{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:47:26Z","timestamp":1760316446255,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032078834","type":"print"},{"value":"9783032078841","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07884-1_3","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:22:06Z","timestamp":1760286126000},"page":"42-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Abuse-Resistant Evaluation of\u00a0AI-as-a-Service via\u00a0Function-Hiding Homomorphic Signatures"],"prefix":"10.1007","author":[{"given":"Nuttapong","family":"Attrapadung","sequence":"first","affiliation":[]},{"given":"Goichiro","family":"Hanaoaka","sequence":"additional","affiliation":[]},{"given":"Ryo","family":"Hiromasa","sequence":"additional","affiliation":[]},{"given":"Yoshihiro","family":"Koseki","sequence":"additional","affiliation":[]},{"given":"Takahiro","family":"Matsuda","sequence":"additional","affiliation":[]},{"given":"Yutaro","family":"Nishida","sequence":"additional","affiliation":[]},{"given":"Yusuke","family":"Sakai","sequence":"additional","affiliation":[]},{"given":"Jacob C. N.","family":"Schuldt","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Yasuda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"issue":"2","key":"3_CR1","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00145-014-9196-7","volume":"29","author":"M Abe","year":"2015","unstructured":"Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-preserving signatures and commitments to group elements. J. Cryptol. 29(2), 363\u2013421 (2015). https:\/\/doi.org\/10.1007\/s00145-014-9196-7","journal-title":"J. Cryptol."},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Abe, M., Groth, J., Haralambiev, K., Ohkubo, M.: Optimal structure-preserving signatures in asymmetric bilinear groups. In: Rogaway, P. (ed.) CRYPTO\u00a02011. LNCS, vol.\u00a06841, pp. 649\u2013666. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_37","DOI":"10.1007\/978-3-642-22792-9_37"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., Shelat, A., Waters, B.: Computing on authenticated data. In: Cramer, R. (ed.) TCC\u00a02012. LNCS, vol.\u00a07194, pp. 1\u201320. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28914-9_1","DOI":"10.1007\/978-3-642-28914-9_1"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Attrapadung, N., et al.: Privacy-preserving verifiable CNNs. In: P\u00f6pper, C., Batina, L. (eds.) ACNS 2024, Part\u00a0II. LNCS, vol. 14584, pp. 373\u2013402. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-54773-7_15","DOI":"10.1007\/978-3-031-54773-7_15"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Attrapadung, N., Libert, B., Peters, T.: Computing on authenticated data: New privacy definitions and constructions. In: Wang, X., Sako, K. (eds.) ASIACRYPT\u00a02012. LNCS, vol.\u00a07658, pp. 367\u2013385. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_23","DOI":"10.1007\/978-3-642-34961-4_23"},{"key":"3_CR6","unstructured":"Chiesa, A., Tromer, E.: Proof-carrying data and hearsay arguments from signature cards. In: Yao, A.C.C. (ed.) ICS 2010, pp. 310\u2013331. Tsinghua University Press (2010)"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Datta, T., Chen, B., Boneh, D.: VerITAS: verifying image transformations at scale. In: 2025 IEEE Symposium on Security and Privacy (SP), pp. 97\u201397. IEEE Computer Society, Los Alamitos, CA, USA (2025). https:\/\/doi.org\/10.1109\/SP61157.2025.00097","DOI":"10.1109\/SP61157.2025.00097"},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Della\u00a0Monica, P., Visconti, I., Vitaletti, A., Zecchini, M.: Trust nobody: privacy-preserving proofs for edited photos with your laptop. In: 2025 IEEE Symposium on Security and Privacy (SP), pp. 14\u201314. IEEE Computer Society, Los Alamitos, CA, USA (2025). https:\/\/doi.org\/10.1109\/SP61157.2025.00014","DOI":"10.1109\/SP61157.2025.00014"},{"key":"3_CR9","unstructured":"Feng, B., Qin, L., Zhang, Z., Ding, Y., Chu, S.: ZEN: An optimizing compiler for verifiable, zero-knowledge neural network inferences. Cryptology ePrint Archive, Report 2021\/087 (2021). https:\/\/eprint.iacr.org\/2021\/087"},{"issue":"2","key":"3_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Gorbunov, S., Vaikuntanathan, V., Wichs, D.: Leveled fully homomorphic signatures from standard lattices. In: Servedio, R.A., Rubinfeld, R. (eds.) 47th ACM STOC, pp. 469\u2013477. ACM Press (2015). https:\/\/doi.org\/10.1145\/2746539.2746576","DOI":"10.1145\/2746539.2746576"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.S. (eds.) EUROCRYPT\u00a02016, Part\u00a0II. LNCS, vol.\u00a09666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11","DOI":"10.1007\/978-3-662-49896-5_11"},{"issue":"3","key":"3_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2220357.2220358","volume":"59","author":"J Groth","year":"2012","unstructured":"Groth, J., Ostrovsky, R., Sahai, A.: New techniques for noninteractive zero-knowledge. J. ACM 59(3), 1\u201335 (2012)","journal-title":"J. ACM"},{"issue":"5","key":"3_CR14","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1137\/080725386","volume":"41","author":"J Groth","year":"2012","unstructured":"Groth, J., Sahai, A.: Efficient noninteractive proof systems for bilinear groups. SIAM J. Comput. 41(5), 1193\u20131232 (2012)","journal-title":"SIAM J. Comput."},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"He, Z., Zhang, T., Lee, R.B.: Model inversion attacks against collaborative inference. In: Balenson, D. (ed.) ACM ACSAC 19, pp. 148\u2013162. ACM Press (2022). https:\/\/doi.org\/10.1145\/3548606.3559393","DOI":"10.1145\/3548606.3559393"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Johnson, R., Molnar, D., Song, D.X., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA\u00a02002. LNCS, vol.\u00a02271, pp. 244\u2013262. Springer, Berlin, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45760-7_17","DOI":"10.1007\/3-540-45760-7_17"},{"key":"3_CR17","unstructured":"Kang, D., Hashimoto, T., Stoica, I., Sun, Y.: ZK-IMG: attested images via zero-knowledge proofs to fight disinformation. arXiv:2211.04775 (Nov 2022)"},{"key":"3_CR18","unstructured":"Krizhevsky, A.: The CIFAR-10 dataset. https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html"},{"key":"3_CR19","unstructured":"LeCun, Y., Cortes, C., Burges, C.J.C.: The MNIST database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Lee, S., Ko, H., Kim, J., Oh, H.: VCNN: verifiable convolutional neural network based on ZK-Snarks. IEEE Trans. Dependable Secure Comput. 21(4), 4254\u20134270 (2024)","DOI":"10.1109\/TDSC.2023.3348760"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Li, K.H., Hsu, C.F., Chang, M.C., Liu, F.H., Chien, S.Y., Chen, W.C.: Region-aware photo assurance system for image authentication. In: MIPR 2023, pp.\u00a01\u20136. IEEE Computer Society Press (2023). https:\/\/doi.org\/10.1109\/MIPR59079.2023.00037","DOI":"10.1109\/MIPR59079.2023.00037"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Liu, T., Xie, X., Zhang, Y.: zkCNN: zero knowledge proofs for convolutional neural network predictions and accuracy. In: Vigna, G., Shi, E. (eds.) ACM CCS 2021, pp. 2968\u20132985. ACM Press (2021). https:\/\/doi.org\/10.1145\/3460120.3485379","DOI":"10.1145\/3460120.3485379"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Milli, S., Schmidt, L., Dragan, A.D., Hardt, M.: Model reconstruction from model explanations. In: Proceedings of the Conference on Fairness, Accountability, and Transparency, pp. 1\u20139. Association for Computing Machinery, New York, NY, USA (2019)","DOI":"10.1145\/3287560.3287562"},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy, pp. 19\u201338. IEEE Computer Society Press (2017). https:\/\/doi.org\/10.1109\/SP.2017.12","DOI":"10.1109\/SP.2017.12"},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Naveh, A., Tromer, E.: PhotoProof: cryptographic image authentication for any set of permissible transformations. In: 2016 IEEE Symposium on Security and Privacy, pp. 255\u2013271. IEEE Computer Society Press (2016). https:\/\/doi.org\/10.1109\/SP.2016.23","DOI":"10.1109\/SP.2016.23"},{"key":"3_CR26","unstructured":"OpenAI: ChatGPT (2024). https:\/\/openai.com\/chatgpt\/"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Weng, J., Weng, J., Tang, G., Yang, A., Li, M., Liu, J.N.: PVCNN: privacy-preserving and verifiable convolutional neural network testing. IEEE Trans. Inf. Forensics Secur. 18, 2218\u20132233 (2023)","DOI":"10.1109\/TIFS.2023.3262932"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07884-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:22:09Z","timestamp":1760286129000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07884-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032078834","9783032078841"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07884-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}