{"id":"https://openalex.org/W2985808347","doi":"https://doi.org/10.1145/3338469.3358942","title":"Linear-Regression on Packed Encrypted Data in the Two-Server Model","display_name":"Linear-Regression on Packed Encrypted Data in the Two-Server Model","publication_year":2019,"publication_date":"2019-11-07","ids":{"openalex":"https://openalex.org/W2985808347","doi":"https://doi.org/10.1145/3338469.3358942","mag":"2985808347"},"language":"en","primary_location":{"id":"doi:10.1145/3338469.3358942","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3338469.3358942","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3338469.3358942","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3338469.3358942","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035202691","display_name":"Adi Akavia","orcid":"https://orcid.org/0000-0003-0853-3576"},"institutions":[{"id":"https://openalex.org/I91203450","display_name":"University of Haifa","ror":"https://ror.org/02f009v59","country_code":"IL","type":"education","lineage":["https://openalex.org/I91203450"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Adi Akavia","raw_affiliation_strings":["University of Haifa, Haifa, Israel"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Haifa, Haifa, Israel","institution_ids":["https://openalex.org/I91203450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031760144","display_name":"Hayim Shaul","orcid":"https://orcid.org/0000-0001-8432-0623"},"institutions":[{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]},{"id":"https://openalex.org/I4210093787","display_name":"Herzliya Medical Center","ror":"https://ror.org/00m6hsp80","country_code":"IL","type":"healthcare","lineage":["https://openalex.org/I4210093787"]},{"id":"https://openalex.org/I91203450","display_name":"University of Haifa","ror":"https://ror.org/02f009v59","country_code":"IL","type":"education","lineage":["https://openalex.org/I91203450"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Hayim Shaul","raw_affiliation_strings":["University of Haifa and IDC Herzliya, Haifa and Herzliya, Israel"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Haifa and IDC Herzliya, Haifa and Herzliya, Israel","institution_ids":["https://openalex.org/I4210093787","https://openalex.org/I138898306","https://openalex.org/I91203450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070327070","display_name":"Mor Weiss","orcid":"https://orcid.org/0000-0002-4059-7628"},"institutions":[{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]},{"id":"https://openalex.org/I4210093787","display_name":"Herzliya Medical Center","ror":"https://ror.org/00m6hsp80","country_code":"IL","type":"healthcare","lineage":["https://openalex.org/I4210093787"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Mor Weiss","raw_affiliation_strings":["IDC Herzliya, Herzliya, Israel"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"IDC Herzliya, Herzliya, Israel","institution_ids":["https://openalex.org/I4210093787","https://openalex.org/I138898306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002511176","display_name":"Zohar Yakhini","orcid":"https://orcid.org/0000-0002-0420-5412"},"institutions":[{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]},{"id":"https://openalex.org/I4210093787","display_name":"Herzliya Medical Center","ror":"https://ror.org/00m6hsp80","country_code":"IL","type":"healthcare","lineage":["https://openalex.org/I4210093787"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Zohar Yakhini","raw_affiliation_strings":["IDC Herzliya and Technion, Herzliya and Haifa, Israel"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"IDC Herzliya and Technion, Herzliya and Haifa, Israel","institution_ids":["https://openalex.org/I4210093787","https://openalex.org/I138898306"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035202691"],"corresponding_institution_ids":["https://openalex.org/I91203450"],"apc_list":null,"apc_paid":null,"fwci":1.7421,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.88958536,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"21","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8752492070198059},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8017624616622925},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6266207695007324},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5934541821479797},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5843955278396606},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5629096627235413},{"id":"https://openalex.org/keywords/linear-regression","display_name":"Linear regression","score":0.491780549287796},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4701172113418579},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44284048676490784},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36676472425460815},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3411547541618347},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3219457268714905},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14710277318954468},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12843874096870422},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08338046073913574}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8752492070198059},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8017624616622925},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6266207695007324},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5934541821479797},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5843955278396606},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5629096627235413},{"id":"https://openalex.org/C48921125","wikidata":"https://www.wikidata.org/wiki/Q10861030","display_name":"Linear regression","level":2,"score":0.491780549287796},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4701172113418579},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44284048676490784},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36676472425460815},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3411547541618347},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3219457268714905},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14710277318954468},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12843874096870422},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08338046073913574},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3338469.3358942","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3338469.3358942","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3338469.3358942","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3338469.3358942","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3338469.3358942","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3338469.3358942","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322252","display_name":"Israel Science Foundation","ror":"https://ror.org/04sazxf24"},{"id":"https://openalex.org/F4320329496","display_name":"Israel National Cyber Directorate","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2985808347.pdf","grobid_xml":"https://content.openalex.org/works/W2985808347.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W133884053","https://openalex.org/W236632755","https://openalex.org/W1517358265","https://openalex.org/W1528076390","https://openalex.org/W1966731635","https://openalex.org/W1967061303","https://openalex.org/W1971991172","https://openalex.org/W2007466965","https://openalex.org/W2013623332","https://openalex.org/W2027471022","https://openalex.org/W2031738616","https://openalex.org/W2050060590","https://openalex.org/W2088492763","https://openalex.org/W2152926062","https://openalex.org/W2233233025","https://openalex.org/W2435473771","https://openalex.org/W2519249189","https://openalex.org/W2701059868","https://openalex.org/W2783769334","https://openalex.org/W2795097198","https://openalex.org/W2889746123","https://openalex.org/W2895865029","https://openalex.org/W3028867652","https://openalex.org/W4244230525","https://openalex.org/W4247950230","https://openalex.org/W4385773499","https://openalex.org/W6778434676"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W4256358502","https://openalex.org/W2625655658","https://openalex.org/W2771047361","https://openalex.org/W2403663234"],"abstract_inverted_index":{"Developing":[0],"machine":[1],"learning":[2,45,71,275],"models":[3],"from":[4,55,76],"federated":[5,274],"training":[6],"data,":[7],"containing":[8],"many":[9],"independent":[10],"samples,":[11],"is":[12,50,87,148,154],"an":[13],"important":[14],"task":[15,193],"that":[16,40,98,122,149,232,270],"can":[17,195,233,271],"significantly":[18,126],"enhance":[19],"the":[20,90,129,139,150,171,206,217,255],"potential":[21],"applicability":[22],"and":[23,104,131,175,264],"prediction":[24],"power":[25],"of":[26,92,133,145,202,244],"learned":[27],"models.":[28,114],"Since":[29],"single":[30],"users,":[31],"like":[32],"hospitals":[33],"or":[34],"individual":[35],"labs,":[36],"typically":[37],"collect":[38],"data-sets":[39],"do":[41],"not":[42],"support":[43],"accurate":[44],"with":[46],"high":[47],"confidence,":[48],"it":[49],"desirable":[51],"to":[52,109,125,181,210,224,260],"combine":[53],"data":[54,60,77,256],"several":[56,81],"users":[57],"without":[58],"compromising":[59],"privacy.":[61],"In":[62],"this":[63],"paper,":[64],"we":[65,194,228],"develop":[66],"a":[67,72,118,157,187,197,200,230,235,249,267],"privacy-preserving":[68],"solution":[69],"for":[70,205],"linear":[73,112,191,239],"regression":[74,113,192,240],"model":[75,198],"collectively":[78],"contributed":[79],"by":[80,254],"parties":[82],"(\"data":[83],"owners'').":[84],"Our":[85,115,168,219],"protocol":[86,91,147,263],"based":[88,155],"on":[89,156],"Giacomelli":[93,165],"et":[94,166],"al.":[95,167],"(ACNS":[96],"2018)":[97],"utilized":[99],"two":[100],"non":[101],"colluding":[102],"servers":[103],"Linearly":[105],"Homomorphic":[106],"Encryption":[107],"(LHE)":[108],"learn":[110,196],"regularized":[111],"methods":[116],"use":[117],"different":[119,158],"LHE":[120,152],"scheme":[121,153],"allows":[123],"us":[124],"reduce":[127],"both":[128],"number":[130],"runtime":[132,141],"homomorphic":[134,207],"operations,":[135,208],"as":[136,138],"well":[137],"total":[140,201],"complexity.":[142],"Another":[143],"advantage":[144],"our":[146,183,262],"underlying":[151],"(and":[159],"post-quantum":[160],"secure)":[161],"security":[162],"assumption":[163],"than":[164,212],"approach":[169,220],"leverages":[170],"Chinese":[172],"Remainder":[173],"Theorem,":[174],"Single":[176],"Instruction":[177],"Multiple":[178],"Data":[179],"representations,":[180],"obtain":[182],"improved":[184],"performance.":[185],"For":[186],"1000":[188,236],"x":[189,237],"40":[190],"in":[199,216],"3":[203],"seconds":[204,214],"compared":[209],"more":[211,250],"100":[213,238],"reported":[215],"literature.":[218],"also":[221],"scales":[222],"up":[223],"larger":[225,277],"feature":[226],"spaces:":[227],"implemented":[229],"system":[231,269],"handle":[234,272],"task,":[241],"investing":[242],"minutes":[243],"server":[245],"computing":[246],"time":[247],"after":[248],"significant":[251],"offline":[252],"pre-processing":[253],"owners.":[257],"We":[258],"intend":[259],"incorporate":[261],"implementations":[265],"into":[266],"comprehensive":[268],"secure":[273],"at":[276],"scales.":[278]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":2}],"updated_date":"2026-05-03T08:25:01.440150","created_date":"2025-10-10T00:00:00"}
