{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:50:50Z","timestamp":1767084650177,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T00:00:00Z","timestamp":1700352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,19]]},"DOI":"10.1145\/3689945.3694802","type":"proceedings-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:23:11Z","timestamp":1732040591000},"page":"64-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Training Encrypted Neural Networks on Encrypted Data with Fully Homomorphic Encryption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1986-6459","authenticated-orcid":false,"given":"Luca","family":"Colombo","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0460-1690","authenticated-orcid":false,"given":"Alessandro","family":"Falcetta","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7828-7687","authenticated-orcid":false,"given":"Manuel","family":"Roveri","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,11,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cds:20030607"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"e_1_3_2_1_3_1","volume-title":"Ilaria Chillotti, Benjamin R Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, et al.","author":"Bossuat Jean-Philippe","year":"2024","unstructured":"Jean-Philippe Bossuat, Rosario Cammarota, Jung Hee Cheon, Ilaria Chillotti, Benjamin R Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, et al. 2024. Security Guidelines for Implementing Homomorphic Encryption. Cryptology ePrint Archive (2024)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488680"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3178169"},{"key":"e_1_3_2_1_7_1","volume-title":"Private inference for deep neural networks: a secure, adaptive, and efficient realization","author":"Cheng Ke","year":"2023","unstructured":"Ke Cheng, Ning Xi, Ximeng Liu, Xinghui Zhu, Haichang Gao, Zhiwei Zhang, and Yulong Shen. 2023. Private inference for deep neural networks: a secure, adaptive, and efficient realization. IEEE Trans. Comput. (2023)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"e_1_3_2_1_10_1","volume-title":"Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping. Cryptology ePrint Archive","author":"Clet Pierre-Emmanuel","year":"2022","unstructured":"Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, and C\u00e9dric Gouy-Pailler. 2022. Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_11_1","first-page":"1509","article-title":"Accelerating fully homomorphic encryption in hardware","volume":"64","author":"Dor\u00f6z Yarkin","year":"2014","unstructured":"Yarkin Dor\u00f6z, Erdincc \u00d6zt\u00fcrk, and Berk Sunar. 2014. Accelerating fully homomorphic encryption in hardware. IEEE Trans. Comput., Vol. 64, 6 (2014), 1509--1521.","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-023-09483-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2022.3180883"},{"key":"e_1_3_2_1_14_1","volume-title":"Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)."},{"key":"e_1_3_2_1_15_1","unstructured":"Craig Gentry. 2009. A fully homomorphic encryption scheme. Stanford university."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"e_1_3_2_1_17_1","volume-title":"International conference on machine learning. PMLR, 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International conference on machine learning. PMLR, 201--210."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09368-7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3960218"},{"key":"e_1_3_2_1_20_1","volume-title":"Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training. arXiv preprint arXiv:2403.03592","author":"Khan Tanveer","year":"2024","unstructured":"Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, and Antonis Michalas. 2024. Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training. arXiv preprint arXiv:2403.03592 (2024)."},{"key":"e_1_3_2_1_21_1","unstructured":"Yann LeCun. 2018. The mnist database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"e_1_3_2_1_22_1","volume-title":"Backpropagation applied to handwritten zip code recognition. Neural computation","author":"LeCun Yann","year":"1989","unstructured":"Yann LeCun, Bernhard Boser, John S Denker, Donnie Henderson, Richard E Howard, Wayne Hubbard, and Lawrence D Jackel. 1989. Backpropagation applied to handwritten zip code recognition. Neural computation, Vol. 1, 4 (1989), 541--551."},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Machine Learning. PMLR","author":"Lee Seewoo","year":"2023","unstructured":"Seewoo Lee, Garam Lee, Jung Woo Kim, Junbum Shin, and Mun-Kyu Lee. 2023. HETAL: efficient privacy-preserving transfer learning with homomorphic encryption. In International Conference on Machine Learning. PMLR, 19010--19035."},{"key":"e_1_3_2_1_24_1","volume-title":"Random feedback weights support learning in deep neural networks. arXiv preprint arXiv:1411.0247","author":"Lillicrap Timothy P","year":"2014","unstructured":"Timothy P Lillicrap, Daniel Cownden, Douglas B Tweed, and Colin J Akerman. 2014. Random feedback weights support learning in deep neural networks. arXiv preprint arXiv:1411.0247 (2014)."},{"key":"e_1_3_2_1_25_1","first-page":"9193","article-title":"Glyph: Fast and accurately training deep neural networks on encrypted data","volume":"33","author":"Lou Qian","year":"2020","unstructured":"Qian Lou, Bo Feng, Geoffrey Charles Fox, and Lei Jiang. 2020. Glyph: Fast and accurately training deep neural networks on encrypted data. Advances in Neural Information Processing Systems, Vol. 33 (2020), 9193--9202.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2009.5189648"},{"key":"e_1_3_2_1_28_1","volume-title":"Direct feedback alignment provides learning in deep neural networks. Advances in neural information processing systems","author":"N\u00f8kland Arild","year":"2016","unstructured":"Arild N\u00f8kland. 2016. Direct feedback alignment provides learning in deep neural networks. Advances in neural information processing systems, Vol. 29 (2016)."},{"key":"e_1_3_2_1_29_1","volume-title":"I can't see it but I can Fine-tune it: On Encrypted Fine-tuning of Transformers using Fully Homomorphic Encryption. arXiv preprint arXiv:2402.09059","author":"Panzade Prajwal","year":"2024","unstructured":"Prajwal Panzade, Daniel Takabi, and Zhipeng Cai. 2024. I can't see it but I can Fine-tune it: On Encrypted Fine-tuning of Transformers using Fully Homomorphic Encryption. arXiv preprint arXiv:2402.09059 (2024)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981818"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3219049"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2020.3017595"},{"key":"e_1_3_2_1_34_1","volume-title":"2019 IEEE International symposium on high performance computer architecture (HPCA). IEEE, 387--398","author":"Roy Sujoy Sinha","year":"2019","unstructured":"Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, and Ingrid Verbauwhede. 2019. FPGA-based high-performance parallel architecture for homomorphic computing on encrypted data. In 2019 IEEE International symposium on high performance computer architecture (HPCA). IEEE, 387--398."},{"key":"e_1_3_2_1_35_1","volume-title":"Joao Sa Sousa, and Jean-Pierre Hubaux","author":"Sav Sinem","year":"2020","unstructured":"Sinem Sav, Apostolos Pyrgelis, Juan R Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao Sa Sousa, and Jean-Pierre Hubaux. 2020. POSEIDON: Privacy-preserving federated neural network learning. arXiv preprint arXiv:2009.00349 (2020)."},{"key":"e_1_3_2_1_36_1","volume-title":"Antecedents and Consequences of Data Breaches: A Systematic Review. Information & Management","author":"Schlackl Frederic","year":"2022","unstructured":"Frederic Schlackl, Nico Link, and Hartmut Hoehle. 2022. Antecedents and Consequences of Data Breaches: A Systematic Review. Information & Management (2022), 103638."},{"key":"e_1_3_2_1_37_1","volume-title":"Polynomial approximation. Encyclopedia of Biostatistics","author":"Smyth Gordon K","year":"1998","unstructured":"Gordon K Smyth. 1998. Polynomial approximation. Encyclopedia of Biostatistics, Vol. 13 (1998)."},{"key":"e_1_3_2_1_38_1","volume-title":"PocketNN: Integer-only Training and Inference of Neural Networks via Direct Feedback Alignment and Pocket Activations in Pure C. arXiv preprint arXiv:2201.02863","author":"Song Jaewoo","year":"2022","unstructured":"Jaewoo Song and Fangzhen Lin. 2022. PocketNN: Integer-only Training and Inference of Neural Networks via Direct Feedback Alignment and Pocket Activations in Pure C. arXiv preprint arXiv:2201.02863 (2022)."},{"key":"e_1_3_2_1_39_1","volume-title":"Experiments on parallel training of deep neural network using model averaging. arXiv preprint arXiv:1507.01239","author":"Su Hang","year":"2015","unstructured":"Hang Su and Haoyu Chen. 2015. Experiments on parallel training of deep neural network using model averaging. arXiv preprint arXiv:1507.01239 (2015)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023084"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833648"},{"key":"e_1_3_2_1_42_1","first-page":"1185","article-title":"HEAWS: An accelerator for homomorphic encryption on the Amazon AWS FPGA","volume":"69","author":"Turan Furkan","year":"2020","unstructured":"Furkan Turan, Sujoy Sinha Roy, and Ingrid Verbauwhede. 2020. HEAWS: An accelerator for homomorphic encryption on the Amazon AWS FPGA. IEEE Trans. Comput., Vol. 69, 8 (2020), 1185--1196.","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_2_1_43_1","volume-title":"Cryptotl: Private, efficient and secure transfer learning. arXiv preprint arXiv:2205.11935","author":"Walch Roman","year":"2022","unstructured":"Roman Walch, Samuel Sousa, Lukas Helminger, Stefanie Lindstaedt, Christian Rechberger, and Andreas Tr\u00fcgler. 2022. Cryptotl: Private, efficient and secure transfer learning. arXiv preprint arXiv:2205.11935 (2022)."},{"key":"e_1_3_2_1_44_1","volume-title":"Tinyml: Machine learning with tensorflow lite on arduino and ultra-low-power microcontrollers","author":"Warden Pete","year":"2019","unstructured":"Pete Warden and Daniel Situnayake. 2019. Tinyml: Machine learning with tensorflow lite on arduino and ultra-low-power microcontrollers. O'Reilly Media."},{"key":"e_1_3_2_1_45_1","volume-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747","author":"Xiao Han","year":"2017","unstructured":"Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 12th Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689945.3694802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689945.3694802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:43:18Z","timestamp":1755974598000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689945.3694802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,19]]},"references-count":45,"alternative-id":["10.1145\/3689945.3694802","10.1145\/3689945"],"URL":"https:\/\/doi.org\/10.1145\/3689945.3694802","relation":{},"subject":[],"published":{"date-parts":[[2023,11,19]]},"assertion":[{"value":"2024-11-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}