{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:02:41Z","timestamp":1773277361004,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2023YFB4503204"],"award-info":[{"award-number":["2023YFB4503204"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3669940.3707276","type":"proceedings-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T12:28:01Z","timestamp":1738844881000},"page":"924-939","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["<scp>ReSBM:<\/scp>\n            Region-based Scale and Minimal-Level Bootstrapping Management for FHE via Min-Cut"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6845-7864","authenticated-orcid":false,"given":"Yan","family":"Liu","sequence":"first","affiliation":[{"name":"Ant Group, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5782-0454","authenticated-orcid":false,"given":"Jianxin","family":"Lai","sequence":"additional","affiliation":[{"name":"Ant Group, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2098-2193","authenticated-orcid":false,"given":"Long","family":"Li","sequence":"additional","affiliation":[{"name":"Ant Group, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9692-5578","authenticated-orcid":false,"given":"Tianxiang","family":"Sui","sequence":"additional","affiliation":[{"name":"Ant Group, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2778-7100","authenticated-orcid":false,"given":"Linjie","family":"Xiao","sequence":"additional","affiliation":[{"name":"Ant Group, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7070-6828","authenticated-orcid":false,"given":"Peng","family":"Yuan","sequence":"additional","affiliation":[{"name":"Ant Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8443-3803","authenticated-orcid":false,"given":"Xiaojing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ant Group, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5144-5442","authenticated-orcid":false,"given":"Qing","family":"Zhu","sequence":"additional","affiliation":[{"name":"Ant Group, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4281-1018","authenticated-orcid":false,"given":"Wenguang","family":"Chen","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China, &amp; Ant Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0380-3506","authenticated-orcid":false,"given":"Jingling","family":"Xue","sequence":"additional","affiliation":[{"name":"UNSW, Ant Group, Sydney, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"e_1_3_2_1_2_1","unstructured":"Martin Albrecht Melissa Chase Hao Chen Jintai Ding Shafi Goldwasser Sergey Gorbunov Shai Halevi Jeffrey Hoffstein Kim Laine Kristin Lauter Satya Lokam Daniele Micciancio Dustin Moody Travis Morrison Amit Sahai and Vinod Vaikuntanathan. 2018. Homomorphic Encryption Security Standard. In Technical Report. Homomorphic Encryption.org Toronto Canada."},{"key":"e_1_3_2_1_3_1","unstructured":"Krizhevsky Alex Sutskever I. and Hinton G. 2012. ImageNet Classification with Deep Convolutional Neural Networks. Advances in neural information processing systems 25 2 (2012)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Hao Chen Ilaria Chillotti and Yongsoo Song. 2019. Improved Bootstrapping for Approximate Homomorphic Encryption. In In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cham: Springer International Publishing. 34--54.","DOI":"10.1007\/978-3-030-17656-3_2"},{"key":"e_1_3_2_1_5_1","volume-title":"Advances in Cryptology--EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29-May 3, Part I 37. 360--384.","author":"Cheon Jung Hee","unstructured":"Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2018. Bootstrapping for Approximate Homomorphic Encryption. In In Advances in Cryptology--EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29-May 3, Part I 37. 360--384."},{"key":"e_1_3_2_1_6_1","unstructured":"ANT-ACE Compiler. 2024. https:\/\/github.com\/ant-research\/acecompiler."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the forty-first annual ACM symposium on Theory of computing. 169--178","author":"Craig Gentry","year":"2009","unstructured":"Gentry Craig. 2009. Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing. 169--178."},{"key":"e_1_3_2_1_8_1","volume-title":"Asymptotically-Faster, Attribute-Based. In Advances in Cryptology -- CRYPTO","author":"Craig Gentry","year":"2013","unstructured":"Gentry Craig, Sahai Amit, and Waters Brent. 2013. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. In Advances in Cryptology -- CRYPTO 2013, Canetti Ran and Garay Juan A. (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 75--92."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Machine Learning. PMLR, 12403--12422","author":"Eunsang Lee","year":"2022","unstructured":"Lee Eunsang, Lee Joon-Woo, Lee Junghyun, Kim Young-Sik, Kim Yongjune, No Jong-Seon, and Choi Woosuk. 2022. Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions. In International Conference on Machine Learning. PMLR, 12403--12422."},{"key":"e_1_3_2_1_11_1","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. Cryptology ePrint Archive Paper 2012\/144. https:\/\/eprint.iacr.org\/2012\/144"},{"key":"e_1_3_2_1_12_1","unstructured":"Robin Geelen. 2021. Bootstrapping Algorithms for BGV and FV. Ph.D. Dissertation. KU Leuven."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0075"},{"key":"e_1_3_2_1_14_1","volume-title":"Optimizing relinearization in circuits for homomorphic encryption. arXiv preprint arXiv:1711.06319","author":"Hao Chen","year":"2017","unstructured":"Chen Hao. 2017. Optimizing relinearization in circuits for homomorphic encryption. arXiv preprint arXiv:1711.06319 (2017)."},{"key":"e_1_3_2_1_15_1","volume-title":"Advances in Cryptology--ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3--7","author":"Hee Cheon Jung","year":"2017","unstructured":"Cheon Jung Hee, Kim Andrey, Kim Miran, and Song Yongsoo. 2017. Homomorphic encryption for arithmetic of approximate numbers. In Advances in Cryptology--ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3--7, 2017, Proceedings, Part I 23. Springer, 409--437."},{"key":"e_1_3_2_1_16_1","volume-title":"Selected Areas in Cryptography--SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15--17","author":"Hee Cheon Jung","year":"2018","unstructured":"Cheon Jung Hee, Han Kyoohyung, Kim Andrey, Kim Miran, and Song Yongsoo. 2019. A full RNS variant of approximate homomorphic encryption. In Selected Areas in Cryptography--SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15--17, 2018, Revised Selected Papers 25. Springer, 347--368."},{"key":"e_1_3_2_1_17_1","volume-title":"Faster homomorphic discrete fourier transforms and improved fhe bootstrapping. Cryptology ePrint Archive","author":"Hee Cheon Jung","year":"2018","unstructured":"Cheon Jung Hee, Han Kyoohyung, and Hhan Minki. 2018. Faster homomorphic discrete fourier transforms and improved fhe bootstrapping. Cryptology ePrint Archive (2018)."},{"key":"e_1_3_2_1_18_1","unstructured":"Andrew G. Howard Menglong Zhu Bo Chen Dmitry Kalenichenko Weijun Wang Tobias Weyand Marco Andreetto and Hartwig Adam. 2017. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. (2017). arXiv:1704.04861"},{"key":"e_1_3_2_1_19_1","volume-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and < 1MB model size. CoRR abs\/1602.07360","author":"Iandola Forrest N.","year":"2016","unstructured":"Forrest N. Iandola, Matthew W. Moskewicz, Khalid Ashraf, Song Han, William J. Dally, and Kurt Keutzer. 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and < 1MB model size. CoRR abs\/1602.07360 (2016). arXiv:1602.07360 http:\/\/arxiv.org\/abs\/1602.07360"},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in Cryptology--ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4--8","author":"Ilaria Chillotti","year":"2016","unstructured":"Chillotti Ilaria, Gama Nicolas, Georgieva Mariya, and Izabachene Malika. 2016. Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. In Advances in Cryptology--ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4--8, 2016, Proceedings, Part I 22. Springer, 3--33."},{"key":"e_1_3_2_1_21_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 587--617","author":"Jean-Philippe Bossuat","year":"2021","unstructured":"Bossuat Jean-Philippe, Mouchet Christian, Troncoso-Pastoriza Juan, and Hubaux Jean-Pierre. 2021. Efficient bootstrapping for approximate homomorphic encryption with non-sparse keys. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 587--617."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778","author":"Kaiming He","year":"2016","unstructured":"He Kaiming, Zhang Xiangyu, Ren Shaoqing, and Sun Jian. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778."},{"key":"e_1_3_2_1_23_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. Computer Science","author":"Karen Simonyan","year":"2014","unstructured":"Simonyan Karen and Zisserman Andrew. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. Computer Science (2014)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3656382"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3105111"},{"key":"e_1_3_2_1_26_1","volume-title":"ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Lee Yongwoo","year":"2023","unstructured":"Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, and Hanjun Kim. 2023. ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption. In 32nd USENIX Security Symposium (USENIX Security 23). 4697--4714."},{"key":"e_1_3_2_1_27_1","volume-title":"Annual international conference on the theory and applications of cryptographic techniques. Springer, 617--640","author":"L\u00e9o Ducas","year":"2015","unstructured":"Ducas L\u00e9o and Micciancio Daniele. 2015. FHEW: bootstrapping homomorphic encryption in less than a second. In Annual international conference on the theory and applications of cryptographic techniques. Springer, 617--640."},{"key":"e_1_3_2_1_28_1","volume-title":"ANT-ACE: An FHE Compiler Framework for Automating Neural Network Inference. In 2025 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO).","author":"Li Long","year":"2025","unstructured":"Long Li, Jianxin Lai, Peng Yuan, Tianxiang Sui, Yan Liu, Qing Zhu, Xiaojing Zhang, Linjie Xiao, Wenguang Chen, and Jingling Xue. 2025. ANT-ACE: An FHE Compiler Framework for Automating Neural Network Inference. In 2025 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/263867.263872"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the Annual ACM Symposium on Theory of Computing 56","author":"Oded Regev","year":"2009","unstructured":"Regev Oded. 2009. On Lattices and Learning With Errors and Random Linear Codes and Cryptography. Proceedings of the Annual ACM Symposium on Theory of Computing 56, 6 (2009), 84--93."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--31301--6_2"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","volume":"3","author":"Raghav Malik","year":"2023","unstructured":"Malik Raghav, Sheth Kabir, and Kulkarni Milind. 2023. Coyote: A compiler for vectorizing encrypted arithmetic circuits. In Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3. 118--133."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 40th ACM SIGPLAN conference on programming language design and implementation. 142--156","author":"Roshan Dathathri","year":"2019","unstructured":"Dathathri Roshan, Saarikivi Olli, Chen Hao, Laine Kim, Lauter Kristin, Maleki Saeed, Musuvathi Madanlal, and Mytkowicz Todd. 2019. CHET: An Optimizing Compiler for Fully-Homomorphic Neural-Network Inferencing. In Proceedings of the 40th ACM SIGPLAN conference on programming language design and implementation. 142--156."},{"key":"e_1_3_2_1_34_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","unstructured":"SEAL 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_35_1","volume-title":"Jung Sunchul, Kim Taekyung, Lee Dongyoon, and Kim Hanjun.","author":"Seonyoung Cheon","year":"2024","unstructured":"Cheon Seonyoung, Lee Yongwoo, Kim Dongkwan, Lee Ju Min, Jung Sunchul, Kim Taekyung, Lee Dongyoon, and Kim Hanjun. 2024. DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/cheon"},{"key":"e_1_3_2_1_36_1","volume-title":"Advances in Cryptology -- CRYPTO","author":"Shai Halevi","year":"2014","unstructured":"Halevi Shai and Shoup Victor. 2014. Algorithms in HElib. In Advances in Cryptology -- CRYPTO 2014, Juan A. Garay and Rosario Gennaro (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 554--571."},{"key":"e_1_3_2_1_37_1","unstructured":"HEAAN software library. 2020. https:\/\/github.com\/snucrypto\/HEAAN."},{"key":"e_1_3_2_1_38_1","first-page":"43","article-title":"On Ideal Lattices and Learning with Errors over Rings","volume":"60","author":"Vadim Lyubashevsky","year":"2013","unstructured":"Lyubashevsky Vadim, Peikert Chris, and Regev Oded. 2013. On Ideal Lattices and Learning with Errors over Rings. Journal of the Association for Computing Machinery 60, 6 (2013), 43.1--43.35.","journal-title":"Journal of the Association for Computing Machinery"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10132930"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO53902.2022.9741265"},{"key":"e_1_3_2_1_41_1","volume-title":"Qiwu: Exploiting Ciphertext-Level SIMD Parallelism in Homomorphic Encryption Programs. In 2025 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO).","author":"Zhang Zhongcheng","year":"2025","unstructured":"Zhongcheng Zhang, Ying Li, Yuyang Zhang, Zhenchuan Chen, Jiacheng Zhao, XiaoBing Feng, Huimin Cui, and Jingling Xue. 2025. Qiwu: Exploiting Ciphertext-Level SIMD Parallelism in Homomorphic Encryption Programs. In 2025 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3669940.3707276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:48:25Z","timestamp":1755787705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":42,"alternative-id":["10.1145\/3669940.3707276","10.1145\/3669940"],"URL":"https:\/\/doi.org\/10.1145\/3669940.3707276","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}