{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:16:52Z","timestamp":1775881012931,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Science and Technology of the People's Republic of China","award":["2023YFB3106501"],"award-info":[{"award-number":["2023YFB3106501"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62227805"],"award-info":[{"award-number":["62227805"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072398"],"award-info":[{"award-number":["62072398"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132008"],"award-info":[{"award-number":["62132008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20220075"],"award-info":[{"award-number":["BK20220075"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Fok Ying-Tung Education Foundation for Young Teachers in the Higher Education Institutions of China","award":["20193218210004"],"award-info":[{"award-number":["20193218210004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3656285","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"512-521","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3621-7078","authenticated-orcid":false,"given":"Bo","family":"Yu","sequence":"first","affiliation":[{"name":"Blockchain Research Institute, Bestpay Co., Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3160-6702","authenticated-orcid":false,"given":"Huajie","family":"Shen","sequence":"additional","affiliation":[{"name":"Blockchain Research Institute, Bestpay Co., Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7144-415X","authenticated-orcid":false,"given":"Qian","family":"Xu","sequence":"additional","affiliation":[{"name":"Blockchain Research Institute, Bestpay Co., Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2628-8028","authenticated-orcid":false,"given":"Wei","family":"He","sequence":"additional","affiliation":[{"name":"Blockchain Research Institute, Bestpay Co., Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4210-593X","authenticated-orcid":false,"given":"Wankui","family":"Mao","sequence":"additional","affiliation":[{"name":"Blockchain Research Institute, Bestpay Co., Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9559-3621","authenticated-orcid":false,"given":"Qing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Blockchain Research Institute, Bestpay Co., Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6087-8243","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015INP0020"},{"key":"e_1_3_2_1_3_1","unstructured":"Ayoub Benaissa Bilal Retiat Bogdan Cebere and Alaa Eddine Belfedhal. 2021. TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption. arXiv:2104.03152 [cs.CR]"},{"key":"e_1_3_2_1_4_1","volume-title":"Post-quantum cryptography. Nature 549, 7671","author":"Bernstein Daniel J","year":"2017","unstructured":"Daniel J Bernstein and Tanja Lange. 2017. Post-quantum cryptography. Nature 549, 7671 (2017), 188--194."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 2652--2662","author":"Chen Chaochao","year":"2021","unstructured":"Chaochao Chen, Jun Zhou, Li Wang, Xibin Wu, Wenjing Fang, Jin Tan, Lei Wang, Alex X Liu, Hao Wang, and Cheng Hong. 2021. When homomorphic encryption marries secret sharing: Secure large-scale sparse logistic regression and applications in risk control. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 2652--2662."},{"key":"e_1_3_2_1_9_1","volume-title":"The-x: Privacy-preserving transformer inference with homomorphic encryption. arXiv preprint arXiv:2206.00216","author":"Chen Tianyu","year":"2022","unstructured":"Tianyu Chen, Hangbo Bao, Shaohan Huang, Li Dong, Binxing Jiao, Daxin Jiang, Haoyi Zhou, Jianxin Li, and Furu Wei. 2022. The-x: Privacy-preserving transformer inference with homomorphic encryption. arXiv preprint arXiv:2206.00216 (2022)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2021.3082561"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_13_1","volume-title":"PUMA: Secure Inference of LLaMA-7B in Five Minutes. arXiv preprint arXiv:2307.12533","author":"Dong Ye","year":"2023","unstructured":"Ye Dong, Wen-jie Lu, Yancheng Zheng, Haoqi Wu, Derun Zhao, Jin Tan, Zhicong Huang, Cheng Hong, Tao Wei, and Wenguang Cheng. 2023. PUMA: Secure Inference of LLaMA-7B in Five Minutes. arXiv preprint arXiv:2307.12533 (2023)."},{"key":"e_1_3_2_1_14_1","volume-title":"Pradeep Kumar Mishra, and Masaya Yasuda","author":"Duong Dung Hoang","year":"2016","unstructured":"Dung Hoang Duong, Pradeep Kumar Mishra, and Masaya Yasuda. 2016. Efficient secure matrix multiplication over LWE-based homomorphic encryption. Tatra mountains mathematical publications 67, 1 (2016), 69--83."},{"key":"e_1_3_2_1_15_1","volume-title":"VERTICES: Efficient Two-Party Vertical Federated Linear Model with TTP-aided Secret Sharing. arXiv preprint arXiv:2306.16139","author":"Fan Mingxuan","year":"2023","unstructured":"Mingxuan Fan, Yilun Jin, Liu Yang, Zhenghang Ren, and Kai Chen. 2023. VERTICES: Efficient Two-Party Vertical Federated Linear Model with TTP-aided Secret Sharing. arXiv preprint arXiv:2306.16139 (2023)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings, Part I 34","author":"Halevi Shai","year":"2014","unstructured":"Shai Halevi and Victor Shoup. 2014. Algorithms in helib. In Advances in Cryptology-CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17--21, 2014, Proceedings, Part I 34. Springer, 554--571."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_4"},{"key":"e_1_3_2_1_19_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding. 2022. Cheetah: Lean and fast secure {two-party} deep neural network inference. In 31st USENIX Security Symposium (USENIX Security 22). 809--826."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"e_1_3_2_1_21_1","volume-title":"Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated Learning. In 2023 International Conference on Computing, Networking and Communications (ICNC). IEEE, 71--76","author":"Kaewpuang Rakpong","year":"2023","unstructured":"Rakpong Kaewpuang, Minrui Xu, Dusit Niyato, Han Yu, Zehui Xiong, and Xuemin Sherman Shen. 2023. Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated Learning. In 2023 International Conference on Computing, Networking and Communications (ICNC). IEEE, 71--76."},{"key":"e_1_3_2_1_22_1","volume-title":"Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, et al.","author":"Kairouz Peter","year":"2021","unstructured":"Peter Kairouz, H Brendan McMahan, Brendan Avent, Aur\u00e9lien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, et al. 2021. Advances and open problems in federated learning. Foundations and Trends\u00ae in Machine Learning 14, 1--2 (2021), 1--210."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Harashta Tatimma Larasati Muhammad Firdaus and Howon Kim. 2022. Quantum Federated Learning: Remarks and Challenges. In 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)\/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE 1--5.","DOI":"10.1109\/CSCloud-EdgeCom54986.2022.00010"},{"key":"e_1_3_2_1_24_1","volume-title":"Ameet Talwalkar, and Virginia Smith.","author":"Li Tian","year":"2020","unstructured":"Tian Li, Anit Kumar Sahu, Ameet Talwalkar, and Virginia Smith. 2020. Federated learning: Challenges, methods, and future directions. IEEE signal processing magazine 37, 3 (2020), 50--60."},{"key":"e_1_3_2_1_25_1","volume-title":"2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1057--1073","author":"Huang Zhicong","year":"2021","unstructured":"Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, and Hunter Qu. 2021. PEGASUS: bridging polynomial and non-polynomial evaluations in homomorphic encryption. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1057--1073."},{"key":"e_1_3_2_1_26_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273--1282."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Xiaoxuan Pan Xi Cao Weiting Wang Ziyue Hua Weizhou Cai Xuegang Li Haiyan Wang Jiaqi Hu Yipu Song Dong-Ling Deng et al. 2023. Experimental quantum end-to-end learning on a superconducting processor. npj Quantum Information 9 1 (2023) 18.","DOI":"10.1038\/s41534-023-00685-w"},{"key":"e_1_3_2_1_29_1","volume-title":"Federated quantum natural gradient descent for quantum federated learning. arXiv preprint arXiv:2209.00564","author":"Jun Qi.","year":"2022","unstructured":"Jun Qi. 2022. Federated quantum natural gradient descent for quantum federated learning. arXiv preprint arXiv:2209.00564 (2022)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539703440678"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-022-00982-3"},{"key":"e_1_3_2_1_32_1","series-title":"SIAM review 41, 2","volume-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","author":"Shor Peter W","year":"1999","unstructured":"Peter W Shor. 1999. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review 41, 2 (1999), 303--332."},{"key":"e_1_3_2_1_33_1","volume-title":"Fully homomorphic SIMD operations. Designs, codes and cryptography 71","author":"Smart Nigel P","year":"2014","unstructured":"Nigel P Smart and Frederik Vercauteren. 2014. Fully homomorphic SIMD operations. Designs, codes and cryptography 71 (2014), 57--81."},{"key":"e_1_3_2_1_34_1","volume-title":"2021 17th International Conference on Mobility, Sensing and Networking (MSN). IEEE, 145--152","author":"Xia Qi","year":"2021","unstructured":"Qi Xia, Zeyi Tao, and Qun Li. 2021. Defending against byzantine attacks in quantum federated learning. In 2021 17th International Conference on Mobility, Sensing and Networking (MSN). IEEE, 145--152."},{"key":"e_1_3_2_1_35_1","volume-title":"Qiujun Lan, and Gang Li.","author":"Xu Rongxin","year":"2023","unstructured":"Rongxin Xu, Shiva Raj Pokhrel, Qiujun Lan, and Gang Li. 2023. Post Quantum Secure Blockchain-based Federated Learning for Mobile Edge Computing. arXiv preprint arXiv:2302.13258 (2023)."},{"key":"e_1_3_2_1_36_1","volume-title":"Efficient batch homomorphic encryption for vertically federated xgboost. arXiv preprint arXiv:2112.04261","author":"Xu Wuxing","year":"2021","unstructured":"Wuxing Xu, Hao Fan, Kaixin Li, and Kai Yang. 2021. Efficient batch homomorphic encryption for vertically federated xgboost. arXiv preprint arXiv:2112.04261 (2021)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339474"},{"key":"e_1_3_2_1_38_1","volume-title":"Parallel distributed logistic regression for vertical federated learning without third-party coordinator. arXiv preprint arXiv:1911.09824","author":"Yang Shengwen","year":"2019","unstructured":"Shengwen Yang, Bing Ren, Xuhui Zhou, and Liping Liu. 2019. Parallel distributed logistic regression for vertical federated learning without third-party coordinator. arXiv preprint arXiv:1911.09824 (2019)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1164"},{"key":"e_1_3_2_1_40_1","volume-title":"Federated Learning with Quantum Secure Aggregation. arXiv preprint arXiv:2207.07444","author":"Zhang Yichi","year":"2022","unstructured":"Yichi Zhang, Chao Zhang, Cai Zhang, Lixin Fan, Bei Zeng, and Qiang Yang. 2022. Federated Learning with Quantum Secure Aggregation. arXiv preprint arXiv:2207.07444 (2022)."},{"key":"e_1_3_2_1_41_1","volume-title":"Konda Reddy Mopuri, and Hakan Bilen","author":"Zhao Bo","year":"2020","unstructured":"Bo Zhao, Konda Reddy Mopuri, and Hakan Bilen. 2020. idlg: Improved deep leakage from gradients. arXiv preprint arXiv:2001.02610 (2020)."},{"key":"e_1_3_2_1_42_1","volume-title":"Deep leakage from gradients. Advances in neural information processing systems 32","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep leakage from gradients. Advances in neural information processing systems 32 (2019)."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656285","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":42,"alternative-id":["10.1145\/3634737.3656285","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3656285","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}