{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:44:47Z","timestamp":1767991487208,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,11,22]],"date-time":"2026-11-22T00:00:00Z","timestamp":1795305600000},"content-version":"vor","delay-in-days":368,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2236819,DGE-1842165"],"award-info":[{"award-number":["2236819,DGE-1842165"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"OpenAI","award":["Unknown"],"award-info":[{"award-number":["Unknown"]}]},{"name":"Amazon","award":["Unknown"],"award-info":[{"award-number":["Unknown"]}]},{"DOI":"10.13039\/100017567","name":"Apple","doi-asserted-by":"publisher","award":["Unknown"],"award-info":[{"award-number":["Unknown"]}],"id":[{"id":"10.13039\/100017567","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Canada Institute for Advanced Research","award":["Unknown"],"award-info":[{"award-number":["Unknown"]}]},{"DOI":"10.13039\/100019827","name":"Meta","doi-asserted-by":"publisher","award":["Unknown"],"award-info":[{"award-number":["Unknown"]}],"id":[{"id":"10.13039\/100019827","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Sciences and Engineering Research Council of Canada","award":["Unknown"],"award-info":[{"award-number":["Unknown"]}]},{"name":"Schmidt Sciences Foundation","award":["Unknown"],"award-info":[{"award-number":["Unknown"]}]},{"name":"Sloan Foundation","award":["Unknown"],"award-info":[{"award-number":["Unknown"]}]},{"DOI":"10.13039\/501100019117","name":"Vector Institute","doi-asserted-by":"publisher","award":["Unknown"],"award-info":[{"award-number":["Unknown"]}],"id":[{"id":"10.13039\/501100019117","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3744834","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:32:38Z","timestamp":1763854358000},"page":"4649-4663","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Noise Sampling for Differentially Private Collaborative Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9773-8017","authenticated-orcid":false,"given":"Olive","family":"Franzese","sequence":"first","affiliation":[{"name":"University of Toronto, Toronto, Canada and Vector Institute, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8890-7843","authenticated-orcid":false,"given":"Congyu","family":"Fang","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, Canada and Vector Institute, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6042-986X","authenticated-orcid":false,"given":"Radhika","family":"Garg","sequence":"additional","affiliation":[{"name":"Northwestern University, Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5991-7417","authenticated-orcid":false,"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[{"name":"Northwestern University, Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5877-0436","authenticated-orcid":false,"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, USA and Google, Mountain View, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5078-7233","authenticated-orcid":false,"given":"Nicolas","family":"Papernot","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, Canada and Vector Institute, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9786-2296","authenticated-orcid":false,"given":"Adam","family":"Dziedzic","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","unstructured":"Ahmad Al Badawi Andreea Alexandru Jack Bates Flavio Bergamaschi David Bruce Cousins Saroja Erabelli Nicholas Genise Shai Halevi Hamish Hunt Andrey Kim Yongwoo Lee Zeyu Liu Daniele Micciancio Carlo Pascoe Yuriy Polyakov Ian Quah Saraswathy R.V. Kurt Rohloff Jonathan Saylor Dmitriy Suponitsky Matthew Triplett Vinod Vaikuntanathan and Vincent Zucca. 2022. OpenFHE: Open-Source Fully Homomorphic Encryption Library. Cryptology ePrint Archive Paper 2022\/915. https:\/\/eprint.iacr.org\/2022\/915 https:\/\/eprint.iacr.org\/2022\/915."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_3_2_1_4_1","unstructured":"Cl\u00e9ment L. Canonne Gautam Kamath and Thomas Steinke. 2020. The discrete Gaussian for differential privacy. In NIPS ."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Jeffrey Champion Abhi Shelat and Jonathan Ullman. 2019. Securely sampling biased coins with applications to differential privacy. In CCS.","DOI":"10.1145\/3319535.3354256"},{"key":"e_1_3_2_1_6_1","unstructured":"Christopher A Choquette-Choo Natalie Dullerud Adam Dziedzic Yunxiang Zhang Somesh Jha Nicolas Papernot and Xiao Wang. 2021. CaPC Learning: Confidential and Private Collaborative Learning. In ICLR."},{"key":"e_1_3_2_1_7_1","volume-title":"NeurIPS","author":"Duan Haonan","year":"2023","unstructured":"Haonan Duan, Adam Dziedzic, Nicolas Papernot, and Franziska Boenisch. 2023. Flocks of Stochastic Parrots: Differentially Private Prompt Learning for Large Language Models. In NeurIPS 2023."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2006. Differential privacy. In ICALP.","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_9_1","volume-title":"A Firm Foundation for Private Data Analysis. Commun. ACM","author":"Dwork Cynthia","year":"2011","unstructured":"Cynthia Dwork. 2011. A Firm Foundation for Private Data Analysis. Commun. ACM (2011)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Krishnaram Kenthapadi Frank McSherry Ilya Mironov and Moni Naor. 2006a. Our data ourselves: Privacy via distributed noise generation. In EUROCRYPT.","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Frank McSherry Kobbi Nissim and Adam Smith. 2006b. Calibrating Noise to Sensitivity in Private Data Analysis. In TCC.","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci.","DOI":"10.1561\/9781601988195"},{"key":"e_1_3_2_1_13_1","unstructured":"Cynthia Dwork and Guy N Rothblum. 2016. Concentrated differential privacy. arXiv preprint arXiv:1603.01887."},{"key":"e_1_3_2_1_14_1","volume-title":"Private Multi-Winner Voting for Machine Learning. In Privacy Enhancing Technologies Symposium (PETS).","author":"Dziedzic Adam","year":"2023","unstructured":"Adam Dziedzic, Christopher A Choquette-Choo, Natalie Dullerud, Vinith Menon Suriyakumar, Ali Shahin Shamsabadi, Muhammad Ahmad Kaleem, Somesh Jha, Nicolas Papernot, and Xiao Wang. 2023. Private Multi-Winner Voting for Machine Learning. In Privacy Enhancing Technologies Symposium (PETS)."},{"key":"e_1_3_2_1_15_1","volume-title":"collaborative, and privacy-preserving machine learning for multi-hospital data. eBioMedicine","author":"Fang Congyu","year":"2024","unstructured":"Congyu Fang, Adam Dziedzic, Lin Zhang, Laura Oliva, Amol Verma, Fahad Razak, Nicolas Papernot, and Bo Wang. 2024. Decentralised, collaborative, and privacy-preserving machine learning for multi-hospital data. eBioMedicine (2024)."},{"key":"e_1_3_2_1_16_1","unstructured":"Marc Fischlin and Arno Mittelbach. 2021. An Overview of the Hybrid Argument. Cryptology ePrint Archive Paper 2021\/088."},{"key":"e_1_3_2_1_17_1","volume-title":"Robust and Actively Secure Serverless Collaborative Learning. In Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS).","author":"Franzese Nicholas","year":"2023","unstructured":"Nicholas Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, and Xiao Wang. 2023. Robust and Actively Secure Serverless Collaborative Learning. In Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_18_1","unstructured":"Yucheng Fu and Tianhao Wang. 2024. Benchmarking Secure Sampling Protocols for Differential Privacy. In ACM CCS."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00106"},{"key":"e_1_3_2_1_20_1","volume-title":"Differentially Private Federated Learning: A Client Level Perspective. CoRR","author":"Geyer Robin C.","year":"2017","unstructured":"Robin C. Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially Private Federated Learning: A Client Level Perspective. CoRR (2017)."},{"key":"e_1_3_2_1_21_1","volume-title":"Thirty-Eighth Conference on Neural Information Processing Systems (NeurIPS).","author":"Hanke Vincent","year":"2024","unstructured":"Vincent Hanke, Tom Blanchard, Franziska Boenisch, Iyiola Emmanuel Olatunji, Michael Backes, and Adam Dziedzic. 2024. Open LLMs are Necessary for Current Private Adaptations and Outperform their Closed Alternatives. In Thirty-Eighth Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_22_1","unstructured":"Mikko Heikkil\u00e4 Eemil Lagerspetz Samuel Kaski Kana Shimizu Sasu Tarkoma and Antti Honkela. 2017. Differentially private bayesian learning on distributed data. In NeurIPS."},{"key":"e_1_3_2_1_23_1","unstructured":"Peter Kairouz Ziyu Liu and Thomas Steinke. 2021. The distributed discrete gaussian mechanism for federated learning with secure aggregation. In ICML."},{"key":"e_1_3_2_1_24_1","volume-title":"End-to-end privacy preserving deep learning on multi-institutional medical imaging. Nature Machine Intelligence","author":"Kaissis Georgios","year":"2021","unstructured":"Georgios Kaissis, Alexander Ziller, Jonathan Passerat-Palmbach, Th\u00e9o Ryffel, Dmitrii Usynin, Andrew Trask, Ion\u00e9sio Lima, Jason Mancuso, Friederike Jungmann, Marc-Matthias Steinborn, Andreas Saleh, Marcus Makowski, Daniel Rueckert, and Rickmer Braren. 2021. End-to-end privacy preserving deep learning on multi-institutional medical imaging. Nature Machine Intelligence (2021)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Hannah Keller Helen M\u00f6llering Thomas Schneider Oleksandr Tkachenko and Liang Zhao. 2024. Secure Noise Sampling for DP in MPC with Finite Precision. In ACM ARES.","DOI":"10.1145\/3664476.3664490"},{"key":"e_1_3_2_1_26_1","unstructured":"Yinhan Liu Myle Ott Naman Goyal Jingfei Du Mandar Joshi Danqi Chen Omer Levy Mike Lewis Luke Zettlemoyer and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv:1907.11692 [cs.CL]"},{"key":"e_1_3_2_1_27_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In AISTATS."},{"key":"e_1_3_2_1_28_1","unstructured":"H. Brendan McMahan Daniel Ramage Kunal Talwar and Li Zhang. 2018. Learning Differentially Private Recurrent Language Models. In ICLR."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Ilya Mironov. 2012. On significance of the least significant bits for differential privacy. In ACM CCS.","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_1_31_1","unstructured":"Nicolas Papernot Shuang Song Ilya Mironov Ananth Raghunathan Kunal Talwar and Ulfar Erlingsson. 2022. Scalable Private Learning with PATE. In ICLR."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Richard Socher Alex Perelygin Jean Wu Jason Chuang Christopher D. Manning Andrew Ng and Christopher Potts. 2013. Recursive Deep Models for Semantic Compositionality Over a Sentiment Treebank. In ACL EMNLP.","DOI":"10.18653\/v1\/D13-1170"},{"key":"e_1_3_2_1_33_1","volume-title":"Bowman","author":"Wang Alex","year":"2019","unstructured":"Alex Wang, Amanpreet Singh, Julian Michael, Felix Hill, Omer Levy, and Samuel R. Bowman. 2019b. GLUE: A Multi-Task Benchmark and Analysis Platform for Natural Language Understanding. In ICLR."},{"key":"e_1_3_2_1_34_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit."},{"key":"e_1_3_2_1_35_1","volume-title":"Efficient and Privacy-Preserving Soft Prompt Transfer for LLMs. In Forty-Second International Conference on Machine Learning (ICML).","author":"Wang Xun","year":"2025","unstructured":"Xun Wang, Jing Xu, Franziska Boenisch, Michael Backes, Christopher A. Choquette-Choo, and Adam Dziedzic. 2025. Efficient and Privacy-Preserving Soft Prompt Transfer for LLMs. In Forty-Second International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Yu-Xiang Wang Borja Balle and Shiva Prasad Kasiviswanathan. 2019a. Subsampled Renyi Differential Privacy and Analytical Moments Accountant. In AISTATS.","DOI":"10.29012\/jpc.723"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/3171837.3171865"},{"key":"e_1_3_2_1_38_1","volume-title":"Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy. In ACM","author":"Wei Chengkun","year":"2023","unstructured":"Chengkun Wei, Ruijing Yu, Yuan Fan, Wenzhi Chen, and Tianhao Wang. 2023. Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy. In ACM 2023."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1101"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Kang Yang Pratik Sarkar Chenkai Weng and Xiao Wang. 2021. QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. In ACM CCS.","DOI":"10.1145\/3460120.3484556"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3744834","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3744834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:12:01Z","timestamp":1766441521000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3744834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":40,"alternative-id":["10.1145\/3719027.3744834","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3744834","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}