{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T21:27:11Z","timestamp":1760909231983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T00:00:00Z","timestamp":1597881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,23]]},"DOI":"10.1145\/3394486.3403321","type":"proceedings-article","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:03:53Z","timestamp":1597964633000},"page":"2706-2714","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Faster Secure Data Mining via Distributed Homomorphic Encryption"],"prefix":"10.1145","author":[{"given":"Junyi","family":"Li","sequence":"first","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Heng","family":"Huang","sequence":"additional","affiliation":[{"name":"JD Finance America Corporation &amp; University of Pittsburgh, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,8,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857731"},{"key":"e_1_3_2_1_2_1","volume-title":"Privacy-preserving logistic regression training. BMC medical genomics","author":"Bonte Charlotte","year":"2018","unstructured":"Charlotte Bonte and Frederik Vercauteren . 2018. Privacy-preserving logistic regression training. BMC medical genomics , Vol. 11 , 4 ( 2018 ), 86. Charlotte Bonte and Frederik Vercauteren. 2018. Privacy-preserving logistic regression training. BMC medical genomics, Vol. 11, 4 (2018), 86."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"volume-title":"Annual cryptology conference","author":"Brakerski Zvika","key":"e_1_3_2_1_4_1","unstructured":"Zvika Brakerski and Vinod Vaikuntanathan . 2011. Fully homomorphic encryption from ring-LWE and security for key dependent messages . In Annual cryptology conference . Springer , 505--524. Zvika Brakerski and Vinod Vaikuntanathan. 2011. Fully homomorphic encryption from ring-LWE and security for key dependent messages. In Annual cryptology conference. Springer, 505--524."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"e_1_3_2_1_6_1","volume-title":"Low latency privacy preserving inference. arXiv preprint arXiv:1812.10659","author":"Brutzkus Alon","year":"2018","unstructured":"Alon Brutzkus , Oren Elisha , and Ran Gilad-Bachrach . 2018. Low latency privacy preserving inference. arXiv preprint arXiv:1812.10659 ( 2018 ). Alon Brutzkus, Oren Elisha, and Ran Gilad-Bachrach. 2018. Low latency privacy preserving inference. arXiv preprint arXiv:1812.10659 (2018)."},{"key":"e_1_3_2_1_7_1","volume-title":"H Brendan McMahan, Virginia Smith, and Ameet Talwalkar.","author":"Caldas Sebastian","year":"2018","unstructured":"Sebastian Caldas , Peter Wu , Tian Li , Jakub Konevc n\u1ef3 , H Brendan McMahan, Virginia Smith, and Ameet Talwalkar. 2018 . Leaf : A benchmark for federated settings. arXiv preprint arXiv:1812.01097 (2018). Sebastian Caldas, Peter Wu, Tian Li, Jakub Konevc n\u1ef3, H Brendan McMahan, Virginia Smith, and Ameet Talwalkar. 2018. Leaf: A benchmark for federated settings. arXiv preprint arXiv:1812.01097 (2018)."},{"key":"e_1_3_2_1_8_1","first-page":"101","article-title":"Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption","volume":"2019","author":"Carpov Sergiu","year":"2019","unstructured":"Sergiu Carpov , Nicolas Gama , Mariya Georgieva , and Juan Ram\u00f3n Troncoso-Pastoriza . 2019 . Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption . IACR Cryptology ePrint Archive , Vol. 2019 (2019), 101 . Sergiu Carpov, Nicolas Gama, Mariya Georgieva, and Juan Ram\u00f3n Troncoso-Pastoriza. 2019. Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption. IACR Cryptology ePrint Archive, Vol. 2019 (2019), 101.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_9_1","volume-title":"Homomorphic Encryption: Review and Applications. In Advances in Data Science and Management","author":"Challa Ratnakumari","year":"2020","unstructured":"Ratnakumari Challa . 2020 . Homomorphic Encryption: Review and Applications. In Advances in Data Science and Management . Springer , 273--281. Ratnakumari Challa. 2020. Homomorphic Encryption: Review and Applications. In Advances in Data Science and Management. Springer, 273--281."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"e_1_3_2_1_11_1","volume-title":"Secureboost: A lossless federated learning framework. arXiv preprint arXiv:1901.08755","author":"Cheng Kewei","year":"2019","unstructured":"Kewei Cheng , Tao Fan , Yilun Jin , Yang Liu , Tianjian Chen , and Qiang Yang . 2019 . Secureboost: A lossless federated learning framework. arXiv preprint arXiv:1901.08755 (2019). Kewei Cheng, Tao Fan, Yilun Jin, Yang Liu, Tianjian Chen, and Qiang Yang. 2019. Secureboost: A lossless federated learning framework. arXiv preprint arXiv:1901.08755 (2019)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866697"},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 227--249","author":"Cheon Jung Hee","year":"2019","unstructured":"Jung Hee Cheon , Duhyeong Kim , and Jai Hyun Park . 2019 . Towards a practical cluster analysis over encrypted data . In International Conference on Selected Areas in Cryptography. Springer, 227--249 . Jung Hee Cheon, Duhyeong Kim, and Jai Hyun Park. 2019. Towards a practical cluster analysis over encrypted data. In International Conference on Selected Areas in Cryptography. Springer, 227--249."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267974"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_17_1","volume-title":"et almbox","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork , Aaron Roth , et almbox . 2014 . The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science , Vol. 9 , 3--4 (2014), 211--407. Cynthia Dwork, Aaron Roth, et almbox. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407."},{"volume-title":"The elements of statistical learning","author":"Friedman Jerome","key":"e_1_3_2_1_18_1","unstructured":"Jerome Friedman , Trevor Hastie , and Robert Tibshirani . 2001. The elements of statistical learning . Vol. 1 . Springer series in statistics New York. Jerome Friedman, Trevor Hastie, and Robert Tibshirani. 2001. The elements of statistical learning. Vol. 1. Springer series in statistics New York."},{"volume-title":"A fully homomorphic encryption scheme","author":"Gentry Craig","key":"e_1_3_2_1_19_1","unstructured":"Craig Gentry . 2009. A fully homomorphic encryption scheme . Vol. 20 . Stanford university Stanford . Craig Gentry. 2009. A fully homomorphic encryption scheme. Vol. 20. Stanford university Stanford."},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Machine Learning. 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach , Nathan Dowlin , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy . In International Conference on Machine Learning. 201--210 . Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. 201--210."},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Parallel Processing and Applied Mathematics. Springer, 228--239","author":"Graham Richard L","year":"2005","unstructured":"Richard L Graham , Timothy S Woodall , and Jeffrey M Squyres . 2005 . Open MPI: A flexible high performance MPI . In International Conference on Parallel Processing and Applied Mathematics. Springer, 228--239 . Richard L Graham, Timothy S Woodall, and Jeffrey M Squyres. 2005. Open MPI: A flexible high performance MPI. In International Conference on Parallel Processing and Applied Mathematics. Springer, 228--239."},{"key":"e_1_3_2_1_22_1","first-page":"662","article-title":"Efficient Logistic Regression on Large Encrypted Data","volume":"2018","author":"Han Kyoohyung","year":"2018","unstructured":"Kyoohyung Han , Seungwan Hong , Jung Hee Cheon , and Daejun Park . 2018 . Efficient Logistic Regression on Large Encrypted Data . IACR Cryptology ePrint Archive , Vol. 2018 (2018), 662 . Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, and Daejun Park. 2018. Efficient Logistic Regression on Large Encrypted Data. IACR Cryptology ePrint Archive, Vol. 2018 (2018), 662.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_23_1","volume-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677","author":"Hardy Stephen","year":"2017","unstructured":"Stephen Hardy , Wilko Henecka , Hamish Ivey-Law , Richard Nock , Giorgio Patrini , Guillaume Smith , and Brian Thorne . 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 ( 2017 ). Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 (2017)."},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 453--478","author":"J\u00e4schke Angela","year":"2018","unstructured":"Angela J\u00e4schke and Frederik Armknecht . 2018 . Unsupervised machine learning on encrypted data . In International Conference on Selected Areas in Cryptography. Springer, 453--478 . Angela J\u00e4schke and Frederik Armknecht. 2018. Unsupervised machine learning on encrypted data. In International Conference on Selected Areas in Cryptography. Springer, 453--478."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 1651--1669.","author":"Juvekar Chiraag","key":"e_1_3_2_1_26_1","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018. $$GAZELLE$$ : A low latency framework for secure neural network inference . In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1651--1669. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. $$GAZELLE$$: A low latency framework for secure neural network inference. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1651--1669."},{"key":"e_1_3_2_1_27_1","volume-title":"Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527","author":"Jakub Konevc","year":"2016","unstructured":"Jakub Konevc n\u1ef3 , H Brendan McMahan , Daniel Ramage , and Peter Richt\u00e1rik . 2016a. Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527 ( 2016 ). Jakub Konevc n\u1ef3 , H Brendan McMahan, Daniel Ramage, and Peter Richt\u00e1rik. 2016a. Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527 (2016)."},{"key":"e_1_3_2_1_28_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Jakub Konevc","year":"2016","unstructured":"Jakub Konevc n\u1ef3, H Brendan McMahan , Felix X Yu , Peter Richt\u00e1rik , Ananda Theertha Suresh, and Dave Bacon . 2016 b. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016). Jakub Konevc n\u1ef3, H Brendan McMahan, Felix X Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2016b. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)."},{"key":"e_1_3_2_1_29_1","volume-title":"Innovative instructions and software model for isolated execution. Hasp@ isca","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R Savagaonkar . 2013. Innovative instructions and software model for isolated execution. Hasp@ isca , Vol. 10 , 1 ( 2013 ). Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R Savagaonkar. 2013. Innovative instructions and software model for isolated execution. Hasp@ isca, Vol. 10, 1 (2013)."},{"key":"e_1_3_2_1_30_1","first-page":"663","article-title":"Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption","volume":"2018","author":"Mishra Pradeep Kumar","year":"2018","unstructured":"Pradeep Kumar Mishra , Deevashwer Rathee , Dung Hoang Duong , and Masaya Yasuda . 2018 . Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption . IACR Cryptology ePrint Archive , Vol. 2018 (2018), 663 . Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, and Masaya Yasuda. 2018. Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption. IACR Cryptology ePrint Archive, Vol. 2018 (2018), 663.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_32_1","first-page":"2016","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council","volume":"679","author":"Regulation Protection","year":"2016","unstructured":"Protection Regulation . 2016 . Regulation (EU) 2016\/679 of the European Parliament and of the Council . REGULATION (EU) , Vol. 679 (2016), 2016 . Protection Regulation. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. REGULATION (EU), Vol. 679 (2016), 2016.","journal-title":"REGULATION (EU)"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2016.7924692"},{"key":"e_1_3_2_1_34_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 24--43","author":"Dijk Marten Van","year":"2010","unstructured":"Marten Van Dijk , Craig Gentry , Shai Halevi , and Vinod Vaikuntanathan . 2010 . Fully homomorphic encryption over the integers . In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 24--43 . Marten Van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. 2010. Fully homomorphic encryption over the integers. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 24--43."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339474"},{"key":"e_1_3_2_1_36_1","volume-title":"27th Annual Symposium on Foundations of Computer Science (sfcs","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao . 1986 . How to generate and exchange secrets . In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). IEEE, 162--167. Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). IEEE, 162--167."},{"key":"e_1_3_2_1_37_1","volume-title":"Trained ternary quantization. arXiv preprint arXiv:1612.01064","author":"Zhu Chenzhuo","year":"2016","unstructured":"Chenzhuo Zhu , Song Han , Huizi Mao , and William J Dally . 2016. Trained ternary quantization. arXiv preprint arXiv:1612.01064 ( 2016 ). Chenzhuo Zhu, Song Han, Huizi Mao, and William J Dally. 2016. Trained ternary quantization. arXiv preprint arXiv:1612.01064 (2016)."}],"event":{"name":"KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Virtual Event CA USA","acronym":"KDD '20"},"container-title":["Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394486.3403321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:48Z","timestamp":1750197708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,20]]},"references-count":37,"alternative-id":["10.1145\/3394486.3403321","10.1145\/3394486"],"URL":"https:\/\/doi.org\/10.1145\/3394486.3403321","relation":{},"subject":[],"published":{"date-parts":[[2020,8,20]]},"assertion":[{"value":"2020-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}