{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T07:52:11Z","timestamp":1768722731995,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3591197.3591306","type":"proceedings-article","created":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T14:58:49Z","timestamp":1686322729000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy-Preserving Distributed Machine Learning Made Faster"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8944-7444","authenticated-orcid":false,"given":"Zoe L.","family":"Jiang","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China and Peng Cheng Laboratory, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7759-597X","authenticated-orcid":false,"given":"Jiajing","family":"Gu","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2983-7239","authenticated-orcid":false,"given":"Hongxiao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7952-7136","authenticated-orcid":false,"given":"Yulin","family":"Wu","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China and Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0730-8732","authenticated-orcid":false,"given":"Junbin","family":"Fang","sequence":"additional","affiliation":[{"name":"Jinan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3975-8500","authenticated-orcid":false,"given":"Siu-Ming","family":"Yiu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8357-1655","authenticated-orcid":false,"given":"Wenjian","family":"Luo","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China and Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-0649","authenticated-orcid":false,"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China and Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857731"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"e_1_3_2_1_3_1","first-page":"758","article-title":"Chimera: a unified framework for B\/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning","volume":"2018","author":"Boura Christina","year":"2018","unstructured":"Christina Boura, Nicolas Gama, and Mariya Georgieva. 2018. Chimera: a unified framework for B\/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning. IACR Cryptol. ePrint Arch. 2018 (2018), 758.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2019-0026"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Florian Bourse Michele Minelli Matthias Minihold and Pascal Paillier. 2018. Fast Homomorphic Evaluation of Deep Discretized Neural Networks. In Advances in Cryptology - CRYPTO 2018(Lecture Notes in Computer Science Vol.\u00a010993). 483\u2013512.","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski and Renen Perlman. 2016. Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts. In Advances in Cryptology - CRYPTO 2016(Lecture Notes in Computer Science Vol.\u00a09814). 190\u2013213.","DOI":"10.1007\/978-3-662-53018-4_8"},{"key":"e_1_3_2_1_8_1","volume-title":"Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security(Lecture Notes in Computer Science, Vol.\u00a011922). 446\u2013472.","author":"Chen Hao","unstructured":"Hao Chen, Ilaria Chillotti, and Yongsoo Song. 2019. Multi-Key homomorphic encryption from TFHE. In Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security(Lecture Notes in Computer Science, Vol.\u00a011922). 446\u2013472."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363207"},{"key":"e_1_3_2_1_10_1","first-page":"462","article-title":"Logistic regression over encrypted data from fully homomorphic encryption","volume":"2018","author":"Chen Hao","year":"2018","unstructured":"Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, and Kristin\u00a0E. Lauter. 2018. Logistic regression over encrypted data from fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2018 (2018), 462.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Jung\u00a0Hee Cheon Kyoohyung Han Andrey Kim Miran Kim and Yongsoo Song. 2018. Bootstrapping for Approximate Homomorphic Encryption. In Advances in Cryptology - EUROCRYPT 2018(Lecture Notes in Computer Science Vol.\u00a010820). 360\u2013384.","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Jung\u00a0Hee Cheon Andrey Kim Miran Kim and Yong\u00a0Soo Song. 2017. Homomorphic Encryption for Arithmetic of Approximate Numbers. In Advances in Cryptology - ASIACRYPT 2017(Lecture Notes in Computer Science Vol.\u00a010624). 409\u2013437.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866697"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Ilaria Chillotti Nicolas Gama Mariya Georgieva and Malika Izabach\u00e8ne. 2016. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds. In Advances in Cryptology - ASIACRYPT 2016(Lecture Notes in Computer Science Vol.\u00a010031). 3\u201333.","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_1_15_1","volume-title":"Advances in Cryptology - ASIACRYPT 2017(Lecture Notes in Computer Science, Vol.\u00a010624)","author":"Chillotti Ilaria","unstructured":"Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabach\u00e8ne. 2017. Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE. In Advances in Cryptology - ASIACRYPT 2017(Lecture Notes in Computer Science, Vol.\u00a010624). Springer, 377\u2013408."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Michael Clear and Ciaran McGoldrick. 2015. Multi-identity and multi-key leveled FHE from learning with errors. In Advances in Cryptology - CRYPTO 2015(Lecture Notes in Computer Science Vol.\u00a09216). 630\u2013656.","DOI":"10.1007\/978-3-662-48000-7_31"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267974"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267974"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_21_1","volume-title":"Scalable privacy-preserving distributed learning. arXiv preprint arXiv:2005.09532","author":"Froelicher David","year":"2020","unstructured":"David Froelicher, Juan\u00a0R Troncoso-Pastoriza, Apostolos Pyrgelis, Sinem Sav, Joao\u00a0Sa Sousa, Jean-Philippe Bossuat, and Jean-Pierre Hubaux. 2020. Scalable privacy-preserving distributed learning. arXiv preprint arXiv:2005.09532 (2020)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Craig Gentry Amit Sahai and Brent Waters. 2013. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler Asymptotically-Faster Attribute-Based. In Advances in Cryptology - CRYPTO 2013(Lecture Notes in Computer Science Vol.\u00a08042). 75\u201392.","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 33nd International Conference on Machine Learning, ICML 2016(JMLR Workshop and Conference Proceedings, Vol.\u00a048)","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin\u00a0E. Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016(JMLR Workshop and Conference Proceedings, Vol.\u00a048). 201\u2013210."},{"key":"e_1_3_2_1_25_1","volume-title":"Information Security and Cryptology - ICISC","author":"Graepel Thore","year":"2012","unstructured":"Thore Graepel, Kristin\u00a0E. Lauter, and Michael Naehrig. 2012. ML Confidential: Machine Learning on Encrypted Data. In Information Security and Cryptology - ICISC 2012, Vol.\u00a07839. 1\u201321."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675350"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2809624"},{"key":"e_1_3_2_1_28_1","volume-title":"Logistic regression model training based on the approximate homomorphic encryption. BMC medical genomics 11, 4","author":"Kim Andrey","year":"2018","unstructured":"Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, and Jung\u00a0Hee Cheon. 2018. Logistic regression model training based on the approximate homomorphic encryption. BMC medical genomics 11, 4 (2018), 23\u201331."},{"key":"e_1_3_2_1_29_1","first-page":"74","article-title":"Secure Logistic Regression based on Homomorphic Encryption","volume":"2018","author":"Kim Miran","year":"2018","unstructured":"Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, and Xiaoqian Jiang. 2018. Secure Logistic Regression based on Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2018 (2018), 74.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_30_1","volume-title":"Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR medical informatics 6, 2","author":"Kim Miran","year":"2018","unstructured":"Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang, 2018. Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR medical informatics 6, 2 (2018), e8805."},{"key":"e_1_3_2_1_31_1","volume-title":"BIOSIG 2020 - Proceedings of the 19th International Conference of the Biometrics Special Interest Group(LNI, Vol.\u00a0P-306)","author":"Kolberg Jascha","year":"2020","unstructured":"Jascha Kolberg, Pawel Drozdowski, Marta Gomez-Barrero, Christian Rathgeb, and Christoph Busch. 2020. Efficiency analysis of post-quantum-secure face template protection schemes based on homomorphic encryption. In BIOSIG 2020 - Proceedings of the 19th International Conference of the Biometrics Special Interest Group(LNI, Vol.\u00a0P-306). 175\u2013182."},{"key":"e_1_3_2_1_32_1","volume-title":"IMACC 2019(Lecture Notes in Computer Science, Vol.\u00a011929)","author":"Lee Hyang-Sook","year":"2019","unstructured":"Hyang-Sook Lee and Jeongeun Park. 2019. On the Security of Multikey Homomorphic Encryption. In Cryptography and Coding - 17th IMA International Conference, IMACC 2019(Lecture Notes in Computer Science, Vol.\u00a011929). 236\u2013251."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Pratyay Mukherjee and Daniel Wichs. 2016. Two round multiparty computation via multi-key FHE. In Advances in Cryptology - EUROCRYPT 2016(Lecture Notes in Computer Science Vol.\u00a09666). 735\u2013763.","DOI":"10.1007\/978-3-662-49896-5_26"},{"key":"e_1_3_2_1_35_1","volume-title":"TCC 2016-B(Lecture Notes in Computer Science, Vol.\u00a09986)","author":"Peikert Chris","year":"2016","unstructured":"Chris Peikert and Sina Shiehian. 2016. Multi-key FHE from LWE, Revisited. In Theory of Cryptography - 14th International Conference, TCC 2016-B(Lecture Notes in Computer Science, Vol.\u00a09986). 217\u2013238."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Jerome Saltzer and M\u00a0Frans Kaashoek. 2009. Principles of computer system design: an introduction. Morgan Kaufmann.","DOI":"10.1016\/B978-0-12-374957-4.00010-4"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3003468"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377454"},{"key":"e_1_3_2_1_39_1","volume-title":"An Efficient BIST Scheme for Non-Restoring Array Dividers. In 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD","author":"Vergos T","year":"2007","unstructured":"Haridimos\u00a0T Vergos. 2007. An Efficient BIST Scheme for Non-Restoring Array Dividers. In 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2007). IEEE, 664\u2013667."},{"key":"e_1_3_2_1_40_1","volume-title":"Machine learning","author":"Zhou Zhi-Hua","unstructured":"Zhi-Hua Zhou. 2021. Machine learning. Springer Nature."}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3591197.3591306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3591197.3591306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:46Z","timestamp":1750178866000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3591197.3591306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":40,"alternative-id":["10.1145\/3591197.3591306","10.1145\/3591197"],"URL":"https:\/\/doi.org\/10.1145\/3591197.3591306","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}