{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:50:24Z","timestamp":1762509024502,"version":"3.37.3"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020AAA0107703"],"award-info":[{"award-number":["2020AAA0107703"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132008","62071222"],"award-info":[{"award-number":["62132008","62071222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province, China","doi-asserted-by":"publisher","award":["BK20220075","BK20200418"],"award-info":[{"award-number":["BK20220075","BK20200418"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Initiation Project of Zhejiang Laboratory","award":["2022PD0AC02"],"award-info":[{"award-number":["2022PD0AC02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3290483","type":"journal-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T17:19:39Z","timestamp":1687972779000},"page":"4214-4228","source":"Crossref","is-referenced-by-count":6,"title":["VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear Computations"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4817-2744","authenticated-orcid":false,"given":"Weibin","family":"Wu","sequence":"first","affiliation":[{"name":"Department of College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0481-5341","authenticated-orcid":false,"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg"}]},{"given":"Yangpan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of School of Mathematical Sciences, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8578-2635","authenticated-orcid":false,"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Lu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Management Science and Information Systems, Rutgers University, New Brunswick, NJ, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref12","first-page":"409","article-title":"Homomorphic encryption for arithmetic of approximate numbers","author":"cheon","year":"2017","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"},{"journal-title":"Extensions to the Paillier cryptosystem with applications to cryptological protocols","year":"2003","author":"jurik","key":"ref15"},{"journal-title":"Speedtest Global Index&#x2014;Internet Speed Around the World","year":"2022","key":"ref14"},{"key":"ref11","first-page":"868","article-title":"Fully homomorphic encryption without modulus switching from classical GapSVP","author":"brakerski","year":"2012","journal-title":"Proc Annu Cryptol Conf"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref17","first-page":"106","article-title":"Optimized Paillier&#x2019;s cryptosystem with fast encryption and decryption","author":"ma","year":"2021","journal-title":"Proc Comput Secur Appl Conf"},{"article-title":"Encryption performance improvements of the Paillier cryptosystem","year":"0","author":"jost","key":"ref16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322329"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.152"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref45"},{"journal-title":"Intel avx-512 instructions and their use in the implementation of math functions","year":"2015","author":"cornea","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref42","first-page":"525","article-title":"Xnor-Net: Imagenet classification using binary convolutional neural networks","author":"rastegari","year":"2016","journal-title":"Proc Eur Conf Comput Vis"},{"article-title":"REDsec: Running encrypted discretized neural networks in seconds","year":"2021","author":"folkerts","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8060661"},{"key":"ref49","first-page":"388","article-title":"Lower bounds for linear satisfiability problems","author":"erickson","year":"1995","journal-title":"Proc SODA"},{"key":"ref8","first-page":"34","article-title":"Practical packing method in somewhat homomorphic encryption","author":"yasuda","year":"2013","journal-title":"Data Privacy Management and Autonomous Spontaneous Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732292"},{"key":"ref4","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","author":"juvekar","year":"2018","journal-title":"Proc 27th USENIX Secur Symp (USENIX Security)"},{"key":"ref3","article-title":"Popcorn: Paillier meets compression for efficient oblivious neural network inference","author":"wang","year":"2021","journal-title":"arXiv 2107 01786"},{"key":"ref6","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"gilad-bachrach","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref5","first-page":"809","article-title":"Cheetah: Lean and fast secure two-party deep neural network inference","author":"huang","year":"2022","journal-title":"Proc 31st USENIX Secur Symp (USENIX Security)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486926"},{"key":"ref35","first-page":"554","article-title":"Algorithms in HElib","author":"halevi","year":"2014","journal-title":"Proc Annu Cryptol Conf"},{"year":"2022","key":"ref34"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5772\/51942"},{"key":"ref36","article-title":"An introduction to convolutional neural networks","author":"o\u2019shea","year":"2015","journal-title":"arXiv 1511 08458"},{"journal-title":"OPHELib","year":"2021","key":"ref31"},{"key":"ref30","first-page":"519","article-title":"Answering aggregation queries in a secure system model","author":"ge","year":"2007","journal-title":"Proc 33rd Int Conf Large Data Bases"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_15"},{"article-title":"SP 800-56b. Recommendation for pair-wise key establishment schemes using integer factorization cryptography","year":"2009","author":"barker","key":"ref32"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2676130"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212483"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"ref23","article-title":"Deep learning using rectified linear units (ReLU)","author":"fred agarap","year":"2018","journal-title":"arXiv 1803 08375"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref25","first-page":"420","article-title":"Efficient multiparty protocols using circuit randomization","author":"beaver","year":"1991","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3215977"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2786247"},{"journal-title":"Chinese Remainder Theorem Applications in Computing Coding Cryptography","year":"1996","author":"pei","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267976"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2361407.2361420"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10167664.pdf?arnumber=10167664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T17:59:42Z","timestamp":1694455182000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10167664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3290483","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2023]]}}}