24","unstructured":"Jagielski, M., Ullman, J., Oprea, A.: Auditing differentially private machine learning: How private is private sgd? (2020)"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Jain, N., Cherukuri, A.K.: Revisiting fully homomorphic encryption schemes (2023)","DOI":"10.4018\/979-8-3693-2081-5.ch012"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Jin, W., Barzilay, R., Jaakkola, T.: Junction tree variational autoencoder for molecular graph generation (2019)","DOI":"10.1039\/9781788016841-00228"},{"key":"17_CR27","unstructured":"Karras, T., Aittala, M., Aila, T., Laine, S.: Elucidating the design space of diffusion-based generative models (2022)"},{"key":"17_CR28","doi-asserted-by":"publisher","unstructured":"Kumar, N., Rathee, M., Chandran, N., Gupta, D., Rastogi, A., Sharma, R.: Cryptflow: secure tensorflow inference. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 336\u2013353 (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00092","DOI":"10.1109\/SP40000.2020.00092"},{"key":"17_CR29","doi-asserted-by":"publisher","unstructured":"Li, D., Shao, R., Wang, H., Guo, H., Xing, E.P., Zhang, H.: Mpcformer: fast, performant and private transformer inference with MPC. CoRR abs\/2211.01452 (2022), https:\/\/doi.org\/10.48550\/arXiv.2211.01452","DOI":"10.48550\/arXiv.2211.01452"},{"key":"17_CR30","unstructured":"Li, X.L., Thickstun, J., Gulrajani, I., Liang, P., Hashimoto, T.B.: Diffusion-lm improves controllable text generation (2022)"},{"key":"17_CR31","doi-asserted-by":"publisher","unstructured":"Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via minionn transformations. In: Thuraisingham, B., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 619\u2013631. ACM (2017). https:\/\/doi.org\/10.1145\/3133956.3134056","DOI":"10.1145\/3133956.3134056"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Luo, S., Hu, W.: Diffusion probabilistic models for 3d point cloud generation (2021)","DOI":"10.1109\/CVPR46437.2021.00286"},{"key":"17_CR33","unstructured":"Ma, J., et al.: SecretFlow-SPU: a performant and user-friendly framework for privacy-preserving machine learning. In: 2023 USENIX Annual Technical Conference (USENIX ATC 23), pp. 17\u201333. USENIX Association, Boston, MA, July 2023. https:\/\/www.usenix.org\/conference\/atc23\/presentation\/ma"},{"key":"17_CR34","unstructured":"Marshall, N.F.: Chebyshev interpolation. https:\/\/nicholasmarshall.info\/chebyshev-interpolation.pdf"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Mishra, P., Lehmkuhl, R., Srinivasan, A., Zheng, W., Popa, R.A.: Delphi: a cryptographic inference service for neural networks. Cryptology ePrint Archive, Paper 2020\/050 (2020). https:\/\/eprint.iacr.org\/2020\/050","DOI":"10.1145\/3411501.3419418"},{"key":"17_CR36","unstructured":"Misra, D.: Mish: A self regularized non-monotonic activation function (2020)"},{"key":"17_CR37","unstructured":"Mohassel, P., Rindal, P.: ABY3: a mixed protocol framework for machine learning. IACR Cryptol. ePrint Arch. p.\u00a0403 (2018). https:\/\/eprint.iacr.org\/2018\/403"},{"key":"17_CR38","doi-asserted-by":"publisher","unstructured":"Mohassel, P., Zhang, Y.: Secureml: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19\u201338 (2017). https:\/\/doi.org\/10.1109\/SP.2017.12","DOI":"10.1109\/SP.2017.12"},{"key":"17_CR39","unstructured":"Nichol, A.Q., Dhariwal, P., Ramesh, A., Shyam, P., Mishkin, P., McGrew, B., Sutskever, I., Chen, M.: GLIDE: towards photorealistic image generation and editing with text-guided diffusion models. In: Chaudhuri, K., Jegelka, S., Song, L., Szepesv\u00e1ri, C., Niu, G., Sabato, S. (eds.) International Conference on Machine Learning, ICML 2022, 17-23 July 2022, Baltimore, Maryland, USA. Proceedings of Machine Learning Research, vol.\u00a0162, pp. 16784\u201316804. PMLR (2022). https:\/\/proceedings.mlr.press\/v162\/nichol22a.html"},{"key":"17_CR40","unstructured":"Patra, A., Schneider, T., Suresh, A., Yalame, H.: Aby2.0: Improved mixed-protocol secure two-party computation. Cryptology ePrint Archive, Paper 2020\/1225 (2020). https:\/\/eprint.iacr.org\/2020\/1225, https:\/\/eprint.iacr.org\/2020\/1225"},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"Peebles, W., Xie, S.: Scalable diffusion models with transformers (2023)","DOI":"10.1109\/ICCV51070.2023.00387"},{"key":"17_CR42","unstructured":"Peng, Y., Naseh, A., Houmansadr, A.: Diffence: Fencing membership privacy with diffusion models (2023)"},{"key":"17_CR43","unstructured":"von Platen, P., et al.: Diffusers: state-of-the-art diffusion models. https:\/\/github.com\/huggingface\/diffusers (2022)"},{"key":"17_CR44","unstructured":"Ramesh, A., Dhariwal, P., Nichol, A., Chu, C., Chen, M.: Hierarchical text-conditional image generation with clip latents (2022)"},{"key":"17_CR45","unstructured":"Ramesh, A., et al.: Zero-shot text-to-image generation. In: Meila, M., Zhang, T. (eds.) Proceedings of the 38th International Conference on Machine Learning, ICML 2021, 18-24 July 2021, Virtual Event. Proceedings of Machine Learning Research, vol.\u00a0139, pp. 8821\u20138831. PMLR (2021). http:\/\/proceedings.mlr.press\/v139\/ramesh21a.html"},{"key":"17_CR46","doi-asserted-by":"crossref","unstructured":"Rathee, D., et al.: Cryptflow2: practical 2-party secure inference. cryptology ePrint Archive, Paper 2020\/1002 (2020). https:\/\/eprint.iacr.org\/2020\/1002, https:\/\/eprint.iacr.org\/2020\/1002","DOI":"10.1145\/3372297.3417274"},{"key":"17_CR47","doi-asserted-by":"publisher","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022, New Orleans, LA, USA, 18\u201324 June 2022, pp. 10674\u201310685. IEEE (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.01042","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"17_CR48","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-net: convolutional networks for biomedical image segmentation (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"17_CR49","doi-asserted-by":"crossref","unstructured":"Sen, J.: Homomorphic encryption - theory and application. In: Intech, July 2013","DOI":"10.5772\/56687"},{"key":"17_CR50","unstructured":"Sohl-Dickstein, J., Weiss, E.A., Maheswaranathan, N., Ganguli, S.: Deep unsupervised learning using nonequilibrium thermodynamics (2015)"},{"key":"17_CR51","unstructured":"Soifer, J., et al.: Deep learning inference service at microsoft. In: Ramsundar, B., Talagala, N. (eds.) 2019 USENIX Conference on Operational Machine Learning, OpML 2019, Santa Clara, CA, USA, 20 May 2019, pp. 15\u201317. USENIX Association (2019). https:\/\/www.usenix.org\/conference\/opml19\/presentation\/soifer"},{"key":"17_CR52","unstructured":"Song, J., Meng, C., Ermon, S.: Denoising diffusion implicit models. CoRR abs\/2010.02502 (2020). https:\/\/arxiv.org\/abs\/2010.02502"},{"key":"17_CR53","unstructured":"Song, Y., Sohl-Dickstein, J., Kingma, D.P., Kumar, A., Ermon, S., Poole, B.: Score-based generative modeling through stochastic differential equations (2021)"},{"key":"17_CR54","unstructured":"Vaswani, A., et al.: Attention is all you need. CoRR abs\/1706.03762 (2017). http:\/\/arxiv.org\/abs\/1706.03762"},{"key":"17_CR55","unstructured":"Wagh, S., Gupta, D., Chandran, N.: Securenn: efficient and private neural network training. Cryptology ePrint Archive, Paper 2018\/442 (2018). https:\/\/eprint.iacr.org\/2018\/442, https:\/\/eprint.iacr.org\/2018\/442"},{"key":"17_CR56","doi-asserted-by":"crossref","unstructured":"Wolleb, J., Bieder, F., Sandk\u00fchler, R., Cattin, P.C.: Diffusion models for medical anomaly detection (2022)","DOI":"10.1007\/978-3-031-16452-1_4"},{"key":"17_CR57","unstructured":"Wu, Z., Xu, J., Zou, X., Huang, K., Shi, X., Huang, J.: Easyphoto: your smart AI photo generator (2023)"},{"key":"17_CR58","unstructured":"Xu, R., Baracaldo, N., Joshi, J.: Privacy-preserving machine learning: methods, challenges and directions (2021)"},{"key":"17_CR59","doi-asserted-by":"crossref","unstructured":"Zeng, et al.: Mpcvit: searching for accurate and efficient MPC-friendly vision transformer with heterogeneous attention. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 5052\u20135063 (2023)","DOI":"10.1109\/ICCV51070.2023.00466"},{"key":"17_CR60","unstructured":"Zhao, W., Bai, L., Rao, Y., Zhou, J., Lu, J.: Unipc: a unified predictor-corrector framework for fast sampling of diffusion models (2023)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73209-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T12:20:39Z","timestamp":1744114839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73209-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,1]]},"ISBN":["9783031732089","9783031732096"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73209-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,1]]},"assertion":[{"value":"1 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}