{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:10:00Z","timestamp":1778789400018,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2500"],"award-info":[{"award-number":["N00014-17-1-2500"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["2016-TS-269"],"award-info":[{"award-number":["2016-TS-269"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation Trust-Hub","award":["CNS-1649423"],"award-info":[{"award-number":["CNS-1649423"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1619261"],"award-info":[{"award-number":["CNS-1619261"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196522","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"707-721","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":336,"title":["Chameleon"],"prefix":"10.1145","author":[{"given":"M. Sadegh","family":"Riazi","sequence":"first","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"given":"Christian","family":"Weinert","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Oleksandr","family":"Tkachenko","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Ebrahim M.","family":"Songhori","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"given":"Thomas","family":"Schneider","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"M. Abadi P. Barham J. Chen Z. Chen A. Davis J. Dean M. Devin S. Ghemawat G. Irving M. Isard M. Kudlur J. Levenberg R. Monga S. Moore D. G. Murray B. Steiner P. A. Tucker V. Vasudevan P. Warden M. Wicke Y. Yu and X. Zheng . 2016. TensorFlow: A System for Large-Scale Machine Learning OSDI.   M. Abadi P. Barham J. Chen Z. Chen A. Davis J. Dean M. Devin S. Ghemawat G. Irving M. Isard M. Kudlur J. Levenberg R. Monga S. Moore D. G. Murray B. Steiner P. A. Tucker V. Vasudevan P. Warden M. Wicke Y. Yu and X. Zheng . 2016. TensorFlow: A System for Large-Scale Machine Learning OSDI."},{"key":"e_1_3_2_1_2_1","unstructured":"M. Aliasgari M. Blanton Y. Zhang and A. Steele . 2013. Secure Computation on Floating Point Numbers. In NDSS.  M. Aliasgari M. Blanton Y. Zhang and A. Steele . 2013. Secure Computation on Floating Point Numbers. In NDSS."},{"key":"e_1_3_2_1_3_1","volume-title":"Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier","author":"Araki T.","unstructured":"T. Araki , A. Barak , J. Furukawa , T. Lichter , Y. Lindell , A. Nof , K. Ohara , A. Watzman , and O. Weinstein . 2017. Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier . In IEEE S &P. T. Araki, A. Barak, J. Furukawa, T. Lichter, Y. Lindell, A. Nof, K. Ohara, A. Watzman, and O. Weinstein . 2017. Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier. In IEEE S&P."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"R. Bahmani M. Barbosa F. Brasser B. Portela A.-R. Sadeghi G. Scerri and B. Warinschi . 2017. Secure multiparty computation from SGX. In FC.  R. Bahmani M. Barbosa F. Brasser B. Portela A.-R. Sadeghi G. Scerri and B. Warinschi . 2017. Secure multiparty computation from SGX. In FC.","DOI":"10.1007\/978-3-319-70972-7_27"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"M. Barni P. Failla V. Kolesnikov R. Lazzeretti A.-R. Sadeghi and T. Schneider . 2009. Secure evaluation of private linear branching programs with medical applications ESORICS.   M. Barni P. Failla V. Kolesnikov R. Lazzeretti A.-R. Sadeghi and T. Schneider . 2009. Secure evaluation of private linear branching programs with medical applications ESORICS.","DOI":"10.1007\/978-3-642-04444-1_26"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108650"},{"key":"e_1_3_2_1_11_1","unstructured":"D. Beaver . 1991. Efficient multiparty protocols using circuit randomization CRYPTO.   D. Beaver . 1991. Efficient multiparty protocols using circuit randomization CRYPTO."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"D. Beaver . 1995. Precomputing oblivious transfer. In CRYPTO.   D. Beaver . 1995. Precomputing oblivious transfer. In CRYPTO.","DOI":"10.1007\/3-540-44750-4_8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237996"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978347"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"M. Blanton and P. Gasti . 2011. Secure and efficient protocols for iris and fingerprint identification ESORICS.   M. Blanton and P. Gasti . 2011. Secure and efficient protocols for iris and fingerprint identification ESORICS.","DOI":"10.1007\/978-3-642-23822-2_11"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0177-2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"R. Bost R. A. Popa S. Tu and S. Goldwasser . 2015. Machine Learning Classification over Encrypted Data NDSS.  R. Bost R. A. Popa S. Tu and S. Goldwasser . 2015. Machine Learning Classification over Encrypted Data NDSS.","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315307"},{"key":"e_1_3_2_1_22_1","volume-title":"SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. USENIX Security","author":"Burkhart M.","year":"2010","unstructured":"M. Burkhart , M. Strasser , D. Many , and X. Dimitropoulos . 2010 . SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. USENIX Security (2010). M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos . 2010. SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. USENIX Security (2010)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664255"},{"key":"e_1_3_2_1_24_1","unstructured":"H. Carter B. Mood P. Traynor and K. R. B. Butler . 2013. Secure Outsourced Garbled Circuit Evaluation for Mobile Devices USENIX Security.   H. Carter B. Mood P. Traynor and K. R. B. Butler . 2013. Secure Outsourced Garbled Circuit Evaluation for Mobile Devices USENIX Security."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"H. Carter B. Mood P. Traynor and K. R. B. Butler . 2015. Outsourcing Secure Two-Party Computation as a Black Box CANS.  H. Carter B. Mood P. Traynor and K. R. B. Butler . 2015. Outsourcing Secure Two-Party Computation as a Black Box CANS.","DOI":"10.1007\/978-3-319-26823-1_15"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"H. Carter B. Mood P. Traynor and K. R. B. Butler . 2016. Secure outsourced garbled circuit evaluation for mobile devices Journal of Computer Security.  H. Carter B. Mood P. Traynor and K. R. B. Butler . 2016. Secure outsourced garbled circuit evaluation for mobile devices Journal of Computer Security.","DOI":"10.3233\/JCS-150540"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"e_1_3_2_1_30_1","unstructured":"F. Chollet . 2015. keras. https:\/\/github.com\/fchollet\/keras. (2015).  F. Chollet . 2015. keras. https:\/\/github.com\/fchollet\/keras. (2015)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd M. Geisler M. Kr\u00f8igaard and J. B. Nielsen . 2009. Asynchronous multiparty computation: Theory and implementation PKC.  I. Damg\u00e5rd M. Geisler M. Kr\u00f8igaard and J. B. Nielsen . 2009. Asynchronous multiparty computation: Theory and implementation PKC.","DOI":"10.1007\/978-3-642-00468-1_10"},{"key":"e_1_3_2_1_32_1","volume-title":"Smart, and S. Zakarias","author":"Damg\u00e5rd I.","year":"2012","unstructured":"I. Damg\u00e5rd , V. Pastro , N. Smart, and S. Zakarias . 2012 . Multiparty computation from somewhat homomorphic encryption CRYPTO. I. Damg\u00e5rd, V. Pastro, N. Smart, and S. Zakarias . 2012. Multiparty computation from somewhat homomorphic encryption CRYPTO."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813678"},{"key":"e_1_3_2_1_34_1","unstructured":"D. Demmler T. Schneider and M. Zohner . 2014. Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens. USENIX Security.   D. Demmler T. Schneider and M. Zohner . 2014. Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens. USENIX Security."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"D. Demmler T. Schneider and M. Zohner . 2015 b. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. NDSS.  D. Demmler T. Schneider and M. Zohner . 2015 b. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. NDSS.","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_36_1","unstructured":"N. Dowlin R. Gilad-Bachrach K. Laine K. Lauter M. Naehrig and J. Wernsing . 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy ICML.   N. Dowlin R. Gilad-Bachrach K. Laine K. Lauter M. Naehrig and J. Wernsing . 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy ICML."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"W. Du and M. J. Atallah . 2001. Protocols for secure remote database access with approximate matching E-Commerce Security and Privacy.  W. Du and M. J. Atallah . 2001. Protocols for secure remote database access with approximate matching E-Commerce Security and Privacy.","DOI":"10.1007\/978-1-4615-1467-1_6"},{"key":"e_1_3_2_1_38_1","volume-title":"EU Workshop on Secure Multiparty Protocols.","author":"Feigenbaum J.","year":"2004","unstructured":"J. Feigenbaum , B. Pinkas , R. Ryger , and F. Saint-Jean . 2004 . Secure computation of surveys . In EU Workshop on Secure Multiparty Protocols. J. Feigenbaum, B. Pinkas, R. Ryger, and F. Saint-Jean . 2004. Secure computation of surveys. In EU Workshop on Secure Multiparty Protocols."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"J. Furukawa Y. Lindell A. Nof and O. Weinstein . 2017. High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority. In EUROCRYPT.  J. Furukawa Y. Lindell A. Nof and O. Weinstein . 2017. High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority. In EUROCRYPT.","DOI":"10.1007\/978-3-319-56614-6_8"},{"key":"e_1_3_2_1_40_1","volume-title":"Foundations of cryptography","author":"Goldreich O.","unstructured":"O. Goldreich . 2009. Foundations of cryptography : volume 2 , basic applications. Cambridge university press . O. Goldreich . 2009. Foundations of cryptography: volume 2, basic applications. Cambridge university press."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.28"},{"key":"e_1_3_2_1_44_1","unstructured":"E. Hesamifard H. Takabi and M. Ghasemi . 2017. CryptoDL: Deep Neural Networks over Encrypted Data. arXiv preprint arXiv:1711.05189. (2017).  E. Hesamifard H. Takabi and M. Ghasemi . 2017. CryptoDL: Deep Neural Networks over Encrypted Data. arXiv preprint arXiv:1711.05189. (2017)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382278"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Y. Huang D. Evans J. Katz and L. Malka . 2011. Faster Secure Two-Party Computation Using Garbled Circuits. USENIX Security.   Y. Huang D. Evans J. Katz and L. Malka . 2011. Faster Secure Two-Party Computation Using Garbled Circuits. USENIX Security.","DOI":"10.1007\/978-3-642-25560-1_2"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Y. Ishai J. Kilian K. Nissim and E. Petrank . 2003. Extending oblivious transfers efficiently. In CRYPTO.  Y. Ishai J. Kilian K. Nissim and E. Petrank . 2003. Extending oblivious transfers efficiently. In CRYPTO.","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"e_1_3_2_1_49_1","volume-title":"jie Lu and J. Sakuma","author":"W.","year":"2018","unstructured":"W. jie Lu and J. Sakuma . 2018 . Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth. Cryptology ePrint Archive, Report 2018\/139. (2018). W. jie Lu and J. Sakuma . 2018. Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth. Cryptology ePrint Archive, Report 2018\/139. (2018)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382280"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"F. Kerschbaum T. Schneider and A. Schr\u00f6pfer . 2014. Automatic protocol selection in secure two-party computations ACNS.  F. Kerschbaum T. Schneider and A. Schr\u00f6pfer . 2014. Automatic protocol selection in secure two-party computations ACNS.","DOI":"10.1007\/978-3-319-07536-5_33"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"e_1_3_2_1_53_1","volume-title":"PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation USENIX Security.","author":"Kreuter B.","year":"2013","unstructured":"B. Kreuter , A. Shelat , B. Mood , and K. R. Butler . 2013 . PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation USENIX Security. B. Kreuter, A. Shelat, B. Mood, and K. R. Butler . 2013. PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation USENIX Security."},{"key":"e_1_3_2_1_54_1","unstructured":"B. Kreuter A. Shelat and C.-H. Shen . 2012. Billion-Gate Secure Computation with Malicious Adversaries. USENIX Security.   B. Kreuter A. Shelat and C.-H. Shen . 2012. Billion-Gate Secure Computation with Malicious Adversaries. USENIX Security."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"T. Krips and J. Willemson . 2014. Hybrid model of fixed and floating point numbers in secure multiparty computations ISC.  T. Krips and J. Willemson . 2014. Hybrid model of fixed and floating point numbers in secure multiparty computations ISC.","DOI":"10.1007\/978-3-319-13257-0_11"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150477"},{"key":"e_1_3_2_1_58_1","volume-title":"Privacy-Preserving Deep Learning via Additively Homomorphic Encryption","author":"Le Trieu Phong Y. A.","year":"2018","unstructured":"Y. A. Le Trieu Phong , T. Hayashi , L. Wang , and S. Moriai . 2018. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption . IEEE TIFS ( 2018 ). Y. A. Le Trieu Phong, T. Hayashi, L. Wang, and S. Moriai . 2018. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IEEE TIFS (2018)."},{"key":"e_1_3_2_1_59_1","unstructured":"Y. LeCun C. Cortes and C. Burges . 2017. MNIST dataset. http:\/\/yann.lecun.com\/exdb\/mnist\/. (2017).  Y. LeCun C. Cortes and C. Burges . 2017. MNIST dataset. http:\/\/yann.lecun.com\/exdb\/mnist\/. (2017)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Y. Lindell and B. Pinkas . 2000. Privacy Preserving Data Mining. In CRYPTO.   Y. Lindell and B. Pinkas . 2000. Privacy Preserving Data Mining. In CRYPTO.","DOI":"10.1007\/3-540-44598-6_3"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2587258"},{"key":"e_1_3_2_1_64_1","volume-title":"Smart, and F. Vercauteren","author":"Makri E.","year":"2017","unstructured":"E. Makri , D. Rotaru , N. P. Smart, and F. Vercauteren . 2017 . PICS : Private Image Classification with SVM. Cryptology ePrint Archive, Report 2017\/1190. (2017). E. Makri, D. Rotaru, N. P. Smart, and F. Vercauteren . 2017. PICS: Private Image Classification with SVM. Cryptology ePrint Archive, Report 2017\/1190. (2017)."},{"key":"e_1_3_2_1_65_1","unstructured":"D. Malkhi N. Nisan B. Pinkas and Y. Sella . 2004. Fairplay-Secure Two-Party Computation System.. In USENIX Security.   D. Malkhi N. Nisan B. Pinkas and Y. Sella . 2004. Fairplay-Secure Two-Party Computation System.. In USENIX Security."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"P. Mohassel O. Orobets and B. Riva . 2016. Efficient Server-Aided 2PC for Mobile Phones. In PoPETs.  P. Mohassel O. Orobets and B. Riva . 2016. Efficient Server-Aided 2PC for Mobile Phones. In PoPETs.","DOI":"10.1515\/popets-2016-0006"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"P. Mohassel and Y. Zhang . 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning IEEE S&P.  P. Mohassel and Y. Zhang . 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning IEEE S&P.","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_68_1","volume-title":"Frigate: A validated, extensible, and efficient compiler and interpreter for secure computation","author":"Mood B.","year":"2016","unstructured":"B. Mood , D. Gupta , H. Carter , K. Butler , and P. Traynor . 2016 . Frigate: A validated, extensible, and efficient compiler and interpreter for secure computation . In IEEE EuroS &P. B. Mood, D. Gupta, H. Carter, K. Butler, and P. Traynor . 2016. Frigate: A validated, extensible, and efficient compiler and interpreter for secure computation. In IEEE EuroS&P."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"C. Orlandi A. Piva and M. Barni . 2007. Oblivious Neural Network Computing via Homomorphic Encryption EURASIP Journal on Information Security.  C. Orlandi A. Piva and M. Barni . 2007. Oblivious Neural Network Computing via Homomorphic Encryption EURASIP Journal on Information Security.","DOI":"10.1155\/2007\/37343"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"crossref","unstructured":"N. Papernot P. D. McDaniel S. Jha M. Fredrikson Z. B. Celik and A. Swami . 2016. The Limitations of Deep Learning in Adversarial Settings IEEE EuroS&P.  N. Papernot P. D. McDaniel S. Jha M. Fredrikson Z. B. Celik and A. Swami . 2016. The Limitations of Deep Learning in Adversarial Settings IEEE EuroS&P.","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"E. Pattuk M. Kantarcioglu H. Ulusoy and B. Malin . 2016. CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud. In DBSec.  E. Pattuk M. Kantarcioglu H. Ulusoy and B. Malin . 2016. CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud. In DBSec.","DOI":"10.1007\/978-3-319-41483-6_20"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"P. Pullonen and S. Siim . 2015. Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations. In FC.  P. Pullonen and S. Siim . 2015. Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations. In FC.","DOI":"10.1007\/978-3-662-48051-9_13"},{"key":"e_1_3_2_1_75_1","volume-title":"Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud","author":"Rahulamathavan Y.","unstructured":"Y. Rahulamathavan , R. C.-W. Phan , S. Veluru , K. Cumanan , and M. Rajarajan . 2014. Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud . In IEEE TDSC. Y. Rahulamathavan, R. C.-W. Phan, S. Veluru, K. Cumanan, and M. Rajarajan . 2014. Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. In IEEE TDSC."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062305"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"B. D. Rouhani M. S. Riazi and F. Koushanfar . 2018. DeepSecure: Scalable Provably-Secure Deep Learning. In DAC.  B. D. Rouhani M. S. Riazi and F. Koushanfar . 2018. DeepSecure: Scalable Provably-Secure Deep Learning. In DAC.","DOI":"10.1109\/DAC.2018.8465894"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"A. Sadeghi T. Schneider and I. Wehrenberg . 2009. Efficient Privacy-Preserving Face Recognition. In ICISC.   A. Sadeghi T. Schneider and I. Wehrenberg . 2009. Efficient Privacy-Preserving Face Recognition. In ICISC.","DOI":"10.1007\/978-3-642-14423-3_16"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00730-9_21"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"T. Schneider and M. Zohner . 2013. GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits FC.  T. Schneider and M. Zohner . 2013. GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits FC.","DOI":"10.1007\/978-3-642-39884-1_23"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"S. Sivakorn I. Polakis and A. D. Keromytis . 2016. I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs IEEE EuroS&P.  S. Sivakorn I. Polakis and A. D. Keromytis . 2016. I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs IEEE EuroS&P.","DOI":"10.1109\/EuroSP.2016.37"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.32"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0073-7"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"crossref","unstructured":"S. Zahur M. Rosulek and D. Evans . 2015. Two Halves Make a Whole. In EUROCRYPT.  S. Zahur M. Rosulek and D. Evans . 2015. Two Halves Make a Whole. In EUROCRYPT.","DOI":"10.1007\/978-3-662-46803-6_8"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516752"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196522","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196522","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196522"}},"subtitle":["A Hybrid Secure Computation Framework for Machine Learning Applications"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":82,"alternative-id":["10.1145\/3196494.3196522","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196522","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}