{"id":"https://openalex.org/W4416429477","doi":"https://doi.org/10.1109/iccad66269.2025.11240746","title":"Invited Paper: Optimizing Privacy-Preserving Primitives to Support LLM-Scale Applications","display_name":"Invited Paper: Optimizing Privacy-Preserving Primitives to Support LLM-Scale Applications","publication_year":2025,"publication_date":"2025-10-26","ids":{"openalex":"https://openalex.org/W4416429477","doi":"https://doi.org/10.1109/iccad66269.2025.11240746"},"language":null,"primary_location":{"id":"doi:10.1109/iccad66269.2025.11240746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad66269.2025.11240746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM International Conference On Computer Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093418553","display_name":"Yaman Jandali","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yaman Jandali","raw_affiliation_strings":["University of California,San Diego"],"affiliations":[{"raw_affiliation_string":"University of California,San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101728647","display_name":"Ruisi Zhang","orcid":"https://orcid.org/0000-0002-9554-8073"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruisi Zhang","raw_affiliation_strings":["University of California,San Diego"],"affiliations":[{"raw_affiliation_string":"University of California,San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056927195","display_name":"Nojan Sheybani","orcid":"https://orcid.org/0000-0002-4329-0197"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nojan Sheybani","raw_affiliation_strings":["University of California,San Diego"],"affiliations":[{"raw_affiliation_string":"University of California,San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019931011","display_name":"Farinaz Koushanfar","orcid":"https://orcid.org/0000-0003-0798-3794"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Farinaz Koushanfar","raw_affiliation_strings":["University of California,San Diego"],"affiliations":[{"raw_affiliation_string":"University of California,San Diego","institution_ids":["https://openalex.org/I36258959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093418553"],"corresponding_institution_ids":["https://openalex.org/I36258959"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18749957,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8075000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8075000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.07530000060796738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.016899999231100082,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6661999821662903},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5299999713897705},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5134999752044678},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4733000099658966},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.46140000224113464},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.4081000089645386},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.366100013256073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.800000011920929},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6661999821662903},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5299999713897705},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5134999752044678},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47679999470710754},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4733000099658966},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.46140000224113464},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.4081000089645386},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.366100013256073},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3562000095844269},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3418000042438507},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.31279999017715454},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2913999855518341},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.29100000858306885},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2856000065803528},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27079999446868896},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.26409998536109924},{"id":"https://openalex.org/C81147070","wikidata":"https://www.wikidata.org/wiki/Q1172449","display_name":"Encapsulation (networking)","level":2,"score":0.26339998841285706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad66269.2025.11240746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad66269.2025.11240746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM International Conference On Computer Aided Design (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320332815","display_name":"Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W4180724","https://openalex.org/W1970606468","https://openalex.org/W2031533839","https://openalex.org/W2088492763","https://openalex.org/W2141420453","https://openalex.org/W2496543269","https://openalex.org/W2701059868","https://openalex.org/W2765200655","https://openalex.org/W2898776076","https://openalex.org/W2963106566","https://openalex.org/W3016063723","https://openalex.org/W3034457371","https://openalex.org/W3198685994","https://openalex.org/W3216185273","https://openalex.org/W4225935987","https://openalex.org/W4381572755","https://openalex.org/W4383223856","https://openalex.org/W4386763924","https://openalex.org/W4388857059","https://openalex.org/W4393466856","https://openalex.org/W4400382023","https://openalex.org/W4402196163","https://openalex.org/W4402387171","https://openalex.org/W4404133181","https://openalex.org/W4406468439","https://openalex.org/W4408923082"],"related_works":[],"abstract_inverted_index":{"Privacy-preserving":[0],"technologies":[1],"have":[2],"introduced":[3],"a":[4],"paradigm":[5],"shift":[6],"that":[7,33],"allows":[8],"for":[9,59],"realizable":[10],"secure":[11],"computing":[12],"in":[13,86,96],"real-world":[14],"systems.":[15],"The":[16],"significant":[17,28],"barrier":[18],"to":[19,50],"the":[20,27,52,91],"practical":[21],"adoption":[22],"of":[23,47,93],"these":[24],"primitives":[25],"is":[26,34],"computational":[29],"and":[30,57,70,107],"communication":[31],"overhead":[32,56],"incurred":[35],"when":[36],"applied":[37],"at":[38],"scale.":[39],"In":[40],"this":[41,55],"paper,":[42],"we":[43,79],"present":[44],"an":[45],"overview":[46],"our":[48,94],"efforts":[49],"bridge":[51],"gap":[53],"between":[54],"practicality":[58],"privacy-preserving":[60,87],"learning":[61],"systems":[62],"using":[63],"multi-party":[64],"computation":[65],"(MPC),":[66],"zero-knowledge":[67],"proofs":[68],"(ZKPs),":[69],"fully":[71],"homomorphic":[72],"encryption":[73],"(FHE).":[74],"Through":[75],"meticulous":[76],"hardware/software/algorithm":[77],"co-design,":[78],"show":[80,90],"progress":[81],"towards":[82],"enabling":[83],"LLM-scale":[84],"applications":[85],"settings.":[88],"We":[89],"efficacy":[92],"solutions":[95],"several":[97],"contexts,":[98],"including":[99],"DNN":[100],"IP":[101],"ownership,":[102],"ethical":[103],"LLM":[104],"usage":[105],"enforcement,":[106],"transformer":[108],"inference.":[109]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-20T00:00:00"}
