{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:26:57Z","timestamp":1766442417885,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T00:00:00Z","timestamp":1763769600000},"content-version":"vor","delay-in-days":3,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS 2237328, DGE 2043104"],"award-info":[{"award-number":["CNS 2237328, DGE 2043104"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765232","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:37:25Z","timestamp":1763854645000},"page":"291-305","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["CryptGNN: Enabling Secure Inference for Graph Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2482-0057","authenticated-orcid":false,"given":"Pritam","family":"Sen","sequence":"first","affiliation":[{"name":"New Jersey Institute of Technology, Newark, New Jersey, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4985-8724","authenticated-orcid":false,"given":"Yao","family":"Ma","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic Institute, Troy, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0020-0910","authenticated-orcid":false,"given":"Cristian","family":"Borcea","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, New Jersey, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"e_1_3_2_1_2_1","first-page":"420","article-title":"Efficient multiparty protocols using circuit randomization. In Advances in Cryptology\u2014CRYPTO'91: Proceedings 11","author":"Beaver Donald","year":"1992","unstructured":"Donald Beaver. 1992. Efficient multiparty protocols using circuit randomization. In Advances in Cryptology\u2014CRYPTO'91: Proceedings 11. Springer, 420-432.","journal-title":"Springer"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57808-4_19"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.491"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_13"},{"key":"e_1_3_2_1_6_1","unstructured":"Hao Chen Miran Kim Ilya Razenshteyn Dragos Rotaru Yongsoo Song and Sameer Wagh. 2020. Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning. Cryptology ePrint Archive Paper 2020\/451. https:\/\/eprint.iacr.org\/2020\/451 https:\/\/eprint.iacr.org\/2020\/451."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Hao Chen and Han Kyoohyung. 2018. Homomorphic Lower Digits Removal and Improved FHE Bootstrapping. 315-337. doi:10.1007\/978-3-319-78381-9_12","DOI":"10.1007\/978-3-319-78381-9_12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70503-3_20"},{"key":"e_1_3_2_1_9_1","volume-title":"Smart","author":"Damg\u00e5rd Ivan","year":"2013","unstructured":"Ivan Damg\u00e5rd, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, and Nigel P. Smart. 2013. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits. In Computer Security - ESORICS 2013. Springer Berlin Heidelberg, Berlin, Heidelberg, 1-18."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning -","volume":"48","author":"Dowlin Nathan","year":"2016","unstructured":"Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 201\u2013210."},{"key":"e_1_3_2_1_11_1","volume-title":"Advances in Neural Information Processing Systems","volume":"28","author":"Duvenaud David K","year":"2015","unstructured":"David K Duvenaud, Dougal Maclaurin, Jorge Iparraguirre, Rafael Bombarell, Timothy Hirzel, Alan Aspuru-Guzik, and Ryan P Adams. 2015. Convolutional Networks on Graphs for Learning Molecular Fingerprints. In Advances in Neural Information Processing Systems, Vol. 28."},{"key":"e_1_3_2_1_12_1","unstructured":"E.E.A. .com. 2024. Modular Multiplicative Inverse. https:\/\/www.extendedeuclideanalgorithm.com\/multiplicative_inverse.php."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-011-9515-z"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7445500"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3294771.3294869"},{"key":"e_1_3_2_1_16_1","unstructured":"William L. Hamilton Zhitao Ying and Jure Leskovec. 2017b. Inductive Representation Learning on Large Graphs. In NIPS."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134090"},{"key":"e_1_3_2_1_18_1","volume-title":"Understanding Isomorphism Bias in Graph Data Sets. CoRR","author":"Ivanov Sergei","year":"2091","unstructured":"Sergei Ivanov, Sergei Sviridov, and Evgeny Burnaev. 2019. Understanding Isomorphism Bias in Graph Data Sets. CoRR, Vol. abs\/1910.12091 (2019). arXiv:1910.12091 http:\/\/arxiv.org\/abs\/1910.12091"},{"key":"e_1_3_2_1_19_1","first-page":"1651","volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security 18). 1651-1669."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"e_1_3_2_1_21_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_22_1","first-page":"4961","article-title":"CrypTen: Secure Multi-Party Computation Meets Machine Learning","volume":"34","author":"Knott Brian","year":"2021","unstructured":"Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, and Laurens van der Maaten. 2021. CrypTen: Secure Multi-Party Computation Meets Machine Learning. In Advances in Neural Information Processing Systems, Vol. 34. 4961-4973.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"e_1_3_2_1_24_1","volume-title":"Sengamedu","author":"Liu Linfeng","year":"2021","unstructured":"Linfeng Liu, Hoan Nguyen, George Karypis, and Srinivasan H. Sengamedu. 2021. Universal representation for code. In PAKDD 2021. https:\/\/www.amazon.science\/publications\/universal-representation-for-code"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0071"},{"key":"e_1_3_2_1_26_1","first-page":"37676","volume-title":"Advances in Neural Information Processing Systems","volume":"35","author":"Ran Ran","year":"2022","unstructured":"Ran Ran, Wei Wang, Quan Gang, Jieming Yin, Nuo Xu, and Wujie Wen. 2022. CryptoGCN: Fast and Scalable Homomorphically Encrypted Graph Convolutional Network Inference. In Advances in Neural Information Processing Systems, Vol. 35. Curran Associates, Inc., 37676-37689."},{"key":"e_1_3_2_1_27_1","first-page":"1501","volume-title":"XONN: XNOR-based Oblivious Deep Neural Network Inference. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Riazi M. Sadegh","year":"2019","unstructured":"M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-based Oblivious Deep Neural Network Inference. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1501-1518."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.152"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Pritam Sen Yao Ma and Cristian Borcea. 2025. CryptGNN: Enabling Secure Inference for Graph Neural Networks. arXiv:2509.09107 [cs.CR] https:\/\/arxiv.org\/abs\/2509.09107","DOI":"10.1145\/3719027.3765232"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.10.014"},{"key":"e_1_3_2_1_34_1","volume-title":"Graph Attention Networks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJXMpikCZ","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJXMpikCZ"},{"key":"e_1_3_2_1_35_1","volume-title":"SecGNN: Privacy-preserving graph neural network training and inference as a cloud service","author":"Wang Songlei","year":"2023","unstructured":"Songlei Wang, Yifeng Zheng, and Xiaohua Jia. 2023. SecGNN: Privacy-preserving graph neural network training and inference as a cloud service. IEEE Transactions on Services Computing (2023)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3073171"},{"key":"e_1_3_2_1_37_1","volume-title":"Efficient privacy-preserving computation based on additive secret sharing. arXiv preprint arXiv:2009.05356","author":"Xiong Lizhi","year":"2020","unstructured":"Lizhi Xiong, Wenhao Zhou, Zhihua Xia, Qi Gu, and Jian Weng. 2020. Efficient privacy-preserving computation based on additive secret sharing. arXiv preprint arXiv:2009.05356 (2020)."},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=ryGs6iA5Km","author":"Xu Keyulu","year":"2019","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2019. How Powerful are Graph Neural Networks?. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=ryGs6iA5Km"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.024"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765232","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:22:31Z","timestamp":1766442151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":39,"alternative-id":["10.1145\/3719027.3765232","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765232","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}