{"id":"https://openalex.org/W4414229274","doi":"https://doi.org/10.1109/tdsc.2025.3610646","title":"FLUTE: FSS-Based Secure Two-Party LLM Inference Using Partial Transformer Encryption","display_name":"FLUTE: FSS-Based Secure Two-Party LLM Inference Using Partial Transformer Encryption","publication_year":2025,"publication_date":"2025-09-16","ids":{"openalex":"https://openalex.org/W4414229274","doi":"https://doi.org/10.1109/tdsc.2025.3610646"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3610646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3610646","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008489138","display_name":"Yujie Xue","orcid":"https://orcid.org/0000-0003-2559-1727"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I4390039265","display_name":"PRG S&Tech (South Korea)","ror":"https://ror.org/02sr2ee22","country_code":null,"type":"company","lineage":["https://openalex.org/I4390039265"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yujie Xue","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China","College of Computer Science and Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer Science and Technology","institution_ids":["https://openalex.org/I4390039265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100383303","display_name":"Lin Liu","orcid":"https://orcid.org/0000-0002-5930-8881"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I4390039265","display_name":"PRG S&Tech (South Korea)","ror":"https://ror.org/02sr2ee22","country_code":null,"type":"company","lineage":["https://openalex.org/I4390039265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Liu","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China","College of Computer Science and Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer Science and Technology","institution_ids":["https://openalex.org/I4390039265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057427094","display_name":"Yuchuan Luo","orcid":"https://orcid.org/0000-0002-0720-4925"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I4390039265","display_name":"PRG S&Tech (South Korea)","ror":"https://ror.org/02sr2ee22","country_code":null,"type":"company","lineage":["https://openalex.org/I4390039265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuchuan Luo","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China","College of Computer Science and Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer Science and Technology","institution_ids":["https://openalex.org/I4390039265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102953251","display_name":"Bing Sun","orcid":"https://orcid.org/0000-0001-8794-4853"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I4390039265","display_name":"PRG S&Tech (South Korea)","ror":"https://ror.org/02sr2ee22","country_code":null,"type":"company","lineage":["https://openalex.org/I4390039265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Sun","raw_affiliation_strings":["College of Science, National University of Defense Technology, Changsha, China","College of Computer Science and Technology"],"affiliations":[{"raw_affiliation_string":"College of Science, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer Science and Technology","institution_ids":["https://openalex.org/I4390039265"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032664581","display_name":"Shaojing Fu","orcid":"https://orcid.org/0000-0002-8155-7462"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I4390039265","display_name":"PRG S&Tech (South Korea)","ror":"https://ror.org/02sr2ee22","country_code":null,"type":"company","lineage":["https://openalex.org/I4390039265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaojing Fu","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China","College of Computer Science and Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer Science and Technology","institution_ids":["https://openalex.org/I4390039265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5008489138"],"corresponding_institution_ids":["https://openalex.org/I170215575","https://openalex.org/I4390039265"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12697569,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"1","first_page":"685","last_page":"702"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6528000235557556},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5418999791145325},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4514999985694885},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.3601999878883362},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.351500004529953},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.3366999924182892},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.3343999981880188},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.32760000228881836}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8310999870300293},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6528000235557556},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5418999791145325},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4514999985694885},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4097000062465668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3962000012397766},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3686000108718872},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3601999878883362},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.351500004529953},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3366999924182892},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3343999981880188},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.3122999966144562},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3095000088214874},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.305400013923645},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.2955999970436096},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.2924000024795532},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.288100004196167},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2766999900341034},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.2581000030040741},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2565000057220459}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3610646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3610646","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2341005444","display_name":null,"funder_award_id":"62102430","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2852687242","display_name":null,"funder_award_id":"ZK22-50","funder_id":"https://openalex.org/F4320324150","funder_display_name":"National University of Defense Technology"},{"id":"https://openalex.org/G5403686792","display_name":null,"funder_award_id":"62472431","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324150","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W20180677","https://openalex.org/W1969009977","https://openalex.org/W2088492763","https://openalex.org/W2400124473","https://openalex.org/W2895865029","https://openalex.org/W2896457183","https://openalex.org/W2923014074","https://openalex.org/W2963015836","https://openalex.org/W2990762906","https://openalex.org/W2994111940","https://openalex.org/W3003749448","https://openalex.org/W3016063723","https://openalex.org/W3081488247","https://openalex.org/W3093021001","https://openalex.org/W3109688427","https://openalex.org/W3216987697","https://openalex.org/W4281806276","https://openalex.org/W4283696039","https://openalex.org/W4293783465","https://openalex.org/W4293783482","https://openalex.org/W4385080307","https://openalex.org/W4385245566","https://openalex.org/W4385412524","https://openalex.org/W4392223105","https://openalex.org/W4392353733","https://openalex.org/W4400020785","https://openalex.org/W4400382079","https://openalex.org/W4401752902","https://openalex.org/W4402263660","https://openalex.org/W4402264258","https://openalex.org/W4408750076","https://openalex.org/W4412130408"],"related_works":[],"abstract_inverted_index":{"Recently,":[0],"transformer-based":[1],"large":[2,36],"language":[3],"models":[4],"(LLMs)":[5],"have":[6],"become":[7],"mainstream,":[8],"particularly":[9],"when":[10],"used":[11],"as":[12,205],"agents.":[13],"However,":[14],"users":[15],"with":[16,84],"exceedingly":[17],"sensitive":[18],"data":[19],"cannot":[20],"benefit":[21],"due":[22],"to":[23,29,35,107,150],"a":[24,91],"lack":[25],"of":[26,55,93,134,160],"high-performance":[27],"devices":[28],"train":[30],"LLMs":[31,56,83],"or":[32],"limited":[33],"access":[34],"companies'":[37],"LLM":[38,63],"APIs.":[39],"Secure":[40],"two-party":[41],"computing":[42],"(2PC),":[43],"especially":[44],"the":[45,76,124,130,152,157,161,170,182],"recently":[46],"popular":[47],"function":[48],"secret":[49],"sharing":[50],"(FSS),":[51],"enables":[52],"secure":[53,164],"inference":[54,80],"by":[57,97,112,185],"protecting":[58],"both":[59,191],"users'":[60],"inputs":[61],"and":[62,114,193,195],"parameters":[64,110],"from":[65],"leakage.":[66],"In":[67],"this":[68],"paper,":[69],"we":[70],"propose":[71],"<inline-formula":[72,101,135,177,186],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[73,102,136,178,187],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math>${\\sf":[74,137,179],"FLUTE}$</tex-math></inline-formula>,":[75],"first":[77,89],"FSS-based":[78],"2PC":[79],"framework":[81],"for":[82,120],"partial":[85,144],"transformer":[86,94],"encryption.":[87],"We":[88],"identify":[90],"subset":[92],"core":[95,125],"blocks":[96],"simulating":[98],"an":[99],"adversary":[100],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[103,188],"notation=\"LaTeX\">$\\mathcal":[104],"{A}$</tex-math></inline-formula>":[105],"attempting":[106],"recover":[108],"model":[109],"layer":[111],"layer,":[113],"then":[115],"design":[116],"GPU-friendly":[117],"FSS":[118],"protocols":[119],"each":[121],"module":[122],"within":[123],"blocks,":[126],"optimizing":[127],"communication":[128],"using":[129],"matrix":[131],"multiplication":[132],"protocol":[133],"ABY2.0}$</tex-math></inline-formula>.":[138],"Security":[139],"analysis":[140],"shows":[141],"that":[142,176],"our":[143],"encryption":[145],"scheme":[146],"provides":[147],"security":[148],"comparable":[149],"encrypting":[151],"entire":[153,162],"LLM,":[154,172],"thereby":[155],"enhancing":[156],"performance-security":[158],"trade-off":[159],"end-to-end":[163],"inference.":[165],"The":[166],"experimental":[167],"results":[168],"in":[169,190,201],"latest":[171],"Llama":[173,206],"3.1-8B,":[174],"show":[175],"FLUTE}$</tex-math></inline-formula>":[180],"outperforms":[181],"SOTA":[183],"(SIGMA)":[184],"notation=\"LaTeX\">$3\\times$</tex-math></inline-formula>":[189],"latency":[192],"communication,":[194],"it":[196],"achieves":[197],"even":[198],"greater":[199],"advantages":[200],"larger":[202],"LLMs,":[203],"such":[204],"3.1-70B.":[207]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
