{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:48:43Z","timestamp":1725695323930},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3605759.3625263","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T03:55:48Z","timestamp":1700711748000},"page":"59-67","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing HE operations via Level-aware Key-switching Framework"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0005-3870-2096","authenticated-orcid":false,"given":"Intak","family":"Hwang","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9080-5272","authenticated-orcid":false,"given":"Jinyeong","family":"Seo","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0496-9789","authenticated-orcid":false,"given":"Yongsoo","family":"Song","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 423--442","author":"Bajard Jean-Claude","year":"2016","unstructured":"Jean-Claude Bajard , Julien Eynard , M Anwar Hasan , and Vincent Zucca . 2016 . A full RNS variant of FV like somewhat homomorphic encryption schemes . In International Conference on Selected Areas in Cryptography. Springer, 423--442 . Jean-Claude Bajard, Julien Eynard, M Anwar Hasan, and Vincent Zucca. 2016. A full RNS variant of FV like somewhat homomorphic encryption schemes. In International Conference on Selected Areas in Cryptography. Springer, 423--442."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_21"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 347--368","author":"Cheon Jung Hee","year":"2018","unstructured":"Jung Hee Cheon , Kyoohyung Han , Andrey Kim , Miran Kim , and Yongsoo Song . 2018 b. A full RNS variant of approximate homomorphic encryption . In International Conference on Selected Areas in Cryptography. Springer, 347--368 . Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2018b. A full RNS variant of approximate homomorphic encryption. In International Conference on Selected Areas in Cryptography. Springer, 347--368."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_15"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"e_1_3_2_1_14_1","volume-title":"Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive ( 2012 ). Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"volume-title":"Cryptographers' Track at the RSA Conference","author":"Halevi Shai","key":"e_1_3_2_1_16_1","unstructured":"Shai Halevi , Yuriy Polyakov , and Victor Shoup . 2019. An improved RNS variant of the BFV homomorphic encryption scheme . In Cryptographers' Track at the RSA Conference . Springer , 83--105. Shai Halevi, Yuriy Polyakov, and Victor Shoup. 2019. An improved RNS variant of the BFV homomorphic encryption scheme. In Cryptographers' Track at the RSA Conference. Springer, 83--105."},{"volume-title":"Cryptographers' Track at the RSA Conference","author":"Han Kyoohyung","key":"e_1_3_2_1_17_1","unstructured":"Kyoohyung Han and Dohyeong Ki. 2020. Better bootstrapping for approximate homomorphic encryption . In Cryptographers' Track at the RSA Conference . Springer , 364--390. Kyoohyung Han and Dohyeong Ki. 2020. Better bootstrapping for approximate homomorphic encryption. In Cryptographers' Track at the RSA Conference. Springer, 364--390."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_21"},{"key":"e_1_3_2_1_19_1","volume-title":"Logistic regression model training based on the approximate homomorphic encryption. BMC medical genomics","author":"Kim Andrey","year":"2018","unstructured":"Andrey Kim , Yongsoo Song , Miran Kim , Keewoo Lee , and Jung Hee Cheon . 2018a. Logistic regression model training based on the approximate homomorphic encryption. BMC medical genomics , Vol. 11 , 4 ( 2018 ), 23--31. Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, and Jung Hee Cheon. 2018a. Logistic regression model training based on the approximate homomorphic encryption. BMC medical genomics, Vol. 11, 4 (2018), 23--31."},{"key":"e_1_3_2_1_20_1","volume-title":"Accelerating HE Operations From Key Decomposition Technique. In Annual International Cryptology Conference. Springer, 70--92","author":"Kim Miran","year":"2023","unstructured":"Miran Kim , Dongwon Lee , Jinyeong Seo , and Yongsoo Song . 2023 . Accelerating HE Operations From Key Decomposition Technique. In Annual International Cryptology Conference. Springer, 70--92 . Miran Kim, Dongwon Lee, Jinyeong Seo, and Yongsoo Song. 2023. Accelerating HE Operations From Key Decomposition Technique. In Annual International Cryptology Conference. Springer, 70--92."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Miran Kim Yongsoo Song Shuang Wang Yuhou Xia Xiaoqian Jiang etal 2018b. Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR medical informatics Vol. 6 2 (2018). Miran Kim Yongsoo Song Shuang Wang Yuhou Xia Xiaoqian Jiang et al. 2018b. Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR medical informatics Vol. 6 2 (2018).","DOI":"10.2196\/medinform.8805"},{"key":"e_1_3_2_1_22_1","volume-title":"International Conference on Machine Learning. PMLR, 12403--12422","author":"Lee Eunsang","year":"2022","unstructured":"Eunsang Lee , Joon-Woo Lee , Junghyun Lee , Young-Sik Kim , Yongjune Kim , Jong-Seon No , and Woosuk Choi . 2022 c. Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions . In International Conference on Machine Learning. PMLR, 12403--12422 . Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, and Woosuk Choi. 2022c. Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions. In International Conference on Machine Learning. PMLR, 12403--12422."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_22"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06944-4_19"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 64--70","author":"Mouchet Christian Vincent","year":"2020","unstructured":"Christian Vincent Mouchet , Jean-Philippe Bossuat , Juan Ram\u00f3n Troncoso-Pastoriza , and Jean-Pierre Hubaux . 2020 . Lattigo: A multiparty homomorphic encryption library in go . In Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 64--70 . io Christian Vincent Mouchet, Jean-Philippe Bossuat, Juan Ram\u00f3n Troncoso-Pastoriza, and Jean-Pierre Hubaux. 2020. Lattigo: A multiparty homomorphic encryption library in go. In Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 64--70. io"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605759.3625263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T11:07:04Z","timestamp":1703675224000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605759.3625263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":25,"alternative-id":["10.1145\/3605759.3625263","10.1145\/3605759"],"URL":"https:\/\/doi.org\/10.1145\/3605759.3625263","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}