{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:32:33Z","timestamp":1766442753717,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,11,22]],"date-time":"2026-11-22T00:00:00Z","timestamp":1795305600000},"content-version":"vor","delay-in-days":368,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute of Information and Communications Technology Planning and Evaluation (IITP)","award":["RS-2025-0221765"],"award-info":[{"award-number":["RS-2025-0221765"]}]},{"name":"Stanford Graduate Fellowship"},{"name":"DARPA","award":["HR00112420373"],"award-info":[{"award-number":["HR00112420373"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765080","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"1083-1097","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Discrete CKKS to Bootstrap in High Precision"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7835-4349","authenticated-orcid":false,"given":"Hyeongmin","family":"Choe","sequence":"first","affiliation":[{"name":"CryptoLab Inc., Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1624-6326","authenticated-orcid":false,"given":"Jaehyung","family":"Kim","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3435-2453","authenticated-orcid":false,"given":"Damien","family":"Stehl\u00e9","sequence":"additional","affiliation":[{"name":"CryptoLab Inc., Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2096-4698","authenticated-orcid":false,"given":"Elias","family":"Suvanto","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605759.3625257"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Andreea Alexandru Andrey Kim and Yuriy Polyakov. 2025. General Functional Bootstrapping Using CKKS. 304--337 pages.","DOI":"10.1007\/978-3-032-01881-6_10"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560696"},{"key":"e_1_3_2_1_7_1","volume-title":"Jaehyung Kim, and Damien Stehl\u00e9.","author":"Bae Youngjin","year":"2024","unstructured":"Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, and Damien Stehl\u00e9. 2024. Bootstrapping Bits with CKKS. In Advances in Cryptology -- EUROCRYPT 2024. Springer Nature Switzerland, Cham, 94--123."},{"key":"e_1_3_2_1_8_1","volume-title":"Advances in Cryptology -- ASIACRYPT","author":"Bae Youngjin","year":"2024","unstructured":"Youngjin Bae, Jaehyung Kim, Damien Stehl\u00e9, and Elias Suvanto. 2025. Bootstrapping Small Integers With CKKS. In Advances in Cryptology -- ASIACRYPT 2024. Springer Nature Singapore, 330--360."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_19"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_21"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09234-3_26"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2019-0026"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363207"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623086"},{"key":"e_1_3_2_1_17_1","volume-title":"Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS. Cryptology ePrint Archive, Paper 2024\/1014. https:\/\/eprint.iacr.org\/2024\/1014","author":"Cheon Jung Hee","year":"2024","unstructured":"Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, Jaehyung Kim, Seonghak Kim, Johannes Mono, and Taeyeong Noh. 2024. Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS. Cryptology ePrint Archive, Paper 2024\/1014. https:\/\/eprint.iacr.org\/2024\/1014"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690341"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"e_1_3_2_1_20_1","volume-title":"Selected Areas in Cryptography -- SAC","author":"Cheon Jung Hee","year":"2018","unstructured":"Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2019. A Full RNS Variant of Approximate Homomorphic Encryption. In Selected Areas in Cryptography -- SAC 2018. Springer International Publishing, 347--368."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_1_24_1","unstructured":"Heewon Chung Hyojun Kim Young-Sik Kim and Yongwoo Lee. 2024. Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption. Cryptology ePrint Archive Paper 2024\/274. https:\/\/eprint.iacr.org\/ 2024\/274"},{"key":"e_1_3_2_1_25_1","unstructured":"CryptoLab. 2022. HEaaN Library. Available at https:\/\/heaan.it\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-023-09483-1"},{"key":"e_1_3_2_1_27_1","volume-title":"FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second. In Advances in Cryptology -- EUROCRYPT","author":"Ducas L\u00e9o","year":"2015","unstructured":"L\u00e9o Ducas and Daniele Micciancio. 2015. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second. In Advances in Cryptology -- EUROCRYPT 2015. Springer, Berlin, Heidelberg, 617--640."},{"key":"e_1_3_2_1_28_1","unstructured":"J. Fan and F. Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. Cryptology ePrint Archive Paper 2012\/144. https:\/\/eprint.iacr.org\/2012\/144"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_30_1","volume-title":"Jutla and Nathan Manohar","author":"Charanjit","year":"2022","unstructured":"Charanjit S. Jutla and Nathan Manohar. 2022. Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE. In Advances in Cryptology -- EUROCRYPT 2022. Springer International Publishing, 491--520."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3318405"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670302"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22966-4_6"},{"key":"e_1_3_2_1_34_1","unstructured":"Kamil Kluczniak and Giacomo Santato. 2023. On Circuit Private Multikey and Threshold Approximate Homomorphic Encryption. Cryptology ePrint Archive Paper 2023\/301. https:\/\/eprint.iacr.org\/2023\/301"},{"key":"e_1_3_2_1_35_1","unstructured":"Lattigo 2024. Lattigo v6. https:\/\/github.com\/tuneinsight\/lattigo. EPFL-LDS Tune Insight SA."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_22"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06944-4_19"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_23"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_20"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3516553"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0071"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_26"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640397"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_36"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3595177"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765080","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:30:33Z","timestamp":1766442633000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":47,"alternative-id":["10.1145\/3719027.3765080","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765080","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}