{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T01:36:55Z","timestamp":1766281015339,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"Israel National Cyber Directorate"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338469.3358942","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"21-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Linear-Regression on Packed Encrypted Data in the Two-Server Model"],"prefix":"10.1145","author":[{"given":"Adi","family":"Akavia","sequence":"first","affiliation":[{"name":"University of Haifa, Haifa, Israel"}]},{"given":"Hayim","family":"Shaul","sequence":"additional","affiliation":[{"name":"University of Haifa and IDC Herzliya, Haifa and Herzliya, Israel"}]},{"given":"Mor","family":"Weiss","sequence":"additional","affiliation":[{"name":"IDC Herzliya, Herzliya, Israel"}]},{"given":"Zohar","family":"Yakhini","sequence":"additional","affiliation":[{"name":"IDC Herzliya and Technion, Herzliya and Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"e_1_3_2_1_4_1","first-page":"144","article-title":"Somewhat Practical Fully Homomorphic Encryption","volume":"2012","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012 . Somewhat Practical Fully Homomorphic Encryption . IACR Cryptology ePrint Archive , Vol. 2012 (2012), 144 . Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. IACR Cryptology ePrint Archive , Vol. 2012 (2012), 144.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_5_1","volume-title":"6th International Conference, FC 2002","author":"Fouque Pierre-Alain","year":"2002","unstructured":"Pierre-Alain Fouque , Jacques Stern , and Jan-Geert Wackers . 2002 . CryptoComputing with Rationals. In Financial Cryptography , 6th International Conference, FC 2002 , Southampton, Bermuda, March 11--14 , 2002, Revised Papers. 136--146. https:\/\/doi.org\/10.1007\/3--540--36504--4_10 10.1007\/3--540--36504--4_10 Pierre-Alain Fouque, Jacques Stern, and Jan-Geert Wackers. 2002. CryptoComputing with Rationals. In Financial Cryptography, 6th International Conference, FC 2002, Southampton, Bermuda, March 11--14, 2002, Revised Papers. 136--146. https:\/\/doi.org\/10.1007\/3--540--36504--4_10"},{"key":"e_1_3_2_1_6_1","volume-title":"ACNS 2018, Leuven, Belgium, July 2--4, 2018, Proceedings (Lecture Notes in Computer Science), , Bart Preneel and Frederik Vercauteren (Eds.)","volume":"10892","author":"Giacomelli Irene","year":"2018","unstructured":"Irene Giacomelli , Somesh Jha , Marc Joye , C. David Page , and Kyonghwan Yoon . 2018 . Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption. In Applied Cryptography and Network Security - 16th International Conference , ACNS 2018, Leuven, Belgium, July 2--4, 2018, Proceedings (Lecture Notes in Computer Science), , Bart Preneel and Frederik Vercauteren (Eds.) , Vol. 10892 . Springer, 243--261. https:\/\/doi.org\/10.1007\/978--3--319--93387-0_13 10.1007\/978--3--319--93387-0_13 Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, and Kyonghwan Yoon. 2018. Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption. In Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2--4, 2018, Proceedings (Lecture Notes in Computer Science), , Bart Preneel and Frederik Vercauteren (Eds.), Vol. 10892. Springer, 243--261. https:\/\/doi.org\/10.1007\/978--3--319--93387-0_13"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 33nd International Conference on Machine Learning, ICML","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach , Nathan Dowlin , Kim Laine , Kristin E. Lauter , Michael Naehrig , and John Wernsing . 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy . In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016 , New York City, NY , USA, June 19--24, 2016 (JMLR Workshop and Conference Proceedings), , Maria-Florina Balcan and Kilian Q. Weinberger (Eds.), Vol. 48 . JMLR. org, 201--210. http:\/\/proceedings.mlr.press\/v48\/gilad-bachrach16.html Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin E. Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19--24, 2016 (JMLR Workshop and Conference Proceedings), , Maria-Florina Balcan and Kilian Q. Weinberger (Eds.), Vol. 48. JMLR.org, 201--210. http:\/\/proceedings.mlr.press\/v48\/gilad-bachrach16.html"},{"volume-title":"The Foundations of Cryptography - Volume 2: Basic Applications","author":"Goldreich Oded","key":"e_1_3_2_1_8_1","unstructured":"Oded Goldreich . 2004. The Foundations of Cryptography - Volume 2: Basic Applications . Cambridge University Press . https:\/\/doi.org\/10.1017\/CBO9780511721656 10.1017\/CBO9780511721656 Oded Goldreich. 2004. The Foundations of Cryptography - Volume 2: Basic Applications .Cambridge University Press. https:\/\/doi.org\/10.1017\/CBO9780511721656"},{"volume-title":"Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC '87)","author":"Goldreich O.","key":"e_1_3_2_1_9_1","unstructured":"O. Goldreich , S. Micali , and A. Wigderson . 1987. How to Play ANY Mental Game . In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC '87) . ACM, New York, NY, USA, 218--229. https:\/\/doi.org\/10.1145\/28395.28420 10.1145\/28395.28420 O. Goldreich, S. Micali, and A. Wigderson. 1987. How to Play ANY Mental Game. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC '87). ACM, New York, NY, USA, 218--229. https:\/\/doi.org\/10.1145\/28395.28420"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"e_1_3_2_1_11_1","volume-title":"Algorithms in HElib. In 34rd Annual International Cryptology Conference, CRYPTO","author":"Halevi Shai","year":"2014","unstructured":"Shai Halevi and Victor Shoup . 2014 . Algorithms in HElib. In 34rd Annual International Cryptology Conference, CRYPTO 2014. Springer Verlag. Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In 34rd Annual International Cryptology Conference, CRYPTO 2014. Springer Verlag."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium (SEC'18)","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018 . GAZELLE: A Low Latency Framework for Secure Neural Network Inference . In Proceedings of the 27th USENIX Conference on Security Symposium (SEC'18) . USENIX Association, Berkeley, CA, USA, 1651--1668. http:\/\/dl.acm.org\/citation.cfm?id=3277203.3277326 Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In Proceedings of the 27th USENIX Conference on Security Symposium (SEC'18). USENIX Association, Berkeley, CA, USA, 1651--1668. http:\/\/dl.acm.org\/citation.cfm?id=3277203.3277326"},{"volume-title":"Advances in Cryptology -- CRYPTO 2000 ,","author":"Lindell Yehuda","key":"e_1_3_2_1_15_1","unstructured":"Yehuda Lindell and Benny Pinkas . 2000. Privacy Preserving Data Mining . In Advances in Cryptology -- CRYPTO 2000 , , Mihir Bellare (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 36--54. Yehuda Lindell and Benny Pinkas. 2000. Privacy Preserving Data Mining. In Advances in Cryptology -- CRYPTO 2000 , , Mihir Bellare (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 36--54."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.14"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_18_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy, SP 2017","author":"Mohassel Payman","year":"2017","unstructured":"Payman Mohassel and Yupeng Zhang . 2017 . SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy, SP 2017 , San Jose, CA, USA, May 22--26 , 2017. 19--38. https:\/\/doi.org\/10.1109\/SP.2017.12 10.1109\/SP.2017.12 Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. 19--38. https:\/\/doi.org\/10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"volume-title":"Elementary number theory and its applications (3. ed.)","author":"Rosen Kenneth H.","key":"e_1_3_2_1_21_1","unstructured":"Kenneth H. Rosen . 1993. Elementary number theory and its applications (3. ed.) . Addison-Wesley . Kenneth H. Rosen. 1993. Elementary number theory and its applications (3. ed.) .Addison-Wesley."},{"key":"e_1_3_2_1_22_1","volume-title":"Fully homomorphic SIMD operations. Designs, codes and cryptography","author":"Smart Nigel P","year":"2014","unstructured":"Nigel P Smart and Frederik Vercauteren . 2014. Fully homomorphic SIMD operations. Designs, codes and cryptography ( 2014 ), 1--25. Nigel P Smart and Frederik Vercauteren. 2014. Fully homomorphic SIMD operations. Designs, codes and cryptography (2014), 1--25."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089292.1089293"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS '86)","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao . 1986 . How to Generate and Exchange Secrets . In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS '86) . IEEE Computer Society, Washington, DC, USA, 162--167. https:\/\/doi.org\/10.1109\/SFCS. 1986.25 10.1109\/SFCS.1986.25 Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS '86). IEEE Computer Society, Washington, DC, USA, 162--167. https:\/\/doi.org\/10.1109\/SFCS.1986.25"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 7th ACM Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338469.3358942","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338469.3358942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338469.3358942"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":23,"alternative-id":["10.1145\/3338469.3358942","10.1145\/3338469"],"URL":"https:\/\/doi.org\/10.1145\/3338469.3358942","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}