{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T21:31:15Z","timestamp":1777498275884,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62072262"],"award-info":[{"award-number":["62072262"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,18]]},"DOI":"10.1145\/3470496.3527392","type":"proceedings-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T19:06:01Z","timestamp":1654023961000},"page":"87-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["PPMLAC"],"prefix":"10.1145","author":[{"given":"Xing","family":"Zhou","sequence":"first","affiliation":[{"name":"Shanghai ZiXian Technology, Shanghai, China"}]},{"given":"Zhilei","family":"Xu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai ZiXian Technology, Shanghai, China"}]},{"given":"Mingyu","family":"Gao","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ACM CCS. 2021. PRIVACY PRESERVING MACHINE LEARNING an ACM CCS 2021 Workshop. https:\/\/ppml-workshop.github.io\/  ACM CCS. 2021. PRIVACY PRESERVING MACHINE LEARNING an ACM CCS 2021 Workshop. https:\/\/ppml-workshop.github.io\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati , Shay Gueron , Simon Johnson , and Vincent Scarlata . 2013 . Innovative technology for CPU based attestation and sealing . In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy , Vol. 13 . ACM New York, NY, USA, 7. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy, Vol. 13. ACM New York, NY, USA, 7."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM. 2022. TrustZone. https:\/\/www.arm.com\/technologies\/trustzone-for-cortex-a. Accessed: 2022-04-10.  ARM. 2022. TrustZone. https:\/\/www.arm.com\/technologies\/trustzone-for-cortex-a. Accessed: 2022-04-10."},{"key":"e_1_3_2_1_5_1","volume-title":"Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Benoit Meister","author":"Bao Yuyan","year":"2020","unstructured":"Yuyan Bao , Kirshanthan Sundararajah , Raghav Malik , Qianchuan Ye , Christopher Wagner , Fei Wang , Mohammad Hassan Ameri , Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Benoit Meister , Jonathan Springer , Tiark Rompf , and Milind Kulkarni. 2020 . HACCLE : An Ecosystem for Building Secure Multi-Party Computations . CoRR abs\/2009.01489 (2020). arXiv:2009.01489 https:\/\/arxiv.org\/abs\/2009.01489 Yuyan Bao, Kirshanthan Sundararajah, Raghav Malik, Qianchuan Ye, Christopher Wagner, Fei Wang, Mohammad Hassan Ameri, Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Benoit Meister, Jonathan Springer, Tiark Rompf, and Milind Kulkarni. 2020. HACCLE: An Ecosystem for Building Secure Multi-Party Computations. CoRR abs\/2009.01489 (2020). arXiv:2009.01489 https:\/\/arxiv.org\/abs\/2009.01489"},{"key":"e_1_3_2_1_6_1","volume-title":"Advances in Cryptology --- CRYPTO '91","author":"Beaver Donald","unstructured":"Donald Beaver . 1992. Efficient Multiparty Protocols Using Circuit Randomization . In Advances in Cryptology --- CRYPTO '91 , Joan Feigenbaum (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 420--432. Donald Beaver. 1992. Efficient Multiparty Protocols Using Circuit Randomization. In Advances in Cryptology --- CRYPTO '91, Joan Feigenbaum (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 420--432."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100287"},{"key":"e_1_3_2_1_8_1","volume-title":"Advances in Cryptology - EUROCRYPT","author":"Bendlin Rikke","year":"2011","unstructured":"Rikke Bendlin , Ivan Damg\u00e5rd , Claudio Orlandi , and Sarah Zakarias . 2011. Semihomomorphic Encryption and Multiparty Computation . In Advances in Cryptology - EUROCRYPT 2011 , Kenneth G. Paterson (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 169--188. Rikke Bendlin, Ivan Damg\u00e5rd, Claudio Orlandi, and Sarah Zakarias. 2011. Semihomomorphic Encryption and Multiparty Computation. In Advances in Cryptology - EUROCRYPT 2011, Kenneth G. Paterson (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 169--188."},{"key":"e_1_3_2_1_9_1","volume-title":"Sharemind: A Framework for Fast Privacy-Preserving Computations. In Computer Security - ESORICS","author":"Bogdanov Dan","year":"2008","unstructured":"Dan Bogdanov , Sven Laur , and Jan Willemson . 2008 . Sharemind: A Framework for Fast Privacy-Preserving Computations. In Computer Security - ESORICS 2008, Sushil Jajodia and Javier Lopez (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 192--206. Dan Bogdanov, Sven Laur, and Jan Willemson. 2008. Sharemind: A Framework for Fast Privacy-Preserving Computations. In Computer Security - ESORICS 2008, Sushil Jajodia and Javier Lopez (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 192--206."},{"key":"e_1_3_2_1_10_1","volume-title":"Practical Secure Aggregation for Federated Learning on User-Held Data. In NIPS Workshop on Private Multi-Party Machine Learning. https:\/\/arxiv.org\/abs\/1611","author":"Bonawitz K. A.","year":"2016","unstructured":"K. A. Bonawitz , Vladimir Ivanov , Ben Kreuter , Antonio Marcedone , H. Brendan McMahan , Sarvar Patel , Daniel Ramage , Aaron Segal , and Karn Seth . 2016 . Practical Secure Aggregation for Federated Learning on User-Held Data. In NIPS Workshop on Private Multi-Party Machine Learning. https:\/\/arxiv.org\/abs\/1611 .04482 K. A. Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, and Karn Seth. 2016. Practical Secure Aggregation for Federated Learning on User-Held Data. In NIPS Workshop on Private Multi-Party Machine Learning. https:\/\/arxiv.org\/abs\/1611.04482"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2006.1696222"},{"key":"e_1_3_2_1_13_1","volume-title":"Advances in Cryptology --- EUROCRYPT '89, Jean-Jacques Quisquater and Joos Vandewalle (Eds.)","author":"Brickell Ernest F.","unstructured":"Ernest F. Brickell . 1990. Some Ideal Secret Sharing Schemes . In Advances in Cryptology --- EUROCRYPT '89, Jean-Jacques Quisquater and Joos Vandewalle (Eds.) . Springer Berlin Heidelberg , Berlin, Heidelberg , 468--475. Ernest F. Brickell. 1990. Some Ideal Secret Sharing Schemes. In Advances in Cryptology --- EUROCRYPT '89, Jean-Jacques Quisquater and Joos Vandewalle (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 468--475."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"e_1_3_2_1_15_1","volume-title":"Secure Computation with Fixed-Point Numbers","author":"Catrina Octavian","unstructured":"Octavian Catrina and Amitabh Saxena . 2010. Secure Computation with Fixed-Point Numbers . In Financial Cryptography and Data Security, Radu Sion (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 35--50. Octavian Catrina and Amitabh Saxena. 2010. Secure Computation with Fixed-Point Numbers. In Financial Cryptography and Data Security, Radu Sion (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 35--50."},{"key":"e_1_3_2_1_16_1","unstructured":"J.M. Chang D. Zhuang and G.D. Samaraweera. 2022. Privacy-Preserving Machine Learning. Manning.  J.M. Chang D. Zhuang and G.D. Samaraweera. 2022. Privacy-Preserving Machine Learning. Manning."},{"key":"e_1_3_2_1_17_1","volume-title":"Lai","author":"Chen Guoxing","year":"2018","unstructured":"Guoxing Chen , Sanchuan Chen , Yuan Xiao , Yinqian Zhang , Zhiqiang Lin , and Ten H . Lai . 2018 . SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. CoRR abs\/1802.09085 (2018). arXiv:1802.09085 http:\/\/arxiv.org\/abs\/1802.09085 Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. 2018. SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. CoRR abs\/1802.09085 (2018). arXiv:1802.09085 http:\/\/arxiv.org\/abs\/1802.09085"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64840-4_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808774"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal Hardware Extensions for Strong Software Isolation . In Proceedings of the 25th USENIX Conference on Security Symposium ( Austin, TX, USA) (SEC'16). USENIX Association, USA, 857--874. Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In Proceedings of the 25th USENIX Conference on Security Symposium (Austin, TX, USA) (SEC'16). USENIX Association, USA, 857--874."},{"key":"e_1_3_2_1_22_1","volume-title":"Theory of Cryptography","author":"Cramer Ronald","unstructured":"Ronald Cramer , Ivan Damg\u00e5rd , and Yuval Ishai . 2005. Share Conversion , Pseudorandom Secret-Sharing and Applications to Secure Computation . In Theory of Cryptography , Joe Kilian (Ed.). Springer Berlin Heidelberg, Berlin , Heidelberg , 342--362. Ronald Cramer, Ivan Damg\u00e5rd, and Yuval Ishai. 2005. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. In Theory of Cryptography, Joe Kilian (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 342--362."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_22"},{"key":"e_1_3_2_1_24_1","unstructured":"Morten Dahl Jason Mancuso Yann Dupis Ben Decoste Morgan Giraud Ian Livingstone Justin Patriquin and Gavin Uhma. 2018. Private Machine Learning in TensorFlow using Secure Computation. arXiv:1810.08130 [cs.CR]  Morten Dahl Jason Mancuso Yann Dupis Ben Decoste Morgan Giraud Ian Livingstone Justin Patriquin and Gavin Uhma. 2018. Private Machine Learning in TensorFlow using Secure Computation. arXiv:1810.08130 [cs.CR]"},{"key":"e_1_3_2_1_25_1","volume-title":"Nigel Smart, and Sarah Zakarias","author":"Damg\u00e5rd Ivan","year":"2012","unstructured":"Ivan Damg\u00e5rd , Valerio Pastro , Nigel Smart, and Sarah Zakarias . 2012 . Multiparty Computation from Somewhat Homomorphic Encryption. In Advances in Cryptology - CRYPTO 2012, Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 643--662. Ivan Damg\u00e5rd, Valerio Pastro, Nigel Smart, and Sarah Zakarias. 2012. Multiparty Computation from Somewhat Homomorphic Encryption. In Advances in Cryptology - CRYPTO 2012, Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 643--662."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_14"},{"key":"e_1_3_2_1_27_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Demmler Daniel","year":"2014","unstructured":"Daniel Demmler , Thomas Schneider , and Michael Zohner . 2014 . Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens . In 23rd USENIX Security Symposium (USENIX Security 14) . USENIX Association, San Diego, CA, 893--908. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/demmler Daniel Demmler, Thomas Schneider, and Michael Zohner. 2014. Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 893--908. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/demmler"},{"key":"e_1_3_2_1_28_1","volume-title":"ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015","author":"Demmler Daniel","year":"2015","unstructured":"Daniel Demmler , Thomas Schneider , and Michael Zohner . 2015 . ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015 , San Diego, California, USA, February 8--11 , 2015. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2015\/aby-fframework-efficient-mixed-protocol-secure-two-party-computation Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8--11, 2015. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2015\/aby-fframework-efficient-mixed-protocol-secure-two-party-computation"},{"key":"e_1_3_2_1_29_1","volume-title":"Imagenet large scale visual recognition competition 2012 (ILSVRC2012). See net.org\/challenges\/LSVRC 41","author":"Deng Jia","year":"2012","unstructured":"Jia Deng , Alex Berg , Sanjeev Satheesh , H Su , Aditya Khosla , and Li Fei-Fei . 2012. Imagenet large scale visual recognition competition 2012 (ILSVRC2012). See net.org\/challenges\/LSVRC 41 ( 2012 ). Jia Deng, Alex Berg, Sanjeev Satheesh, H Su, Aditya Khosla, and Li Fei-Fei. 2012. Imagenet large scale visual recognition competition 2012 (ILSVRC2012). See net.org\/challenges\/LSVRC 41 (2012)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2016.71"},{"key":"e_1_3_2_1_31_1","volume-title":"Scalable Memory Protection in the PENGLAI Enclave. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Feng Erhu","year":"2021","unstructured":"Erhu Feng , Xu Lu , Dong Du , Bicheng Yang , Xueqiang Jiang , Yubin Xia , Binyu Zang , and Haibo Chen . 2021 . Scalable Memory Protection in the PENGLAI Enclave. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21) . USENIX Association, 275--294. https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/feng Erhu Feng, Xu Lu, Dong Du, Bicheng Yang, Xueqiang Jiang, Yubin Xia, Binyu Zang, and Haibo Chen. 2021. Scalable Memory Protection in the PENGLAI Enclave. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). USENIX Association, 275--294. https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/feng"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"e_1_3_2_1_33_1","volume-title":"Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems --- CHES","author":"Gandolfi Karine","year":"2001","unstructured":"Karine Gandolfi , Christophe Mourtel , and Francis Olivier . 2001 . Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems --- CHES 2001. Springer Berlin Heidelberg , Berlin, Heidelberg , 251--261. Karine Gandolfi, Christophe Mourtel, and Francis Olivier. 2001. Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems --- CHES 2001. Springer Berlin Heidelberg, Berlin, Heidelberg, 251--261."},{"key":"e_1_3_2_1_34_1","volume-title":"A Fully Homomorphic Encryption Scheme. Ph. D. Dissertation","author":"Gentry Craig","unstructured":"Craig Gentry . 2009. A Fully Homomorphic Encryption Scheme. Ph. D. Dissertation . Stanford, CA, USA . Advisor(s) Boneh, Dan. AAI 3382729. Craig Gentry. 2009. A Fully Homomorphic Encryption Scheme. Ph. D. Dissertation. Stanford, CA, USA. Advisor(s) Boneh, Dan. AAI3382729."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382251"},{"key":"e_1_3_2_1_37_1","volume-title":"SoK: General Purpose Compilers for Secure Multi-Party Computation. 2019 IEEE Symposium on Security and Privacy (SP)","author":"Hastings Marcella","year":"2019","unstructured":"Marcella Hastings , Brett Hemenway , Daniel Noble , and Steve Zdancewic . 2019 . SoK: General Purpose Compilers for Secure Multi-Party Computation. 2019 IEEE Symposium on Security and Privacy (SP) (2019), 1220--1237. Marcella Hastings, Brett Hemenway, Daniel Noble, and Steve Zdancewic. 2019. SoK: General Purpose Compilers for Secure Multi-Party Computation. 2019 IEEE Symposium on Security and Privacy (SP) (2019), 1220--1237."},{"key":"e_1_3_2_1_38_1","volume-title":"TinyKeys for TinyOT). In Advances in Cryptology - ASIACRYPT","author":"Hazay Carmit","year":"2018","unstructured":"Carmit Hazay , Emmanuela Orsini , Peter Scholl , and Eduardo Soria-Vazquez . 2018. Concretely Efficient Large-Scale MPC with Active Security (or , TinyKeys for TinyOT). In Advances in Cryptology - ASIACRYPT 2018 , Thomas Peyrin and Steven Galbraith (Eds.). Springer International Publishing , Cham, 86--117. Carmit Hazay, Emmanuela Orsini, Peter Scholl, and Eduardo Soria-Vazquez. 2018. Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In Advances in Cryptology - ASIACRYPT 2018, Thomas Peyrin and Steven Galbraith (Eds.). Springer International Publishing, Cham, 86--117."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516744"},{"key":"e_1_3_2_1_46_1","unstructured":"Brian Knott Shobha Venkataraman Awni Hannun Shubho Sengupta Mark Ibrahim and Laurens van der Maaten. 2021. CrypTen: Secure Multi-Party Computation Meets Machine Learning. arXiv:2109.00984 [cs.LG]  Brian Knott Shobha Venkataraman Awni Hannun Shubho Sengupta Mark Ibrahim and Laurens van der Maaten. 2021. CrypTen: Secure Multi-Party Computation Meets Machine Learning. arXiv:2109.00984 [cs.LG]"},{"key":"e_1_3_2_1_47_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19)","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher , Jann Horn , Anders Fogh ,, Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2019 . Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19) . Paul Kocher, Jann Horn, Anders Fogh,, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"e_1_3_2_1_49_1","unstructured":"Andrei Lapets Nikolaj Volgushev Azer Bestavros Frederick Jansen and Mayank Varia. 2016. Secure multi-party computation for analytics deployed as a light-weight web application. https:\/\/open.bu.edu\/handle\/2144\/21786  Andrei Lapets Nikolaj Volgushev Azer Bestavros Frederick Jansen and Mayank Varia. 2016. Secure multi-party computation for analytics deployed as a light-weight web application. https:\/\/open.bu.edu\/handle\/2144\/21786"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_51_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li , Yinqian Zhang , Huibo Wang , Kang Li , and Yueqiang Cheng . 2021 . CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel . In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 717--732. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/li-mengyuan Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, and Yueqiang Cheng. 2021. CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 717--732. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/li-mengyuan"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993512"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330920"},{"key":"e_1_3_2_1_54_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading Kernel Memory from User Space . In 27th USENIX Security Symposium (USENIX Security 18) . Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_1_56_1","volume-title":"MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack. CoRR abs\/2007.12557","author":"Liu Ziyao","year":"2020","unstructured":"Ziyao Liu , Ivan Tjuawinata , Chaoping Xing , and Kwok-Yan Lam . 2020. MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack. CoRR abs\/2007.12557 ( 2020 ). arXiv:2007.12557 https:\/\/arxiv.org\/abs\/2007.12557 Ziyao Liu, Ivan Tjuawinata, Chaoping Xing, and Kwok-Yan Lam. 2020. MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack. CoRR abs\/2007.12557 (2020). arXiv:2007.12557 https:\/\/arxiv.org\/abs\/2007.12557"},{"key":"e_1_3_2_1_57_1","volume-title":"Yu","author":"Lyu Lingjuan","year":"2020","unstructured":"Lingjuan Lyu , Han Yu , Xingjun Ma , Lichao Sun , Jun Zhao , Qiang Yang , and Philip S . Yu . 2020 . Privacy and Robustness in Federated Learning : Attacks and Defenses. CoRR abs\/2012.06337 (2020). arXiv:2012.06337 https:\/\/arxiv.org\/abs\/2012.06337 Lingjuan Lyu, Han Yu, Xingjun Ma, Lichao Sun, Jun Zhao, Qiang Yang, and Philip S. Yu. 2020. Privacy and Robustness in Federated Learning: Attacks and Defenses. CoRR abs\/2012.06337 (2020). arXiv:2012.06337 https:\/\/arxiv.org\/abs\/2012.06337"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2012.2217631"},{"key":"e_1_3_2_1_59_1","unstructured":"Microsoft. 2021. Azure network round-trip latency statistics. https:\/\/docs.microsoft.com\/en-us\/azure\/networking\/azure-network-latency.  Microsoft. 2021. Azure network round-trip latency statistics. https:\/\/docs.microsoft.com\/en-us\/azure\/networking\/azure-network-latency."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_62_1","volume-title":"Claudio Orlandi, and Sai Sheshank Burra.","author":"Nielsen Jesper Buus","year":"2012","unstructured":"Jesper Buus Nielsen , Peter Sebastian Nordholt , Claudio Orlandi, and Sai Sheshank Burra. 2012 . A New Approach to Practical Active-Secure Two-Party Computation. In Advances in Cryptology - CRYPTO 2012, Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 681--700. Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra. 2012. A New Approach to Practical Active-Secure Two-Party Computation. In Advances in Cryptology - CRYPTO 2012, Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 681--700."},{"key":"e_1_3_2_1_63_1","unstructured":"NVIDIA. 2022. CUDAGPUs. https:\/\/developer.nvidia.com\/cuda-gpus. Accessed: 2022-04-10.  NVIDIA. 2022. CUDAGPUs. https:\/\/developer.nvidia.com\/cuda-gpus. Accessed: 2022-04-10."},{"key":"e_1_3_2_1_64_1","volume-title":"Garnett (Eds.)","volume":"32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas Kopf , Edward Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019 . PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R . Garnett (Eds.) , Vol. 32 . Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper\/ 2019\/file\/bdbca288fee7f92f2bfa9f7012727740-Paper.pdf Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.), Vol. 32. Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper\/2019\/file\/bdbca288fee7f92f2bfa9f7012727740-Paper.pdf"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00020"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_68_1","unstructured":"Victor Ruehle Robert Sim Sergey Yekhanin Nishanth Chandran Melissa Chase Daniel Jones Kim Laine Boris K\u00f6pf Jaime Teevan Jim Kleewein and Saravan Rajmohan. 2021. Privacy Preserving Machine Learning: Maintaining confidentiality and preserving trust. https:\/\/www.microsoft.com\/en-us\/research\/blog\/privacy-preserving-machine-learning-maintaining-confidentiality-and-preserving-trust\/  Victor Ruehle Robert Sim Sergey Yekhanin Nishanth Chandran Melissa Chase Daniel Jones Kim Laine Boris K\u00f6pf Jaime Teevan Jim Kleewein and Saravan Rajmohan. 2021. Privacy Preserving Machine Learning: Maintaining confidentiality and preserving trust. https:\/\/www.microsoft.com\/en-us\/research\/blog\/privacy-preserving-machine-learning-maintaining-confidentiality-and-preserving-trust\/"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342177"},{"key":"e_1_3_2_1_71_1","volume-title":"Julian Stecklina, Thomas Prescher, and Daniel Gruss.","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz , Moritz Lipp , Daniel Moghimi , Jo Van Bulck , Julian Stecklina, Thomas Prescher, and Daniel Gruss. 2019 . ZombieLoad: Cross-Privilege- Boundary Data Sampling. In CCS. Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. 2019. ZombieLoad: Cross-Privilege-Boundary Data Sampling. In CCS."},{"key":"e_1_3_2_1_72_1","volume-title":"Communication theory of secrecy systems. The Bell system technical journal 28, 4","author":"Shannon Claude E","year":"1949","unstructured":"Claude E Shannon . 1949. Communication theory of secrecy systems. The Bell system technical journal 28, 4 ( 1949 ), 656--715. Claude E Shannon. 1949. Communication theory of secrecy systems. The Bell system technical journal 28, 4 (1949), 656--715."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_11"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322228"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00098"},{"key":"e_1_3_2_1_77_1","volume-title":"Computer Networks","author":"Tanenbaum Andrew S","unstructured":"Andrew S Tanenbaum . 1989. Never underestimate the bandwidth of a station wagon full of tapes hurtling down the highway .. In Computer Networks . Prentice-Hall , New Jersey, USA , 51. Andrew S Tanenbaum. 1989. Never underestimate the bandwidth of a station wagon full of tapes hurtling down the highway.. In Computer Networks. Prentice-Hall, New Jersey, USA, 51."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000087"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910965"},{"key":"e_1_3_2_1_80_1","volume-title":"IODINE: Verifying Constant-Time Execution of Hardware. In 28th USENIX Security Symposium (USENIX Security 19)","author":"v. Gleissenthall Klaus","year":"2019","unstructured":"Klaus v. Gleissenthall , Rami G\u00f6khan Kici , Deian Stefan , and Ranjit Jhala . 2019 . IODINE: Verifying Constant-Time Execution of Hardware. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 1411--1428. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/vongleissenthall Klaus v. Gleissenthall, Rami G\u00f6khan Kici, Deian Stefan, and Ranjit Jhala. 2019. IODINE: Verifying Constant-Time Execution of Hardware. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1411--1428. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/vongleissenthall"},{"key":"e_1_3_2_1_81_1","volume-title":"Proceedings of the 27th USENIX Security Symposium. USENIX Association.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In Proceedings of the 27th USENIX Security Symposium. USENIX Association. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the 27th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"e_1_3_2_1_83_1","volume-title":"RIDL: Rogue In-flight Data Load. In S&P.","author":"van Schaik Stephan","year":"2019","unstructured":"Stephan van Schaik , Alyssa Milburn , Sebastian \u00d6sterlund , Pietro Frigo , Giorgi Maisuradze , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2019 . RIDL: Rogue In-flight Data Load. In S&P. Stephan van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2019. RIDL: Rogue In-flight Data Load. In S&P."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460427"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1137\/1037125"},{"key":"e_1_3_2_1_88_1","first-page":"1153","article-title":"Obliv-C: A Language for Extensible Data-Oblivious Computation","volume":"2015","author":"Zahur Samee","year":"2015","unstructured":"Samee Zahur and David Evans . 2015 . Obliv-C: A Language for Extensible Data-Oblivious Computation . IACR Cryptol. ePrint Arch. 2015 (2015), 1153 . Samee Zahur and David Evans. 2015. Obliv-C: A Language for Extensible Data-Oblivious Computation. IACR Cryptol. ePrint Arch. 2015 (2015), 1153.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694372"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516752"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666141.2666145"}],"event":{"name":"ISCA '22: The 49th Annual International Symposium on Computer Architecture","location":"New York New York","acronym":"ISCA '22","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS TCAA IEEE CS technical committee on architectural acoustics"]},"container-title":["Proceedings of the 49th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527392","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3470496.3527392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:28Z","timestamp":1750188628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527392"}},"subtitle":["high performance chipset architecture for secure multi-party computation"],"short-title":[],"issued":{"date-parts":[[2022,6,11]]},"references-count":89,"alternative-id":["10.1145\/3470496.3527392","10.1145\/3470496"],"URL":"https:\/\/doi.org\/10.1145\/3470496.3527392","relation":{},"subject":[],"published":{"date-parts":[[2022,6,11]]},"assertion":[{"value":"2022-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}