{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:48:47Z","timestamp":1775069327793,"version":"3.50.1"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031804076","type":"print"},{"value":"9783031804083","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80408-3_6","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T10:29:59Z","timestamp":1733999399000},"page":"80-105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-Preserving Graph-Based Machine Learning with\u00a0Fully Homomorphic Encryption for\u00a0Collaborative Anti-money Laundering"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8595-4323","authenticated-orcid":false,"given":"Fabrianne","family":"Effendi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8818-6983","authenticated-orcid":false,"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"6_CR1","unstructured":"United Nations Office on Drugs and Crime. Money Laundering (2023). https:\/\/www.unodc.org\/unodc\/en\/money-laundering\/overview.html"},{"key":"6_CR2","unstructured":"Cheah, M.: S\\$3 billion anti-money laundering bust wraps up with 10th and final individual jailed. The Business Times, June 2024"},{"key":"6_CR3","unstructured":"Altman, E., Egressy, B., Blanu\u0161a, J., Atasu, K.: Realistic synthetic financial transactions for anti-money laundering models. arXiv: 2306.16424 [cs.AI] (2023)"},{"key":"6_CR4","unstructured":"McKinsey & Company. The fight against money laundering: machine learning is a game changer, October 2022"},{"key":"6_CR5","unstructured":"Kurshan, E., Shen, H.: Graph computing for financial crime and fraud detection: trends, challenges and outlook. arXiv: 2103.03227 [cs.CR] (2021)"},{"key":"6_CR6","unstructured":"PwC. Breaking down the silos to combat financial crimes. https:\/\/www.pwc.com\/ca\/en\/services\/deals\/breaking-down-the-silos-to-financial-crimes.html"},{"key":"6_CR7","unstructured":"Wass, S.: Banks need steer on data protection vs money-laundering rules: industry bodies. en-us, February 2020"},{"key":"6_CR8","unstructured":"Monetary Authority of Singapore. COSMIC. en, December 2023. https:\/\/www.mas.gov.sg\/regulation\/anti-money-laundering\/cosmic"},{"key":"6_CR9","unstructured":"Monetary Authority of Singapore. Consultation Paper on the Regulations Relating to FI-FI Information Sharing for AML\/CFT, December 2023"},{"key":"6_CR10","unstructured":"Financial Action Task Force (FATF). Opportunities and Challenges of New Technologies for AML\/CFT. FATF, Paris, France (2021)"},{"key":"6_CR11","unstructured":"Zama. What is Concrete ML?|Concrete ML Documentation. en, February 2024. https:\/\/docs.zama.ai\/concrete-ml\/"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Blanu\u0161a, J., Egressy, B., von Niederh\u00e4usern, L., Altman, E., Wattenhofer, R., Atasu, K.: Graph feature preprocessor: real-time extraction of subgraph-based features from transaction graphs. arXiv: 2402.08593 [cs.LG] (2024)","DOI":"10.1145\/3677052.3698674"},{"key":"6_CR13","unstructured":"Weber, M., Xu, K., Leskovec, J., Jegelka, S.: Scalable graph learning for anti-money laundering: a first look. arXiv: 1812.00076 [cs.SI] (2018)"},{"key":"6_CR14","unstructured":"Weber, M., Xu, K., Leskovec, J., Jegelka, S.: Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv: 1908.02591 [cs.SI] (2019)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Alarab, I., Prakoonwit, S.: Graph-based LSTM for anti-money laundering: experimenting temporal graph convolutional network with bitcoin data. Neural Process. Lett. 55(1), 689\u2013707 (2023)","DOI":"10.1007\/s11063-022-10904-8"},{"key":"6_CR16","unstructured":"Pareja, A., Mart\u00ednez-Mu\u00f1oz, G., Ahn, S., Iglesias, P., Branco, P., Song, D.: EvolveGCN: evolving graph convolutional networks for dynamic graphs. arXiv: 1902.10191 [cs.LG] (2019)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Cardoso, M., Saleiro, P., Bizarro, P.: LaundroGraph: self-supervised graph representation learning for anti-money laundering. arXiv: 2210.14360 [cs.LG] (2022)","DOI":"10.1145\/3533271.3561727"},{"key":"6_CR18","unstructured":"Johannessen, F., Jullum, M.: Finding money launderers using heterogeneous graph neural networks. arXiv: 2307.13499 [cs.LG] (2023)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Egressy, B., von Niederh\u00e4usern, L., Blanusa, J., Altman, E., Wattenhofer, R., Atasu, K.: Provably powerful graph neural networks for directed multigraphs. arXiv: 2306.11586 [cs.LG] (2024)","DOI":"10.1609\/aaai.v38i10.29069"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Tertychnyi, P., Babenko, V., Morozova, V., Borsuk, D.: Scalable and imbalance-resistant machine learning models for anti-money laundering: a two-layered approach, pp. 43\u201358, November 2020. ISBN: 978-3-030-64465-9. https:\/\/doi.org\/10.1007\/978-3-030-64466-6_3","DOI":"10.1007\/978-3-030-64466-6_3"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Jullum, M., Hoff, H., Reistad, M.N., Glad, I.K.: Detecting money laundering transactions with machine learning. J. Money Launder. Control (2020, ahead-of-print)","DOI":"10.1108\/JMLC-07-2019-0055"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Vassallo, D., Vella, V., Ellul, J.: Application of gradient boosting algorithms for anti-money laundering in cryptocurrencies. SN Comput. Sci. 2 (2021). https:\/\/doi.org\/10.1007\/s42979-021-00558-z","DOI":"10.1007\/s42979-021-00558-z"},{"key":"6_CR23","unstructured":"Eddin, A.N., Stoian, A., Dutta, S.: Anti-money laundering alert optimization using machine learning with graphs. arXiv: 2112.07508 [cs.LG] (2022)"},{"key":"6_CR24","unstructured":"Baum, C., et al.: SoK: privacy-enhancing technologies in finance. Cryptology ePrint Archive, Paper 2023\/122 (2023). https:\/\/eprint.iacr.org\/2023\/122"},{"key":"6_CR25","unstructured":"Bank for International Settlements (BIS) Innovation Hub. Project Aurora: the power of data, technology and collaboration to combat money laundering across institutions and borders. en, May 2023"},{"key":"6_CR26","unstructured":"Infocomm Media Development Authority. Preventing Financial Fraud Across Different Jurisdictions with Secure Data Collaborations - IMDA PET Sandbox - Mastercard Case Study, November 2023"},{"key":"6_CR27","unstructured":"Zhang, H., Gao, Y., Zhou, R., Li, B.: A privacy-preserving hybrid federated learning framework for financial crime detection. arXiv: 2302.03654 [cs.LG] (2023)"},{"key":"6_CR28","unstructured":"van Egmond, M.B., Tubi\u0107, L., Beder, C.: Privacy-preserving anti-money laundering using secure multi-party computation. Cryptology ePrint Archive, Paper 2024\/065 (2024)"},{"key":"6_CR29","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: Balcan, M.F., Weinberger, K.Q. (eds.) Proceedings of The 33rd International Conference on Machine Learning, vol. 48, pp. 201\u2013210. Proceedings of Machine Learning Research, New York, New York, USA. PMLR, 20\u201322 June 2016"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Al Badawi, A., Jovi\u0107, J., Yeo, C.K., Cheng, C.-M., Sion, R.: Towards the AlexNet moment for homomorphic encryption: HCNN, the first homomorphic CNN on encrypted data with GPUs. Cryptology ePrint Archive, Paper 2018\/1056 (2018). https:\/\/doi.org\/10.1109\/TETC.2020.3014636","DOI":"10.1109\/TETC.2020.3014636"},{"key":"6_CR31","unstructured":"Brutzkus, A., Elisha, O., Gilad-Bachrach, R.: Low latency privacy preserving inference. arXiv: 1812.10659 [cs.LG] (2019)"},{"key":"6_CR32","unstructured":"Lee, J.-W., Kim, J., Lee, J.-W., Lee, D.H., Ha, M.: Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. arXiv: 2106.07229 [cs.LG] (2021)"},{"key":"6_CR33","unstructured":"Ran, R., Xu, N., Liu, T., Wang, W., Quan, G., Wen, W.: Penguin: parallel-packed homomorphic encryption for fast graph convolutional network inference. In: Proceedings of the Thirty-Seventh Conference on Neural Information Processing Systems (2023)"},{"key":"6_CR34","unstructured":"Ran, R., Ma, Y., Kumar, D., Huang, W., Richt\u00e1rik, P.: CryptoGCN: fast and scalable homomorphically encrypted graph convolutional network inference. arXiv: 2209.11904 [cs.CR] (2022)"},{"issue":"11","key":"6_CR35","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L., et al.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169\u2013180 (1978)","journal-title":"Found. Secure Comput."},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis. Stanford, CA, USA (2009). ISBN: 9781109444506. Type: AAI3382729","DOI":"10.1145\/1536414.1536440"},{"key":"6_CR37","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. Cryptology ePrint Archive, Paper 2018\/421 (2018). https:\/\/eprint.iacr.org\/2018\/421"},{"key":"6_CR38","doi-asserted-by":"publisher","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: CONCRETE: concrete operates oN ciphertexts rapidly by extending TfhE. In: 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, p. 7. ACM. Virtual Event. ACM, New York, NY, USA, December 2020. https:\/\/doi.org\/10.25835\/0072999","DOI":"10.25835\/0072999"},{"key":"6_CR39","unstructured":"Joye, M.: Homomorphic Encryption 101. en, December 2021. https:\/\/www.zama.ai\/post\/homomorphic-encryption-101"},{"key":"6_CR40","unstructured":"Zama. Introducing the Concrete Framework. en, July 2022. https:\/\/www.zama.ai\/post\/introducing-the-concrete-framework"},{"key":"6_CR41","unstructured":"Mahootiha, M.: Money Laundering Data (2020). https:\/\/www.kaggle.com\/datasets\/maryam1212\/money-laundering-data"},{"key":"6_CR42","unstructured":"Suzumura, T., Kanezashi, H.: Anti-Money Laundering Datasets (2021). https:\/\/github.com\/IBM\/AMLSim"},{"key":"6_CR43","unstructured":"IBM Research. IBM Transactions for Anti Money Laundering (AML) (2023). https:\/\/www.kaggle.com\/datasets\/ealtman2019\/ibm-transactions-for-anti-money-laundering-aml"},{"key":"6_CR44","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks? arXiv: 1810.00826 [cs.LG] (2019)"},{"key":"6_CR45","unstructured":"Altman, E., Egressy, B., Blanu\u0161a, J., Atasu, K.: Multi-GNN architectures for anti-money laundering (2023). https:\/\/github.com\/IBM\/Multi-GNN"},{"key":"6_CR46","unstructured":"Zama. Quantization of Neural Networks for Fully Homomorphic Encryption. en, January 2022. https:\/\/www.zama.ai\/post\/quantization-of-neural-networks-for-fully-homomorphic-encryption"},{"key":"6_CR47","unstructured":"Stoian, A., Sdi, T., Stoica, A., Filos-Ratsikas, A., Carpov, S.: Deep neural networks for encrypted inference with TFHE. Cryptology ePrint Archive, Paper 2023\/257 (2023). https:\/\/eprint.iacr.org\/2023\/257"},{"key":"6_CR48","unstructured":"Tailor, S.A., Fernandez-Marques, J., Lane, N.D.: Degree-quant: quantization-aware training for graph neural networks. arXiv: 2008.05000 [cs.LG] (2021)"},{"key":"6_CR49","unstructured":"Zama. Compilation|Concrete ML Documentation. en, February 2024. https:\/\/docs.zama.ai\/concrete-ml\/advanced-topics\/compilation"},{"key":"6_CR50","unstructured":"IBM Research. Graph Feature Preprocessor - Snap ML 1.14.2 documentation (2023). https:\/\/snapml.readthedocs.io\/en\/latest\/graph_preprocessor.html"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80408-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T07:55:15Z","timestamp":1741247715000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80408-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"ISBN":["9783031804076","9783031804083"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80408-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,9]]},"assertion":[{"value":"9 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kottayam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2024.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}