{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:25:46Z","timestamp":1773797146018,"version":"3.50.1"},"reference-count":58,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Korea government","award":["NRF-2017R1C1B5077026"],"award-info":[{"award-number":["NRF-2017R1C1B5077026"]}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2018,11,30]]},"abstract":"<jats:p>There are recommendation systems everywhere in our daily life. The collection of personal data of users by a recommender in the system may cause serious privacy issues. In this article, we propose the first privacy-preserving matrix factorization for recommendation using fully homomorphic encryption. Our protocol performs matrix factorization over encrypted users\u2019 rating data and returns encrypted outputs so that the recommendation system learns nothing on rating values and resulting user\/item profiles. Furthermore, the protocol provides a privacy-preserving method to optimize the tuning parameters that can be a business benefit for the recommendation service providers. To overcome the performance degradation caused by the use of fully homomorphic encryption, we introduce a novel data structure to perform computations over encrypted vectors, which are essential for matrix factorization, through secure two-party computation in part. Our experiments demonstrate the efficiency of our protocol.<\/jats:p>","DOI":"10.1145\/3212509","type":"journal-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T16:37:19Z","timestamp":1530203839000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption"],"prefix":"10.1145","volume":"21","author":[{"given":"Jinsu","family":"Kim","sequence":"first","affiliation":[{"name":"Samsung Research, Samsung Electronics"}]},{"given":"Dongyoung","family":"Koo","sequence":"additional","affiliation":[{"name":"Department of Electronics and Information Engineering, Hansung University"}]},{"given":"Yuna","family":"Kim","sequence":"additional","affiliation":[{"name":"Samsung Research, Samsung Electronics"}]},{"given":"Hyunsoo","family":"Yoon","sequence":"additional","affiliation":[{"name":"The School of Computing, KAIST"}]},{"given":"Junbum","family":"Shin","sequence":"additional","affiliation":[{"name":"Samsung Research, Samsung Electronics"}]},{"given":"Sungwook","family":"Kim","sequence":"additional","affiliation":[{"name":"Samsung Research, Samsung Electronics"}]}],"member":"320","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"List of Countries by Internet Connection Speeds. 2018. Retrieved from https:\/\/en.wikipedia.org\/wiki\/List_of_countries_by_Internet_connection_speeds.  List of Countries by Internet Connection Speeds. 2018. Retrieved from https:\/\/en.wikipedia.org\/wiki\/List_of_countries_by_Internet_connection_speeds."},{"key":"e_1_2_1_2_1","unstructured":"OpenSSL: The Open Source Toolkit for SSL\/TLS. http:\/\/www.openssl.org\/.  OpenSSL: The Open Source Toolkit for SSL\/TLS. http:\/\/www.openssl.org\/."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.99"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033075"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_2_1_12_1","volume-title":"Collaborative filtering with privacy","author":"Canny John","year":"2002","unstructured":"John Canny . 2002. Collaborative filtering with privacy . In IEEE Security Privacy 2002 . 45--57. John Canny. 2002. Collaborative filtering with privacy. In IEEE Security Privacy 2002. 45--57."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_11"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_7"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18038-0_35"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2012.84"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_18"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033074"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190726"},{"key":"e_1_2_1_24_1","volume-title":"Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012. Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive ( 2012 ), 144. Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive (2012), 144."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_1"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"e_1_2_1_30_1","volume-title":"Foundations of Cryptography","author":"Goldreich Oded","unstructured":"Oded Goldreich . 2004. Foundations of Cryptography : Volume 2 , Basic Applications. Cambridge University Press , New York. Oded Goldreich. 2004. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_2_1_32_1","unstructured":"Torbj\u00f6rn Granlund and the GMP development team. GMP -- The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org\/.  Torbj\u00f6rn Granlund and the GMP development team. GMP -- The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org\/."},{"key":"e_1_2_1_33_1","volume-title":"Algorithms in HElib. In CRYPTO","author":"Halevi Shai","year":"2014","unstructured":"Shai Halevi and Victor Shoup . 2014 . Algorithms in HElib. In CRYPTO 2014. 554--571. Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In CRYPTO 2014. 554--571."},{"key":"e_1_2_1_34_1","volume-title":"Bootstrapping for HElib. In EUROCRYPT","author":"Halevi Shai","year":"2015","unstructured":"Shai Halevi and Victor Shoup . 2015 . Bootstrapping for HElib. In EUROCRYPT 2011. 641--670. Shai Halevi and Victor Shoup. 2015. Bootstrapping for HElib. In EUROCRYPT 2011. 641--670."},{"key":"e_1_2_1_35_1","volume-title":"IJCAI","author":"Hua Jingyu","year":"2015","unstructured":"Jingyu Hua , Chang Xia , and Sheng Zhong . 2015 . Differentially private matrix factorization . In IJCAI 2015. 1763--1770. Jingyu Hua, Chang Xia, and Sheng Zhong. 2015. Differentially private matrix factorization. In IJCAI 2015. 1763--1770."},{"key":"e_1_2_1_36_1","volume-title":"USENIX Security","author":"Huang Yan","year":"2011","unstructured":"Yan Huang , David Evans , Jonathan Katz , and Lior Malka . 2011. Faster secure two-party computation using garbled circuits . In USENIX Security 2011 . Yan Huang, David Evans, Jonathan Katz, and Lior Malka. 2011. Faster secure two-party computation using garbled circuits. In USENIX Security 2011."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897875"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557090"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020487"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.30"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968832"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.140"},{"key":"e_1_2_1_48_1","unstructured":"Victor Shoup. NTL: A Library for Doing Number Theory. http:\/\/www.shoup.net\/ntl\/.  Victor Shoup. NTL: A Library for Doing Number Theory. http:\/\/www.shoup.net\/ntl\/."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.32"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/421425"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2008.86"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2370255"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365989"},{"key":"e_1_2_1_57_1","volume-title":"NIPS","author":"Xin Yu","year":"2014","unstructured":"Yu Xin and Tommi Jaakkola . 2014 . Controlling privacy in recommender systems . In NIPS 2014. 2618--2626. Yu Xin and Tommi Jaakkola. 2014. Controlling privacy in recommender systems. In NIPS 2014. 2618--2626."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732967.2732973"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3212509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3212509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:16Z","timestamp":1750287256000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3212509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,27]]},"references-count":58,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,11,30]]}},"alternative-id":["10.1145\/3212509"],"URL":"https:\/\/doi.org\/10.1145\/3212509","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,27]]},"assertion":[{"value":"2017-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}