{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T14:48:44Z","timestamp":1771512524445,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2021R1C1C1010173, RS-2023-00211649, 2020R1A6A1A06046728, 2023R1A6C101A009"],"award-info":[{"award-number":["2021R1C1C1010173, RS-2023-00211649, 2020R1A6A1A06046728, 2023R1A6C101A009"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Institute of Health","award":["R01HG012604, R01AG066749, R01LM013712, R01LM014520, R01AG082721, R01AG066749, U01AG079847, U24LM013755, U01CA274576"],"award-info":[{"award-number":["R01HG012604, R01AG066749, R01LM013712, R01LM014520, R01AG082721, R01AG066749, U01AG079847, U24LM013755, U01CA274576"]}]},{"DOI":"10.13039\/100004917","name":"Cancer Prevention and Research Institute of Texas","doi-asserted-by":"publisher","award":["RR180012"],"award-info":[{"award-number":["RR180012"]}],"id":[{"id":"10.13039\/100004917","id-type":"DOI","asserted-by":"publisher"}]},{"name":"University of Texas Health Science Center at Houston"},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["RS-2024-00438729, RS-2024-00398360"],"award-info":[{"award-number":["RS-2024-00438729, RS-2024-00398360"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765150","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"3765-3779","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["THOR: Secure Transformer Inference with Homomorphic Encryption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5987-9091","authenticated-orcid":false,"given":"Jungho","family":"Moon","sequence":"first","affiliation":[{"name":"Hanyang University, Seoul, Republic of Korea and Desilo Inc., Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4615-6801","authenticated-orcid":false,"given":"Dongwoo","family":"Yoo","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9933-2205","authenticated-orcid":false,"given":"Xiaoqian","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Texas, Health Science Center at Houston, Houston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3564-6090","authenticated-orcid":false,"given":"Miran","family":"Kim","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00031"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045465"},{"key":"e_1_3_2_1_3_1","first-page":"387","article-title":"Plaintext-ciphertext matrix multiplication and FHE bootstrapping: fast and fused","volume":"2024","author":"Bae Youngjin","year":"2024","unstructured":"Youngjin Bae, Jung Hee Cheon, Guillaume Hanrot, Jai Hyun Park, and Damien Stehl\u00e9. 2024. Plaintext-ciphertext matrix multiplication and FHE bootstrapping: fast and fused. In Advances in Cryptology - CRYPTO 2024. 387-421.","journal-title":"Advances in Cryptology - CRYPTO"},{"key":"e_1_3_2_1_4_1","unstructured":"Bert. 2019. https:\/\/github.com\/google-research\/bert. Google."},{"key":"e_1_3_2_1_5_1","volume-title":"Yongsoo Song, and Donggeon Yhee.","author":"Bossuat Jean-Philippe","year":"2024","unstructured":"Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, and Donggeon Yhee. 2024. Security Guidelines for Implementing Homomorphic Encryption. Cryptology ePrint Archive, Paper 2024\/463."},{"key":"e_1_3_2_1_6_1","volume-title":"Homomorphic matrix operations under bicyclic encoding","author":"Chen Jingwei","year":"2024","unstructured":"Jingwei Chen, Linhan Yang, Chen Yang, Shuai Wang, Rui Li, Weijie Miao, Wenyuan Wu, Li Yang, Kang Wu, and Lizhong Dai. 2024. Homomorphic matrix operations under bicyclic encoding. IEEE Transactions on Information Forensics and Security (2024)."},{"key":"e_1_3_2_1_7_1","first-page":"360","article-title":"Bootstrapping for approximate homomorphic encryption","volume":"2018","author":"Cheon Jung Hee","year":"2018","unstructured":"Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2018. Bootstrapping for approximate homomorphic encryption. In Advances in Cryptology - EUROCRYPT 2018. 360-384.","journal-title":"Advances in Cryptology - EUROCRYPT"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"e_1_3_2_1_9_1","first-page":"409","article-title":"Homomorphic encryption for arithmetic of approximate numbers","volume":"2017","author":"Cheon Jung Hee","year":"2017","unstructured":"Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song. 2017. Homomorphic encryption for arithmetic of approximate numbers. In Advances in Cryptology - ASIACRYPT 2017. 409-437.","journal-title":"Advances in Cryptology - ASIACRYPT"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670369"},{"key":"e_1_3_2_1_11_1","unstructured":"DESILO. 2023. Liberate.FHE. https:\/\/github.com\/Desilo\/liberate-fhe."},{"key":"e_1_3_2_1_12_1","volume-title":"PUMA: Secure inference of LLaMA-7B in five minutes. arXiv:2307.12533.","author":"Dong Ye","year":"2023","unstructured":"Ye Dong, Wen-jie Lu, Yancheng Zheng, Haoqi Wu, Derun Zhao, Jin Tan, Zhicong Huang, Cheng Hong, Tao Wei, and Wenguang Chen. 2023. PUMA: Secure inference of LLaMA-7B in five minutes. arXiv:2307.12533."},{"key":"e_1_3_2_1_13_1","first-page":"554","article-title":"Algorithms in HElib","volume":"2014","author":"Halevi Shai","year":"2014","unstructured":"Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In Advances in Cryptology-CRYPTO 2014. 554-571.","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"e_1_3_2_1_14_1","first-page":"93","article-title":"Faster homomorphic linear transformations in HElib","volume":"2018","author":"Halevi Shai","year":"2018","unstructured":"Shai Halevi and Victor Shoup. 2018. Faster homomorphic linear transformations in HElib. In Advances in Cryptology-CRYPTO 2018. 93-120.","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"e_1_3_2_1_15_1","first-page":"15718","article-title":"Iron: Private inference on transformers","volume":"35","author":"Hao Meng","year":"2022","unstructured":"Meng Hao, Hongwei Li, Hanxiao Chen, Pengzhi Xing, Guowen Xu, and Tianwei Zhang. 2022. Iron: Private inference on transformers. In Advances in Neural Information Processing Systems, Vol. 35. 15718-15731.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62576-4_14"},{"key":"e_1_3_2_1_18_1","volume-title":"GAZELLE: A low latency framework for secure neural network inference. In 27th USENIX security symposium (USENIX security 18). 1651-1669.","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A low latency framework for secure neural network inference. In 27th USENIX security symposium (USENIX security 18). 1651-1669."},{"key":"e_1_3_2_1_19_1","volume-title":"Secure human action recognition by encrypted neural network inference. Nature communications","author":"Kim Miran","year":"2022","unstructured":"Miran Kim, Xiaoqian Jiang, Kristin Lauter, Elkhan Ismayilzada, and Shayan Shams. 2022. Secure human action recognition by encrypted neural network inference. Nature communications, Vol. 13, 1 (2022), 4799."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 40th International Conference on Machine Learning.","author":"Lee Seewoo","year":"2023","unstructured":"Seewoo Lee, Garam Lee, Jung Woo Kim, Junbum Shin, and Mun-Kyu Lee. 2023. HETAL: Efficient privacy-preserving transfer learning with homomorphic encryption. In Proceedings of the 40th International Conference on Machine Learning."},{"key":"e_1_3_2_1_22_1","unstructured":"Baiyu Li and Daniele Micciancio. 2021. On the security of homomorphic encryption on approximate numbers. In Advances in Cryptology - EUROCRYPT."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 32nd Annual Network and Distributed System Security Symposium.","author":"Huang Zhicong","year":"2025","unstructured":"Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, and Wenguang Chen. 2025. BumbleBee: Secure two-party inference framework for large transformers. In Proceedings of the 32nd Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_24_1","unstructured":"Jungho Moon Zhanibek Omarov Donghoon Yoo Yongdae An and Heewon Chung. 2024. Adaptive successive over-relaxation method for a faster iterative approximation of homomorphic operations. Cryptology ePrint Archive."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00130"},{"key":"e_1_3_2_1_26_1","volume-title":"Powerformer: Efficient privacy-preserving transformer with batch rectifier-power max function and optimized homomorphic attention.","author":"Park Dongjin","year":"2024","unstructured":"Dongjin Park, Eunsang Lee, and Joon-Woo Lee. 2024. Powerformer: Efficient privacy-preserving transformer with batch rectifier-power max function and optimized homomorphic attention."},{"key":"e_1_3_2_1_27_1","first-page":"153","article-title":"Ciphertext-ciphertext matrix multiplication: Fast for large matrices","volume":"2025","author":"Park Jai Hyun","year":"2025","unstructured":"Jai Hyun Park. 2025. Ciphertext-ciphertext matrix multiplication: Fast for large matrices. In Advances in Cryptology-CRYPTO 2025. 153-180.","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"e_1_3_2_1_28_1","volume-title":"13th International Conference on Learning Representations.","author":"Rho Donghwan","year":"2025","unstructured":"Donghwan Rho, Taeseong Kim, Minje Park, Jung Woo Kim, Hyunsik Chae, Ernest K Ryu, and Jung Hee Cheon. 2025. Encryption-friendly LLM architecture. In 13th International Conference on Learning Representations."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643651.3659893"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the Advances in neural information processing systems.","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Proceedings of the Advances in neural information processing systems."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.230868"},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Machine Learning.","author":"Zimerman Itamar","year":"2024","unstructured":"Itamar Zimerman, Moran Baruch, Nir Drucker, Gilad Ezov, Omri Soceanu, and Lior Wolf. 2024. Converting transformers to polynomial form for secure inference over homomorphic encryption. In International Conference on Machine Learning."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:27:53Z","timestamp":1766442473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":32,"alternative-id":["10.1145\/3719027.3765150","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765150","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}