{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:47:03Z","timestamp":1762868823347,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Brain Korea 21 FOUR","award":["Program of the Education and Research Program for Future ICT Pio"],"award-info":[{"award-number":["Program of the Education and Research Program for Future ICT Pio"]}]},{"name":"Institute of Information & communications Technology Planning & Evaluation (IITP)","award":["NO.2021-0-01343 Artificial Intelligence Graduate School Program"],"award-info":[{"award-number":["NO.2021-0-01343 Artificial Intelligence Graduate School Program"]}]},{"name":"Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE)","award":["P0017123 The Competency Development Program for Industry Specia"],"award-info":[{"award-number":["P0017123 The Competency Development Program for Industry Specia"]}]},{"name":"National Research Foundation of Korea (NRF) funded by the Korea government (MSIT)","award":["NRF-2022R1A5A6000840","NRF-2021R1F1A1045403"],"award-info":[{"award-number":["NRF-2022R1A5A6000840","NRF-2021R1F1A1045403"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3523253","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"377-391","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption"],"prefix":"10.1145","author":[{"given":"Jaehee","family":"Jang","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"given":"Younho","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul National University of Science and Technology, Seoul, South Korea"}]},{"given":"Andrey","family":"Kim","sequence":"additional","affiliation":[{"name":"Samsung Advanced Institute of Technology, Suwon, South Korea"}]},{"given":"Byunggook","family":"Na","sequence":"additional","affiliation":[{"name":"Samsung Advanced Institute of Technology, Suwon, South Korea"}]},{"given":"Donggeon","family":"Yhee","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"given":"Byounghan","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul National University of Science and Technology, Seoul, South Korea"}]},{"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"given":"Sungroh","family":"Yoon","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Ho Bae et al. 2018. Security and privacy issues in deep learning. arXiv:1807.11655  Ho Bae et al. 2018. Security and privacy issues in deep learning. arXiv:1807.11655"},{"volume-title":"Proc. IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 9403--9412","author":"Song","key":"e_1_3_2_2_2_1","unstructured":"Song Bian et al. 2020. ENSEI: Efficient secure inference via frequency-domain homomorphic convolution for privacy-preserving visual recognition . In Proc. IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 9403--9412 . Song Bian et al. 2020. ENSEI: Efficient secure inference via frequency-domain homomorphic convolution for privacy-preserving visual recognition. In Proc. IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 9403--9412."},{"volume-title":"Annual International Cryptology Conference. Springer, 483--512","author":"Florian","key":"e_1_3_2_2_3_1","unstructured":"Florian Bourse et al. 2018. Fast homomorphic evaluation of deep discretized neural networks . In Annual International Cryptology Conference. Springer, 483--512 . Florian Bourse et al. 2018. Fast homomorphic evaluation of deep discretized neural networks. In Annual International Cryptology Conference. Springer, 483--512."},{"key":"e_1_3_2_2_4_1","unstructured":"Alon Brutzkus et al. 2019. Low latency privacy preserving inference. In Interna- tional Conference on Machine Learning. PMLR 812--821.  Alon Brutzkus et al. 2019. Low latency privacy preserving inference. In Interna- tional Conference on Machine Learning. PMLR 812--821."},{"volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 147--167","author":"Wouter","key":"e_1_3_2_2_5_1","unstructured":"Wouter Castryck et al. 2016. Provably weak instances of Ring-LWE revisited . In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 147--167 . Wouter Castryck et al. 2016. Provably weak instances of Ring-LWE revisited. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 147--167."},{"key":"e_1_3_2_2_6_1","volume-title":"\u00c7etin et al","author":"Gizem","year":"2015","unstructured":"Gizem S. \u00c7etin et al . 2015 . An investigation of complex operations with word-size homomorphic encryption. Cryptology ePrint Archive, Report 2015\/1195. Gizem S. \u00c7etin et al. 2015. An investigation of complex operations with word-size homomorphic encryption. Cryptology ePrint Archive, Report 2015\/1195."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Jung Hee Cheon etal 2017. Homomorphic encryption for arithmetic of approxi- mate numbers. In Advances in Cryptology--ASIACRYPT 2017. Springer 409--437.  Jung Hee Cheon et al. 2017. Homomorphic encryption for arithmetic of approxi- mate numbers. In Advances in Cryptology--ASIACRYPT 2017. Springer 409--437.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Jung Hee Cheon etal 2018. Bootstrapping for approximate homomorphic encryption. Cryptology ePrint Archive Report 2018\/153.  Jung Hee Cheon et al. 2018. Bootstrapping for approximate homomorphic encryption. Cryptology ePrint Archive Report 2018\/153.","DOI":"10.1007\/978-3-319-78381-9_14"},{"volume-title":"Proc. International Conference on the Theory and Application of Cryptology and Information Security. Springer, 3--33","author":"Ilaria","key":"e_1_3_2_2_9_1","unstructured":"Ilaria Chillotti et al. 2016. Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds . In Proc. International Conference on the Theory and Application of Cryptology and Information Security. Springer, 3--33 . Ilaria Chillotti et al. 2016. Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. In Proc. International Conference on the Theory and Application of Cryptology and Information Security. Springer, 3--33."},{"key":"e_1_3_2_2_10_1","unstructured":"Kyunghyun Cho et al. 2014. On the properties of neural machine translation: Encoder-decoder approaches. arXiv:1409.1259  Kyunghyun Cho et al. 2014. On the properties of neural machine translation: Encoder-decoder approaches. arXiv:1409.1259"},{"key":"e_1_3_2_2_11_1","volume-title":"Faster Cryptonets: Leveraging sparsity for real-world encrypted inference. arXiv:1811.09953","author":"Edward Chou","year":"2018","unstructured":"Edward Chou et al. 2018 . Faster Cryptonets: Leveraging sparsity for real-world encrypted inference. arXiv:1811.09953 Edward Chou et al. 2018. Faster Cryptonets: Leveraging sparsity for real-world encrypted inference. arXiv:1811.09953"},{"key":"e_1_3_2_2_12_1","unstructured":"Matthieu Courbariaux et al. 2016. Binarized neural networks: training deep neural networks with weights and activations constrained to +1 or -1. arXiv:1602.02830  Matthieu Courbariaux et al. 2016. Binarized neural networks: training deep neural networks with weights and activations constrained to +1 or -1. arXiv:1602.02830"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Ivan Damg\u00e5rd et al. 2012. Multiparty computation from somewhat homomorphic encryption. In Advances in Cryptology--CRYPTO 2012. Springer 643--662.  Ivan Damg\u00e5rd et al. 2012. Multiparty computation from somewhat homomorphic encryption. In Advances in Cryptology--CRYPTO 2012. Springer 643--662.","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_3"},{"volume-title":"Annual Cryptology Conference. Springer, 63--92","author":"Yara","key":"e_1_3_2_2_15_1","unstructured":"Yara Elias et al. 2015. Provably weak instances of Ring-LWE . In Annual Cryptology Conference. Springer, 63--92 . Yara Elias et al. 2015. Provably weak instances of Ring-LWE. In Annual Cryptology Conference. Springer, 63--92."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2997134"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Craig Gentry et al. 2012. Homomorphic evaluation of the AES circuit. In Advances in Cryptology--CRYPTO 2012. Springer 850--867.  Craig Gentry et al. 2012. Homomorphic evaluation of the AES circuit. In Advances in Cryptology--CRYPTO 2012. Springer 850--867.","DOI":"10.1007\/978-3-642-32009-5_49"},{"volume-title":"Proc. International Conference on Machine Learning. 201--210","author":"Ran","key":"e_1_3_2_2_19_1","unstructured":"Ran Gilad-Bachrach et al. 2016. Cryptonets: applying neural networks to en- crypted data with high throughput and accuracy . In Proc. International Conference on Machine Learning. 201--210 . Ran Gilad-Bachrach et al. 2016. Cryptonets: applying neural networks to en- crypted data with high throughput and accuracy. In Proc. International Conference on Machine Learning. 201--210."},{"key":"e_1_3_2_2_20_1","unstructured":"Alex Graves et al. 2014. Neural turing machines. arXiv:1410.5401  Alex Graves et al. 2014. Neural turing machines. arXiv:1410.5401"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0024"},{"key":"e_1_3_2_2_22_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation 9, 8 ( 1997 ), 1735--1780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"volume-title":"Proc. 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 1209--1222","author":"Xiaoqian","key":"e_1_3_2_2_23_1","unstructured":"Xiaoqian Jiang et al. 2018. Secure outsourced matrix computation and application to neural networks . In Proc. 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 1209--1222 . Xiaoqian Jiang et al. 2018. Secure outsourced matrix computation and application to neural networks. In Proc. 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 1209--1222."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3096189"},{"volume-title":"27th USENIX Security Symposium. 1651--1669","author":"Chiraag","key":"e_1_3_2_2_25_1","unstructured":"Chiraag Juvekar et al. 2018. GAZELLE: A low latency framework for secure neural network inference . In 27th USENIX Security Symposium. 1651--1669 . Chiraag Juvekar et al. 2018. GAZELLE: A low latency framework for secure neural network inference. In 27th USENIX Security Symposium. 1651--1669."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-018-0401-7"},{"key":"e_1_3_2_2_27_1","unstructured":"Quoc V Le etal 2015. A simple way to initialize recurrent networks of rectified linear units.  Quoc V Le et al. 2015. A simple way to initialize recurrent networks of rectified linear units."},{"key":"e_1_3_2_2_28_1","unstructured":"Yann LeCun etal 1998. MNIST handwritten digit database. http:\/\/yann.lecun. com\/exdb\/mnist\/.  Yann LeCun et al. 1998. MNIST handwritten digit database. http:\/\/yann.lecun. com\/exdb\/mnist\/."},{"volume-title":"Proc. 7th ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics. 434--442","author":"Byunghan","key":"e_1_3_2_2_29_1","unstructured":"Byunghan Lee et al. 2016. deepTarget: End-to-end learning framework for mi- croRNA target prediction using deep recurrent neural networks . In Proc. 7th ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics. 434--442 . Byunghan Lee et al. 2016. deepTarget: End-to-end learning framework for mi- croRNA target prediction using deep recurrent neural networks. In Proc. 7th ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics. 434--442."},{"volume-title":"Proc. ACM SIGSAC Conference on Computer and Communications Security. 619--631","author":"Jian","key":"e_1_3_2_2_30_1","unstructured":"Jian Liu et al. 2017. Oblivious neural network predictions via miniONN trans- formations . In Proc. ACM SIGSAC Conference on Computer and Communications Security. 619--631 . Jian Liu et al. 2017. Oblivious neural network predictions via miniONN trans- formations. In Proc. ACM SIGSAC Conference on Computer and Communications Security. 619--631."},{"key":"e_1_3_2_2_31_1","first-page":"1","article-title":"On ideal lattices and learning with errors over rings","volume":"2010","author":"Vadim Lyubashevsky","year":"2010","unstructured":"Vadim Lyubashevsky et al. 2010 . On ideal lattices and learning with errors over rings . In Advances in Cryptology--EUROCRYPT 2010. 1 -- 23 . Vadim Lyubashevsky et al. 2010. On ideal lattices and learning with errors over rings. In Advances in Cryptology--EUROCRYPT 2010. 1--23.","journal-title":"Advances in Cryptology--EUROCRYPT"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44618-9_22"},{"volume-title":"2021 IEEE Symposium on Security and Privacy. IEEE, 1003--1020","author":"Deevashwer","key":"e_1_3_2_2_34_1","unstructured":"Deevashwer Rathee et al. 2021. SIRNN: A math library for secure RNN inference . In 2021 IEEE Symposium on Security and Privacy. IEEE, 1003--1020 . Deevashwer Rathee et al. 2021. SIRNN: A math library for secure RNN inference. In 2021 IEEE Symposium on Security and Privacy. IEEE, 1003--1020."},{"volume-title":"International Conference on Machine Learning. PMLR, 4490--4499","author":"Amartya","key":"e_1_3_2_2_35_1","unstructured":"Amartya Sanyal et al. 2018. TAPAS: Tricks to accelerate (encrypted) prediction as a service . In International Conference on Machine Learning. PMLR, 4490--4499 . Amartya Sanyal et al. 2018. TAPAS: Tricks to accelerate (encrypted) prediction as a service. In International Conference on Machine Learning. PMLR, 4490--4499."},{"key":"e_1_3_2_2_36_1","volume-title":"Proc. Network and Distributed System Security Symposium","author":"Sinem","year":"2021","unstructured":"Sinem Sav et al. 2021. POSEIDON: Privacy-preserving federated neural network learning . In Proc. Network and Distributed System Security Symposium 2021 . Sinem Sav et al. 2021. POSEIDON: Privacy-preserving federated neural network learning. In Proc. Network and Distributed System Security Symposium 2021."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/zamm.19330130111"},{"volume-title":"Annual Computer Security Applications Conference.","author":"Guowen","key":"e_1_3_2_2_38_1","unstructured":"Guowen Xu et al. 2020. Secure and verifiable inference in deep neural networks . In Annual Computer Security Applications Conference. Guowen Xu et al. 2020. Secure and verifiable inference in deep neural networks. In Annual Computer Security Applications Conference."},{"key":"e_1_3_2_2_39_1","volume-title":"GALA: Greedy computation for linear algebra in privacy- preserved neural networks. arXiv:2105.01827","author":"Qiao Zhang","year":"2021","unstructured":"Qiao Zhang et al. 2021 . GALA: Greedy computation for linear algebra in privacy- preserved neural networks. arXiv:2105.01827 Qiao Zhang et al. 2021. GALA: Greedy computation for linear algebra in privacy- preserved neural networks. arXiv:2105.01827"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3523253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3523253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:27Z","timestamp":1750188687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3523253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":39,"alternative-id":["10.1145\/3488932.3523253","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3523253","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}