{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:39:44Z","timestamp":1772041184959,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The National Key Research and Development Program of China","award":["No. 2020YFB1006100"],"award-info":[{"award-number":["No. 2020YFB1006100"]}]},{"name":"the Strategic Priority Research Program of Chinese Academy of Sciences","award":["No. XDC02040400"],"award-info":[{"award-number":["No. XDC02040400"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583272","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:25Z","timestamp":1682551825000},"page":"2087-2098","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2105-8047","authenticated-orcid":false,"given":"Ye","family":"Dong","sequence":"first","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0362-847X","authenticated-orcid":false,"given":"Chen","family":"Xiaojun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7865-0682","authenticated-orcid":false,"given":"Weizhan","family":"Jing","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2737-6935","authenticated-orcid":false,"given":"Li","family":"Kaiyun","sequence":"additional","affiliation":[{"name":"Beijing Baidu Netcom Science and Technology Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8618-4992","authenticated-orcid":false,"given":"Weiping","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1996. The Health Insurance Portability and Accountability Act of 1996 (HIPAA). https:\/\/www.hhs.gov\/hipaa\/index.html"},{"key":"e_1_3_2_1_2_1","unstructured":"2011. Eigen library. https:\/\/eigen.tuxfamily.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (GDPR). https:\/\/gdpr-info.eu\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Fusing Convolution and Batch Norm using Custom Function. https:\/\/pytorch.org\/tutorials\/intermediate\/custom_function_conv_bn_tutorial.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_1_7_1","volume-title":"Annual International Cryptology Conference. Springer, 420\u2013432","author":"Beaver Donald","year":"1991","unstructured":"Donald Beaver. 1991. Efficient multiparty protocols using circuit randomization. In Annual International Cryptology Conference. Springer, 420\u2013432."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1996.548510"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_26"},{"key":"e_1_3_2_1_10_1","unstructured":"Yaniv Ben-Itzhak Helen M\u00f6llering Benny Pinkas Thomas Schneider Ajith Suresh Oleksandr Tkachenko Shay Vargaftik Christian Weinert Hossein Yalame and Avishay Yanai. 2022. ScionFL: Secure Quantized Aggregation for Federated Learning. arXiv preprint arXiv:2210.07376 (2022)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490390"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315306"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0036"},{"key":"e_1_3_2_1_16_1","unstructured":"Ran Canetti. 1998. Security and Composition of Multi-party Cryptographic Protocols. Cryptology ePrint Archive Paper 1998\/018. https:\/\/eprint.iacr.org\/1998\/018 https:\/\/eprint.iacr.org\/1998\/018."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00043"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358922"},{"key":"e_1_3_2_1_19_1","volume-title":"Trident: Efficient 4pc framework for privacy preserving machine learning. arXiv preprint arXiv:1912.02631","author":"Chaudhari Harsh","year":"2019","unstructured":"Harsh Chaudhari, Rahul Rachuri, and Ajith Suresh. 2019. Trident: Efficient 4pc framework for privacy preserving machine learning. arXiv preprint arXiv:1912.02631 (2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404397.3404399"},{"key":"e_1_3_2_1_21_1","volume-title":"Annual International Cryptology Conference. Springer, 769\u2013798","author":"Cramer Ronald","year":"2018","unstructured":"Ronald Cramer, Ivan Damg\u00e5rd, Daniel Escudero, Peter Scholl, and Chaoping Xing. 2018. SPD: efficient MPC mod 2k for dishonest majority. In Annual International Cryptology Conference. Springer, 769\u2013798."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0077"},{"key":"e_1_3_2_1_23_1","volume-title":"30th { USENIX} Security Symposium ({ USENIX} Security 21).","author":"Dalskov Anders","unstructured":"Anders Dalskov, Daniel Escudero, and Marcel Keller. 2021. Fantastic four: Honest-majority four-party secure computation with malicious security. In 30th { USENIX} Security Symposium ({ USENIX} Security 21)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00078"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation.. In NDSS.","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Wenliang Du Mikhail\u00a0J Atallah 2001. Privacy-Preserving Cooperative Scientific Computations.. In csfw Vol.\u00a01. Citeseer 273.","DOI":"10.1109\/CSFW.2001.930152"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.21"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56880-1_29"},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Machine Learning. 201\u2013210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. 201\u2013210."},{"key":"e_1_3_2_1_30_1","volume-title":"Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189","author":"Hesamifard Ehsan","year":"2017","unstructured":"Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2017. Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)."},{"key":"e_1_3_2_1_31_1","volume-title":"Cheng Hong, and Jiansheng Ding.","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen jie Lu, Cheng Hong, and Jiansheng Ding. 2022. Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. Cryptology ePrint Archive, Report 2022\/207. https:\/\/ia.cr\/2022\/207."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081942"},{"key":"e_1_3_2_1_34_1","volume-title":"27th { USENIX} Security Symposium ({ USENIX} Security 18). 1651\u20131669.","author":"Juvekar Chiraag","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. { GAZELLE} : A low latency framework for secure neural network inference. In 27th { USENIX} Security Symposium ({ USENIX} Security 18). 1651\u20131669."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0026"},{"key":"e_1_3_2_1_37_1","first-page":"4961","article-title":"Crypten: Secure multi-party computation meets machine learning","volume":"34","author":"Knott Brian","year":"2021","unstructured":"Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, and Laurens van\u00a0der Maaten. 2021. Crypten: Secure multi-party computation meets machine learning. Advances in Neural Information Processing Systems 34 (2021), 4961\u20134973.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_38_1","volume-title":"30th { USENIX} Security Symposium ({ USENIX} Security 21).","author":"Koti Nishat","unstructured":"Nishat Koti, Mahak Pancholi, Arpita Patra, and Ajith Suresh. 2021. { SWIFT} : Super-fast and Robust Privacy-Preserving Machine Learning. In 30th { USENIX} Security Symposium ({ USENIX} Security 21)."},{"key":"e_1_3_2_1_39_1","volume-title":"Tetrad: Actively Secure 4PC for Secure Training and Inference. arXiv preprint arXiv:2106.02850","author":"Koti Nishat","year":"2021","unstructured":"Nishat Koti, Arpita Patra, Rahul Rachuri, and Ajith Suresh. 2021. Tetrad: Actively Secure 4PC for Secure Training and Inference. arXiv preprint arXiv:2106.02850 (2021)."},{"key":"e_1_3_2_1_40_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey\u00a0E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25 (2012), 1097\u20131105."},{"key":"e_1_3_2_1_41_1","unstructured":"V.\u00a0Nair Krizhevsky and G. Hinton. 2014. The CIFAR-10 dataset."},{"key":"e_1_3_2_1_42_1","volume-title":"Cryptflow: Secure tensorflow inference. arXiv preprint arXiv:1909.07814","author":"Kumar Nishant","year":"2019","unstructured":"Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, and Rahul Sharma. 2019. Cryptflow: Secure tensorflow inference. arXiv preprint arXiv:1909.07814 (2019)."},{"key":"e_1_3_2_1_43_1","unstructured":"Yann LeCun. 2017. MNIST database. http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_47_1","volume-title":"Rabbit: Efficient Comparison for Secure Multi-Party Computation. In International Conference on Financial Cryptography and Data Security. Springer, 249\u2013270","author":"Makri Eleftheria","year":"2021","unstructured":"Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, and Sameer Wagh. 2021. Rabbit: Efficient Comparison for Secure Multi-Party Computation. In International Conference on Financial Cryptography and Data Security. Springer, 249\u2013270."},{"key":"e_1_3_2_1_48_1","volume-title":"Delphi: A cryptographic inference service for neural networks. In 29th { USENIX} Security Symposium ({ USENIX} Security 20). 2505\u20132522.","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca\u00a0Ada Popa. 2020. Delphi: A cryptographic inference service for neural networks. In 29th { USENIX} Security Symposium ({ USENIX} Security 20). 2505\u20132522."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_51_1","volume-title":"GForce:GPU-Friendly Oblivious and Rapid Neural Network Inference. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Ng KL","year":"2021","unstructured":"Lucien\u00a0KL Ng and Sherman\u00a0SM Chow. 2021. GForce:GPU-Friendly Oblivious and Rapid Neural Network Inference. In 30th USENIX Security Symposium (USENIX Security 21). 2147\u20132164."},{"key":"e_1_3_2_1_52_1","volume-title":"Activation functions: Comparison of trends in practice and research for deep learning. arXiv preprint arXiv:1811.03378","author":"Nwankpa Chigozie","year":"2018","unstructured":"Chigozie Nwankpa, Winifred Ijomah, Anthony Gachagan, and Stephen Marshall. 2018. Activation functions: Comparison of trends in practice and research for deep learning. arXiv preprint arXiv:1811.03378 (2018)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_20"},{"key":"e_1_3_2_1_54_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Patra Arpita","year":"2021","unstructured":"Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. 2021. { ABY2. 0} : Improved { Mixed-Protocol} Secure { Two-Party} Computation. In 30th USENIX Security Symposium (USENIX Security 21). 2165\u20132182."},{"key":"e_1_3_2_1_55_1","volume-title":"BLAZE: blazing fast privacy-preserving machine learning. arXiv preprint arXiv:2005.09042","author":"Patra Arpita","year":"2020","unstructured":"Arpita Patra and Ajith Suresh. 2020. BLAZE: blazing fast privacy-preserving machine learning. arXiv preprint arXiv:2005.09042 (2020)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833697"},{"key":"e_1_3_2_1_57_1","volume-title":"Divya Gupta, Rahul Sharma, Nishanth Chandran, and Aseem Rastogi.","author":"Rathee Deevashwer","year":"2021","unstructured":"Deevashwer Rathee, Mayank Rathee, Rahul Kranti\u00a0Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, and Aseem Rastogi. 2021. SIRNN: A Math Library for Secure RNN Inference. arXiv preprint arXiv:2105.04236 (2021)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_2_1_59_1","volume-title":"28th { USENIX} Security Symposium ({ USENIX} Security 19). 1501\u20131518.","author":"Riazi M\u00a0Sadegh","unstructured":"M\u00a0Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. { XONN} : XNOR-based Oblivious Deep Neural Network Inference. In 28th { USENIX} Security Symposium ({ USENIX} Security 19). 1501\u20131518."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35423-7_12"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196023"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014139"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_65_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2007.114"},{"key":"e_1_3_2_1_67_1","volume-title":"Mpcleague: robust MPC platform for privacy-preserving machine learning. arXiv preprint arXiv:2112.13338","author":"Suresh Ajith","year":"2021","unstructured":"Ajith Suresh. 2021. Mpcleague: robust MPC platform for privacy-preserving machine learning. arXiv preprint arXiv:2112.13338 (2021)."},{"key":"e_1_3_2_1_68_1","volume-title":"CRYPTGPU: Fast Privacy-Preserving Machine Learning on the GPU. arXiv preprint arXiv:2104.10949","author":"Tan Sijun","year":"2021","unstructured":"Sijun Tan, Brian Knott, Yuan Tian, and David\u00a0J Wu. 2021. CRYPTGPU: Fast Privacy-Preserving Machine Learning on the GPU. arXiv preprint arXiv:2104.10949 (2021)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0073-7"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"e_1_3_2_1_71_1","volume-title":"FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. arXiv preprint arXiv:2004.02229","author":"Wagh Sameer","year":"2020","unstructured":"Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, and Tal Rabin. 2020. FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. arXiv preprint arXiv:2004.02229 (2020)."},{"key":"e_1_3_2_1_72_1","volume-title":"Piranha: A GPU Platform for Secure Computation. Cryptology ePrint Archive","author":"Watson Jean-Luc","year":"2022","unstructured":"Jean-Luc Watson, Sameer Wagh, and Raluca\u00a0Ada Popa. 2022. Piranha: A GPU Platform for Secure Computation. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_73_1","volume-title":"27th Annual Symposium on Foundations of Computer Science (sfcs","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). IEEE, 162\u2013167."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_74"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:22Z","timestamp":1750178242000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":74,"alternative-id":["10.1145\/3543507.3583272","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583272","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}