{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:48:43Z","timestamp":1767707323199,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute of Information communications Technology Planning Evaluation (IITP) grant funded by the Korea government","award":["2022-0-01047"],"award-info":[{"award-number":["2022-0-01047"]}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2021R1F1A1045"],"award-info":[{"award-number":["2021R1F1A1045"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3605759.3625262","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T22:55:48Z","timestamp":1700693748000},"page":"91-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Fully Homomorphic Privacy-Preserving Naive Bayes Machine Learning and Classification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6190-5791","authenticated-orcid":false,"given":"Boyoung","family":"Han","sequence":"first","affiliation":[{"name":"SeoulTech, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8326-169X","authenticated-orcid":false,"given":"Yeonghyeon","family":"Kim","sequence":"additional","affiliation":[{"name":"CryptoLab, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1851-5712","authenticated-orcid":false,"given":"Jina","family":"Choi","sequence":"additional","affiliation":[{"name":"SeoulTech, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8804-963X","authenticated-orcid":false,"given":"Hojune","family":"Shin","sequence":"additional","affiliation":[{"name":"SeoulTech, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1767-6165","authenticated-orcid":false,"given":"Younho","family":"Lee","sequence":"additional","affiliation":[{"name":"SeoulTech, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1997. Car Evaluation. UCI Machine Learning Repository."},{"key":"e_1_3_2_1_2_1","first-page":"62","article-title":"Multinomial Naive Bayes classification model for sentiment analysis","volume":"19","author":"Abbas Muhammad","year":"2019","unstructured":"Muhammad Abbas, K Ali Memon, A Aleem Jamali, Saleemullah Memon, and Anees Ahmed. 2019. Multinomial Naive Bayes classification model for sentiment analysis. IJCSNS Int. J. Comput. Sci. Netw. Secur 19, 3 (2019), 62.","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur"},{"key":"e_1_3_2_1_3_1","unstructured":"Kendall E Atkinson. 1989. An introduction to numerical analysis. new york: John willey & sons."},{"volume-title":"Clinical decision support systems","author":"Berner Eta S","key":"e_1_3_2_1_4_1","unstructured":"Eta S Berner. 2007. Clinical decision support systems. Vol. 233. Springer."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_6_1","volume-title":"Noninteractive Privacy-Preserving Na\u00efve Bayes Classifier Using Homomorphic Encryption. In International Conference on Security and Privacy in New Computing Environments. Springer, 192--203","author":"Chen Jingwei","year":"2021","unstructured":"Jingwei Chen, Yong Feng, Yang Liu, Wenyuan Wu, and Guanci Yang. 2021. Noninteractive Privacy-Preserving Na\u00efve Bayes Classifier Using Homomorphic Encryption. In International Conference on Security and Privacy in New Computing Environments. Springer, 192--203."},{"volume-title":"International Conference on Selected Areas in Cryptography. Springer, 347--368","author":"Cheon Jung Hee","key":"e_1_3_2_1_7_1","unstructured":"Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 20A full RNS variant of approximate homomorphic encryption. In International Conference on Selected Areas in Cryptography. Springer, 347--368."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_8"},{"key":"e_1_3_2_1_10_1","unstructured":"CryptoLab. 2023. HEAAN library. https:\/\/heaan.it\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Jacek Czerniak. 2009. Acute Inflammations. UCI Machine Learning Repository."},{"key":"e_1_3_2_1_12_1","volume-title":"Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.181"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.058"},{"key":"e_1_3_2_1_16_1","volume-title":"An introduction to the california consumer privacy act (CCPA). Santa Clara Univ. Legal Studies Research Paper","author":"Goldman Eric","year":"2020","unstructured":"Eric Goldman. 2020. An introduction to the california consumer privacy act (CCPA). Santa Clara Univ. Legal Studies Research Paper (2020)."},{"volume-title":"Cryptographers' Track at the RSA Conference","author":"Han Kyoohyung","key":"e_1_3_2_1_17_1","unstructured":"Kyoohyung Han and Dohyeong Ki. 2020. Better bootstrapping for approximate homomorphic encryption. In Cryptographers' Track at the RSA Conference. Springer, 364--390."},{"key":"e_1_3_2_1_18_1","unstructured":"Joseph L Hellerstein TS Jayram Irina Rish et al. 2000. Recognizing end-user transactions in performance management. IBM Thomas J. Watson Research Division Hawthorne NY."},{"key":"e_1_3_2_1_19_1","unstructured":"D. Hermes. 2017. Remez Algorithm for log(x). https:\/\/gist.github.com\/dhermes\/ 105da2a3c9861c90ea39#file-remez-pdf."},{"key":"e_1_3_2_1_20_1","volume-title":"Jung Hee Cheon, and Younho Lee.","author":"Jung Wonkyung","year":"2021","unstructured":"Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, and Younho Lee. 2021. Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs. IACR Transactions on Cryptographic Hardware and Embedded Systems (2021), 114--148."},{"key":"e_1_3_2_1_21_1","volume-title":"IEEE ICDM workshop on privacy preserving data mining. 3--9.","author":"Kantarcoglu Murat","year":"2003","unstructured":"Murat Kantarcoglu, Jaideep Vaidya, and C Clifton. 2003. Privacy preserving naive bayes classifier for horizontally partitioned data. In IEEE ICDM workshop on privacy preserving data mining. 3--9."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2691-0"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04212-7_30"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049216"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_22"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3275649"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.021"},{"key":"e_1_3_2_1_28_1","first-page":"222","article-title":"Privacy-preserving outsourced clinical decision support system in the cloud","volume":"14","author":"Liu Ximeng","year":"2017","unstructured":"Ximeng Liu, Robert H Deng, Kim-Kwang Raymond Choo, and Yang Yang. 2017. Privacy-preserving outsourced clinical decision support system in the cloud. IEEE Transactions on Services Computing 14, 1 (2017), 222--234.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_2_1_29_1","volume-title":"Privacypreserving patient-centric clinical decision support system on naive Bayesian classification","author":"Liu Ximeng","year":"2015","unstructured":"Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, and Baodong Qin. 2015. Privacypreserving patient-centric clinical decision support system on naive Bayesian classification. IEEE journal of biomedical and health informatics 20, 2 (2015), 655--668."},{"key":"e_1_3_2_1_30_1","volume-title":"Machine learning. Annual review of computer science 4, 1","author":"Mitchell Tom","year":"1990","unstructured":"Tom Mitchell, Bruce Buchanan, Gerald DeJong, Thomas Dietterich, Paul Rosenbloom, and Alex Waibel. 1990. Machine learning. Annual review of computer science 4, 1 (1990), 417--433."},{"volume-title":"Biomedical informatics","author":"Musen Mark A","key":"e_1_3_2_1_31_1","unstructured":"Mark A Musen, Blackford Middleton, and Robert A Greenes. 2021. Clinical decision-support systems. In Biomedical informatics. Springer, 795--840."},{"key":"e_1_3_2_1_32_1","series-title":"Journal of Physics: Conference Series","volume-title":"Sentiment analysis system for movie review in Bahasa Indonesia using naive bayes classifier method","author":"Nurdiansyah Yanuar","year":"2011","unstructured":"Yanuar Nurdiansyah, Saiful Bukhori, and Rahmad Hidayat. 2018. Sentiment analysis system for movie review in Bahasa Indonesia using naive bayes classifier method. In Journal of Physics: Conference Series, Vol. 1008. IOP Publishing, 012011."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.12.004"},{"key":"e_1_3_2_1_34_1","first-page":"41","article-title":"Sur la d\u00e9termination des polyn\u00f4mes d'approximation de degr\u00e9 donn\u00e9e","volume":"10","author":"Remez Eugene Y","year":"1934","unstructured":"Eugene Y Remez. 1934. Sur la d\u00e9termination des polyn\u00f4mes d'approximation de degr\u00e9 donn\u00e9e. Comm. Soc. Math. Kharkov 10, 196 (1934), 41--63.","journal-title":"Comm. Soc. Math. Kharkov"},{"key":"e_1_3_2_1_35_1","volume-title":"Signal processing and machine learning with differential privacy: Algorithms and challenges for continuous data","author":"Sarwate Anand D","year":"2013","unstructured":"Anand D Sarwate and Kamalika Chaudhuri. 2013. Signal processing and machine learning with differential privacy: Algorithms and challenges for continuous data. IEEE signal processing magazine 30, 5 (2013), 86--94."},{"key":"e_1_3_2_1_36_1","volume-title":"Computerassisted decision support for the diagnosis and treatment of infectious diseases in intensive care units. The Lancet infectious diseases 5, 5","author":"Schurink CAM","year":"2005","unstructured":"CAM Schurink, PJF Lucas, IM Hoepelman, and MJM Bonten. 2005. Computerassisted decision support for the diagnosis and treatment of infectious diseases in intensive care units. The Lancet infectious diseases 5, 5 (2005), 305--312."},{"volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","key":"e_1_3_2_1_37_1","unstructured":"SEAL 2019. Microsoft SEAL (release 3.2). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_38_1","volume-title":"IOP Conference Series: Materials Science and Engineering","volume":"288","author":"Slamet Cepy","year":"2018","unstructured":"Cepy Slamet, Rian Andrian, Dian Sa'adillah Maylawati, W Darmalaksana, MA Ramdhani, et al. 2018. Web scraping and Na\u00efve Bayes classification for job search engine. In IOP Conference Series: Materials Science and Engineering, Vol. 288. IOP Publishing, 012038."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358331.3358396"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.59"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0041-y"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.80"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102630"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103215"},{"key":"e_1_3_2_1_46_1","unstructured":"WIlliam Wolberg. 1992. Breast Cancer Wisconsin (Original). UCI Machine Learning Repository."},{"key":"e_1_3_2_1_47_1","volume-title":"20Private naive bayes classification of personal biomedical data: Applicationin cancer data analysis. Computers in biology and medicine 105","author":"Wood Alexander","year":"2019","unstructured":"Alexander Wood, Vladimir Shpilrain, Kayvan Najarian, and Delaram Kahrobaei. 20Private naive bayes classification of personal biomedical data: Applicationin cancer data analysis. Computers in biology and medicine 105 (2019), 144--150."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.9"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366030.3366056"},{"key":"e_1_3_2_1_50_1","volume-title":"Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers. Information systems 34, 3","author":"Yi Xun","year":"2009","unstructured":"Xun Yi and Yanchun Zhang. 2009. Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers. Information systems 34, 3 (2009), 371--380."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103011"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 11th Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605759.3625262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605759.3625262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:31:37Z","timestamp":1755973897000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605759.3625262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":51,"alternative-id":["10.1145\/3605759.3625262","10.1145\/3605759"],"URL":"https:\/\/doi.org\/10.1145\/3605759.3625262","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}