{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:09:50Z","timestamp":1763345390684,"version":"3.45.0"},"reference-count":27,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.068516","type":"journal-article","created":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T08:21:37Z","timestamp":1754468497000},"page":"503-518","source":"Crossref","is-referenced-by-count":0,"title":["Approximate Homomorphic Encryption for MLaaS by CKKS with Operation-Error-Bound"],"prefix":"10.32604","volume":"85","author":[{"given":"Ray-I","family":"Chang","sequence":"first","affiliation":[]},{"given":"Chia-Hui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yen-Ting","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Lien-Chen","family":"Wei","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Cloud Security Alliance. Top threats to cloud computing: egregious eleven [Internet]; 2019 Aug 9. [cited 2025 Mar 24]. Available from: https:\/\/cloudsecurityalliance.org\/press-releases\/2019\/08\/09\/csa-releases-new-research-top-threats-to-cloud-computing-egregious-eleven\/."},{"key":"ref2","series-title":"Proceedings of the International Workshop on Public Key Cryptography; 2010 May 26\u201328","first-page":"420","article-title":"Fully homomorphic encryption with relatively small key and ciphertext sizes","author":"Smart","year":"2010"},{"key":"ref3","series-title":"Advances in Cryptology\u2014CRYPTO 2013: 33rd Annual Cryptology Conference; 2013 Aug 18\u201322","first-page":"353","article-title":"Highly-scalable searchable symmetric encryption with support for boolean queries","author":"Cash","year":"2013"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2633600","article-title":"(Leveled) fully homomorphic encryption without bootstrapping","volume":"6","author":"Brakerski","year":"2014","journal-title":"ACM Trans Comput Theory"},{"key":"ref5","series-title":"Lee D, editor. Advances in Cryptology\u2014ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security; 2017 Dec 3\u20137","first-page":"409","article-title":"Homomorphic encryption for arithmetic of approximate numbers","author":"Cheon","year":"2017"},{"key":"ref6","first-page":"525","article-title":"Outsourced K-means clustering for high-dimensional data analysis based on homomorphic encryption","volume":"39","author":"Chang","year":"2023","journal-title":"J Inf Sci Eng"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MSP.2011.155","article-title":"Usable, secure, private search","volume":"10","author":"Raykova","year":"2011","journal-title":"IEEE Secur Priv"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2793","DOI":"10.1109\/TIFS.2025.3547308","article-title":"Swift: fast secure neural network inference with fully homomorphic encryption","volume":"20","author":"Fu","year":"2025","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/j.future.2024.07.015","article-title":"Integrating fully homomorphic encryption to enhance the security of blockchain applications","volume":"161","author":"Wu","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"5695","DOI":"10.1109\/TKDE.2022.3175719","article-title":"CSKG4APT: a cybersecurity knowledge graph for advanced persistent threat organization attribution","volume":"35","author":"Ren","year":"2022","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"9388","DOI":"10.1109\/TKDE.2024.3474792","article-title":"Threatinsight: innovating early threat detection through threat-intelligence-driven analysis and attribution","volume":"36","author":"Wang","year":"2024","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref12","series-title":"Annual Cryptology Conference; 2012 Aug 19\u201323","first-page":"868","article-title":"Fully homomorphic encryption without modulus switching from classical GapSVP","author":"Brakerski","year":"2012"},{"key":"ref13","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012;2012","journal-title":"IACR Cryptol Eprint Arch"},{"key":"ref14","series-title":"Advances in Cryptology\u2014ASIACRYPT 2016; 2016 Dec 4\u20138","first-page":"3","article-title":"Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds","author":"Chillotti","year":"2016"},{"key":"ref15","series-title":"International Conference on the Theory and Application of Cryptology and Information Security; 2017 Dec 3\u20137","first-page":"377","article-title":"Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE","author":"Chillotti","year":"2017"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","article-title":"TFHE: fast fully homomorphic encryption over the torus","volume":"33","author":"Chillotti","year":"2020","journal-title":"J Cryptol"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TDSC.2017.2682244","article-title":"On the soundness and security of privacy-preserving SVM for outsourcing data classification","volume":"15","author":"Li","year":"2017","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/JBHI.2015.2407157","article-title":"Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification","volume":"20","author":"Liu","year":"2015","journal-title":"IEEE J Biomed Health Inf"},{"key":"ref19","first-page":"8759922","article-title":"Secure KNN classification scheme based on homomorphic encryption for cyberspace","volume":"2021","author":"Liu","year":"2021","journal-title":"Sec Commun Netw"},{"key":"ref20","series-title":"Cryptographers\u2019 Track at the RSA Conference; 2022 Feb 7\u201310","first-page":"120","article-title":"Approximate homomorphic encryption with reduced approximation error","author":"Kim","year":"2022"},{"key":"ref21","first-page":"e8805","article-title":"Secure logistic regression based on homomorphic encryption: design and evaluation","volume":"6","author":"Kim","year":"2018","journal-title":"JMIR Med Inf"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1007\/s10207-023-00708-9","article-title":"Fast but approximate homomorphic k-means based on masking technique","volume":"22","author":"Rovida","year":"2023","journal-title":"Int J Inf Secur"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1186\/s42400-024-00232-w","article-title":"FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption","volume":"7","author":"Yao","year":"2024","journal-title":"Cybersecurity"},{"key":"ref24","series-title":"32nd USENIX Security Symposium (USENIX Security 23); 2023 Aug 9\u201311","first-page":"4697","article-title":"{ELASM}:{Error-Latency-Aware} scale management for fully homomorphic encryption","author":"Lee"},{"key":"ref25","series-title":"International Conference on Selected Areas in Cryptography; 2023 Aug 14\u201318","first-page":"325","article-title":"On the precision loss in approximate homomorphic encryption","author":"Costache","year":"2023"},{"key":"ref26","unstructured":"OpenMined. TenSEAL [Internet]. [cited 2025 May 1]. Available from: https:\/\/github.com\/OpenMined\/TenSEAL."},{"key":"ref27","unstructured":"Iyyer S. Kaggle customer data [Internet]. [cited 2025 May 1]. Available from: https:\/\/www.kaggle.com\/shrutimechlearn\/customer-data\/version\/1."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_68516\/TSP_CMC_68516.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:04:59Z","timestamp":1763345099000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.068516","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}