{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:30:33Z","timestamp":1776443433273,"version":"3.51.2"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031972591","type":"print"},{"value":"9783031972607","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97260-7_3","type":"book-chapter","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:20:51Z","timestamp":1752470451000},"page":"51-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Activate Me!: Designing Efficient Activation Functions for\u00a0Privacy-Preserving Machine Learning with\u00a0Fully Homomorphic Encryption"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3393-6851","authenticated-orcid":false,"given":"Nges Brian","family":"Njungle","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1432-6939","authenticated-orcid":false,"given":"Michel A.","family":"Kinsy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Al\u00a0Badawi, A., et al.: OpenFHE: open-source fully homomorphic encryption library. In: Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, WAHC 2022, pp. 53\u201363. Association for Computing Machinery, New York (2022)","DOI":"10.1145\/3560827.3563379"},{"issue":"3","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TETC.2020.3014636","volume":"9","author":"A Al Badawi","year":"2020","unstructured":"Al Badawi, A., et al.: Towards the alexnet moment for homomorphic encryption: HCNN, the first homomorphic CNN on encrypted data with GPUs. IEEE Trans. Emerg. Topics Comput. 9(3), 1330\u20131343 (2020)","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Aggarwal, N., Gupta, C.P., Sharma, I.: Fully homomorphic symmetric scheme without bootstrapping (2014)","DOI":"10.1109\/CCIOT.2014.7062497"},{"issue":"2","key":"3_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie, M., Morris Chang, J.: Privacy-preserving machine learning: threats and solutions. IEEE Secur. Priv. 17(2), 49\u201358 (2019)","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.3390\/make5040078","volume":"5","author":"E Su\u00e1rez","year":"2023","unstructured":"Su\u00e1rez, E., Baeza, V.M.: Evaluating the role of machine learning in defense applications and industry. Mach. Learn. Knowl. Extraction 5(4), 1557\u20131569 (2023)","journal-title":"Mach. Learn. Knowl. Extraction"},{"key":"3_CR6","unstructured":"Al Badawi, A., et al.: OpenFHE: open-source fully homomorphic encryption library. Cryptology ePrint Archive, Paper 2022\/915 (2022). https:\/\/eprint.iacr.org\/2022\/915"},{"key":"3_CR7","unstructured":"Boura, C., Gama, N., Georgieva, M., Jetchev, D.: CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes. Cryptology ePrint Archive, Paper 2018\/758 (2018)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Bourse, F., Minelli, M., Minihold, M., Paillier, P.: Fast homomorphic evaluation of deep discretized neural networks. Cryptology ePrint Archive, Paper 2017\/1114 (2017)","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Banerjee, C., Mukherjee, T., Pasiliao, E.,\u00a0Jr.: An empirical study on generalizations of the relu activation function. In: Proceedings of the 2019 ACM Southeast Conference, pp. 164\u2013167 (2019)","DOI":"10.1145\/3299815.3314450"},{"key":"3_CR10","unstructured":"Al Badawi, A., Polyakov, Y.: Demystifying bootstrapping in fully homomorphic encryption. Cryptology ePrint Archive, Paper 2023\/149 (2023)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/3-540-39118-5_12","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 87","author":"EF Brickell","year":"1988","unstructured":"Brickell, E.F., Yacobi, Y.: On privacy homomorphisms (extended abstract). In: Chaum, D., Price, W.L. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 117\u2013125. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-39118-5_12"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Catalano, D., et al.: Multiparty computation, an introduction. Contemp. Cryptol. 41\u201387 (2005)","DOI":"10.1007\/3-7643-7394-6_2"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. Cryptology ePrint Archive, Paper 2016\/870 (2016)","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"3_CR14","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. Cryptology ePrint Archive, Paper 2018\/421 (2018). https:\/\/eprint.iacr.org\/2018\/421"},{"key":"3_CR15","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. Cryptology ePrint Archive, Paper 2016\/421 (2016)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.neucom.2022.06.111","volume":"503","author":"SR Dubey","year":"2022","unstructured":"Dubey, S.R., Singh, S.K., Chaudhuri, B.B.: Activation functions in deep learning: a comprehensive survey and benchmark. Neurocomputing 503, 92\u2013108 (2022)","journal-title":"Neurocomputing"},{"key":"3_CR17","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012:144 (2012)"},{"key":"3_CR18","unstructured":"Gil-Alana, L.A., Cuestas, J.C.: A non-linear approach with long range dependence based on Chebyshev polynomials (2012)"},{"key":"3_CR19","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp. 201\u2013210. PMLR (2016)"},{"key":"3_CR20","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/978-3-030-30577-2_84","volume-title":"Proceedings of ICETIT 2019","author":"N Gupta","year":"2020","unstructured":"Gupta, N., Bedi, P., Jindal, V.: Effect of activation functions on the performance of deep learning algorithms for network intrusion detection systems. In: Singh, P.K., Panigrahi, B.K., Suryadevara, N.K., Sharma, S.K., Singh, A.P. (eds.) Proceedings of ICETIT 2019. LNEE, vol. 605, pp. 949\u2013960. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-30577-2_84"},{"key":"3_CR21","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009). http:\/\/crypto.stanford.edu\/craig"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Ghahramani, Z.: Unsupervised Learning, pp. 72\u2013112. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-28650-9_5"},{"key":"3_CR23","unstructured":"Hu, Y., Huber, A., Anumula, J., Liu, S.-C.: Overcoming the vanishing gradient problem in plain recurrent networks. arXiv preprint arXiv:1801.06105 (2018)"},{"key":"3_CR24","unstructured":"He, J., Li, L., Xu, J., Zheng, C.: Relu deep neural networks and linear finite elements. arXiv preprint arXiv:1807.03973 (2018)"},{"key":"3_CR25","unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M.: CryptoDL: deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition (2015)","DOI":"10.1109\/CVPR.2016.90"},{"issue":"5","key":"3_CR27","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.beth.2020.05.002","volume":"51","author":"T Jiang","year":"2020","unstructured":"Jiang, T., Gradus, J.L., Rosellini, A.J.: Supervised machine learning: a brief primer. Behav. Ther. 51(5), 675\u2013687 (2020)","journal-title":"Behav. Ther."},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Jiang, X., Kim, M., Lauter, K., Song, Y.: Secure outsourced matrix computation and application to neural networks. Cryptology ePrint Archive, Paper 2018\/1041 (2018)","DOI":"10.1145\/3243734.3243837"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Jennewein, D.M., et al.: The sol supercomputer at Arizona state university. In: PEARC 2023, pp. 296\u2013301. Association for Computing Machinery, New York (2023)","DOI":"10.1145\/3569951.3597573"},{"key":"3_CR30","unstructured":"Juvekar, C., Vaikuntanathan, V., Chandrakasan, A.: GAZELLE: a low latency framework for secure neural network inference. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 1651\u20131669. USENIX Association, Baltimore (2018)"},{"key":"3_CR31","doi-asserted-by":"publisher","first-page":"2175","DOI":"10.1109\/TIFS.2023.3263631","volume":"18","author":"D Kim","year":"2023","unstructured":"Kim, D., Guyot, C.: Optimized privacy-preserving CNN inference with fully homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 18, 2175\u20132187 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR32","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Pereira, F., Burges, C.J., Bottou, L., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol.\u00a025. Curran Associates, Inc. (2012)"},{"issue":"11","key":"3_CR33","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via minionn transformations. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 619\u2013631 (2017)","DOI":"10.1145\/3133956.3134056"},{"key":"3_CR35","doi-asserted-by":"publisher","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","volume":"10","author":"J-W Lee","year":"2022","unstructured":"Lee, J.-W., et al.: Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access 10, 30039\u201330054 (2022)","journal-title":"IEEE Access"},{"key":"3_CR36","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. Cryptology ePrint Archive, Paper 2012\/230 (2012)"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Magd, H., Jonathan, H., Khan, S.A., El\u00a0Geddawy, M.: Artificial intelligence\u2014the driving force of industry 4.0. A roadmap for enabling industry 4.0 by artificial intelligence, pp. 1\u201315 (2022)","DOI":"10.1002\/9781119905141.ch1"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Narumanchi, H., Goyal, D., Emmadi, N., Gauravaram, P.: Performance analysis of sorting of FHE data: integer-wise comparison vs bit-wise comparison. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 902\u2013908. IEEE (2017)","DOI":"10.1109\/AINA.2017.85"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Njungle, N.B., Jahns, E., Wu, Z., Mastromauro, L., Stojkov, M., Kinsy, M.: GuardianML: anatomy of privacy-preserving machine learning techniques and frameworks. IEEE Access (2025)","DOI":"10.1109\/ACCESS.2025.3557228"},{"issue":"3","key":"3_CR40","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.1007\/s12083-021-01076-8","volume":"14","author":"B Pulido-Gaytan","year":"2021","unstructured":"Pulido-Gaytan, B., et al.: Privacy-preserving neural networks with homomorphic encryption: C hallenges and opportunities. Peer-to-Peer Netw. Appl. 14(3), 1666\u20131691 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"3_CR41","doi-asserted-by":"publisher","first-page":"117477","DOI":"10.1109\/ACCESS.2022.3219049","volume":"10","author":"R Podschwadt","year":"2022","unstructured":"Podschwadt, R., Takabi, D., Peizhao, H., Rafiei, M.H., Cai, Z.: A survey of deep learning architectures for privacy-preserving machine learning with fully homomorphic encryption. IEEE Access 10, 117477\u2013117500 (2022)","journal-title":"IEEE Access"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing (2005)","DOI":"10.1145\/1060590.1060603"},{"issue":"4","key":"3_CR43","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s13748-020-00218-y","volume":"9","author":"M Roodschild","year":"2020","unstructured":"Roodschild, M., Gotay\u00a0Sardi\u00f1as, J., Will, A.: A new approach for the vanishing gradient problem on sigmoid activation. Progress Artif. Intell. 9(4), 351\u2013360 (2020). https:\/\/doi.org\/10.1007\/s13748-020-00218-y","journal-title":"Progress Artif. Intell."},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Rovida, L., Leporati, A.: Encrypted image classification with low memory footprint using fully homomorphic encryption. Cryptology ePrint Archive, Paper 2024\/460 (2024)","DOI":"10.1142\/S0129065724500254"},{"key":"3_CR45","unstructured":"Sadegh Riazi, M., Samragh, M., Chen, H., Laine, K., Lauter, K., Koushanfar, F.: $$\\{$$XONN$$\\}$$:$$\\{$$XNOR-based$$\\}$$ oblivious deep neural network inference. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 1501\u20131518 (2019)"},{"key":"3_CR46","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-981-13-7082-3_34","volume-title":"Innovations in Computer Science and Engineering","author":"RR Salavi","year":"2019","unstructured":"Salavi, R.R., Math, M.M., Kulkarni, U.P.: A survey of various cryptographic techniques: from traditional cryptography to fully homomorphic encryption. In: Saini, H.S., Sayal, R., Govardhan, A., Buyya, R. (eds.) Innovations in Computer Science and Engineering. LNNS, vol. 74, pp. 295\u2013305. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-7082-3_34"},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"Sivamayil, K., Rajasekar, E., Aljafari, B., Nikolovski, S., Vairavasundaram, S., Vairavasundaram, I.: A systematic study on reinforcement learning based applications. Energies 16(3) (2023)","DOI":"10.3390\/en16031512"},{"issue":"12","key":"3_CR48","first-page":"310","volume":"6","author":"S Sharma","year":"2017","unstructured":"Sharma, S., Sharma, S., Athaiya, A.: Activation functions in neural networks. Towards Data Sci. 6(12), 310\u2013316 (2017)","journal-title":"Towards Data Sci."},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Tourky, D., ElKawkagy, M., Keshk, A.: Homomorphic encryption the \u201choly grail\u201d of cryptography. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), pp. 196\u2013201 (2016). Accessed 06 Mar 2024","DOI":"10.1109\/CompComm.2016.7924692"},{"issue":"1","key":"3_CR50","first-page":"6535834","volume":"2020","author":"MI Tariq","year":"2020","unstructured":"Tariq, M.I., et al.: A review of deep learning security and privacy defensive techniques. Mob. Inf. Syst. 2020(1), 6535834 (2020)","journal-title":"Mob. Inf. Syst."},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Virmani, D., Ghori, Md.A.S., Tyagi, N., Ambilwade, R.P., Patil, P.R., Sharma, M.K.: Machine learning: the driving force behind intelligent systems and predictive analytics. In: 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies, pp. 1\u20136. IEEE (2024)","DOI":"10.1109\/TQCEBT59414.2024.10545166"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97260-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T07:44:58Z","timestamp":1757231098000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97260-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"ISBN":["9783031972591","9783031972607"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97260-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,2]]},"assertion":[{"value":"2 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/africacrypt2025.sciencesconf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}