{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:58:39Z","timestamp":1771232319342,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902149,62311530098,62371411"],"award-info":[{"award-number":["61902149,62311530098,62371411"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"publisher","award":["2024A1515030089"],"award-info":[{"award-number":["2024A1515030089"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,24]]},"DOI":"10.1109\/itw61385.2024.10806949","type":"proceedings-article","created":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:18:57Z","timestamp":1735586337000},"page":"699-704","source":"Crossref","is-referenced-by-count":2,"title":["Towards Quantum-Safe Distributed Learning via Homomorphic Encryption: Learning with Gradients"],"prefix":"10.1109","author":[{"given":"Guangfeng","family":"Yan","sequence":"first","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong SAR,China"}]},{"given":"Shanxiang","family":"Lyu","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University,Guangzhou,China"}]},{"given":"Hanxu","family":"Hou","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong SAR,China"}]},{"given":"Zhiyong","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Mathematics, Renmin University of China,Beijing,China"}]},{"given":"Linqi","family":"Song","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong SAR,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1223","article-title":"Large scale distributed deep networks","author":"Dean","year":"2012","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139042918"},{"key":"ref3","first-page":"2","article-title":"Feder-ated learning of deep networks using model averaging","volume":"2","author":"McMahan","year":"2016","journal-title":"arXiv preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3180828"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref8","first-page":"1379","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","volume-title":"31 st USENIX Security Symposium (USENIX Security 22)","author":"Stevens"},{"key":"ref9","first-page":"493","article-title":"{BatchCrypt}: Efficient homomorphic encryption for {Cross-Silo} federated learning","volume-title":"2020 USENIX annual technical conference (USENIX ATC 20)","author":"Zhang"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148628"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-x_16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11659-4_12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-021-3354-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517882"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref17","article-title":"Learning with quantization: Construction, hardness, and applications","volume-title":"Cryptology ePrint Archive, Paper 2024\/714","author":"Lyu","year":"2024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7644-5_6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"issue":"4","key":"ref21","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1007\/s10623-023-01321-6","article-title":"Lattice codes for lattice-based PKE","volume":"92","author":"Lyu","year":"2024","journal-title":"Des. Codes Cryptogr."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3192050"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/16m1080173"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3284427"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/18.256489"},{"key":"ref29","article-title":"Nested dithered quantization for communication reduction in distributed training","author":"Abdi","year":"2019","journal-title":"arXiv preprint"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010756"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_23"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_20"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38554-4_21"},{"issue":"5","key":"ref35","first-page":"14","volume":"20","author":"LeCun","year":"2015","journal-title":"Lenet-5, convolutional neural networks"}],"event":{"name":"2024 IEEE Information Theory Workshop (ITW)","location":"Shenzhen, China","start":{"date-parts":[[2024,11,24]]},"end":{"date-parts":[[2024,11,28]]}},"container-title":["2024 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10806859\/10806904\/10806949.pdf?arnumber=10806949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T06:25:48Z","timestamp":1735626348000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10806949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,24]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/itw61385.2024.10806949","relation":{},"subject":[],"published":{"date-parts":[[2024,11,24]]}}}