{"id":"https://openalex.org/W4386875763","doi":"https://doi.org/10.1145/3583780.3614998","title":"Online Efficient Secure Logistic Regression based on Function Secret Sharing","display_name":"Online Efficient Secure Logistic Regression based on Function Secret Sharing","publication_year":2023,"publication_date":"2023-10-21","ids":{"openalex":"https://openalex.org/W4386875763","doi":"https://doi.org/10.1145/3583780.3614998"},"language":"en","primary_location":{"id":"doi:10.1145/3583780.3614998","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583780.3614998","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2309.09486","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026078060","display_name":"Jing Liu","orcid":"https://orcid.org/0000-0002-0336-661X"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Liu","raw_affiliation_strings":["East China Normal University &amp; Ant Group, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"East China Normal University &amp; Ant Group, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078640515","display_name":"Jamie Cui","orcid":"https://orcid.org/0000-0002-7601-3225"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jamie Cui","raw_affiliation_strings":["Ant Group &amp; East China Normal University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ant Group &amp; East China Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114734448","display_name":"Cen Chen","orcid":"https://orcid.org/0000-0003-0325-1705"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cen Chen","raw_affiliation_strings":["East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026078060"],"corresponding_institution_ids":["https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":1.3917,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85126679,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1597","last_page":"1606"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/logistic-regression","display_name":"Logistic regression","score":0.7838826179504395},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7256264090538025},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.689227819442749},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.6328755021095276},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6253954172134399},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.601875364780426},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5493927001953125},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46504485607147217},{"id":"https://openalex.org/keywords/logistic-model-tree","display_name":"Logistic model tree","score":0.4187561273574829},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3394259214401245},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.31325048208236694},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3082270622253418},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.16045299172401428},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15222853422164917},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1218598484992981}],"concepts":[{"id":"https://openalex.org/C151956035","wikidata":"https://www.wikidata.org/wiki/Q1132755","display_name":"Logistic regression","level":2,"score":0.7838826179504395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7256264090538025},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.689227819442749},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.6328755021095276},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6253954172134399},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.601875364780426},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5493927001953125},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46504485607147217},{"id":"https://openalex.org/C61722155","wikidata":"https://www.wikidata.org/wiki/Q6667643","display_name":"Logistic model tree","level":3,"score":0.4187561273574829},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3394259214401245},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31325048208236694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3082270622253418},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.16045299172401428},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15222853422164917},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1218598484992981},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3583780.3614998","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583780.3614998","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2309.09486","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.09486","pdf_url":"https://arxiv.org/pdf/2309.09486","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2309.09486","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.09486","pdf_url":"https://arxiv.org/pdf/2309.09486","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G8914462144","display_name":null,"funder_award_id":"62202170","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320307174","display_name":"Anti-Slavery International","ror":null},{"id":"https://openalex.org/F4320318398","display_name":"Ant Group","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386875763.pdf","grobid_xml":"https://content.openalex.org/works/W4386875763.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W644599125","https://openalex.org/W1969009977","https://openalex.org/W2034962580","https://openalex.org/W2039860141","https://openalex.org/W2119101338","https://openalex.org/W2145029920","https://openalex.org/W2295292576","https://openalex.org/W2475334473","https://openalex.org/W2533357737","https://openalex.org/W2606882085","https://openalex.org/W2765200655","https://openalex.org/W2895865029","https://openalex.org/W2963106566","https://openalex.org/W2963752132","https://openalex.org/W2984644945","https://openalex.org/W2984746198","https://openalex.org/W3011484826","https://openalex.org/W3081233633","https://openalex.org/W3093021001","https://openalex.org/W3104454153","https://openalex.org/W3108146280","https://openalex.org/W3108672920","https://openalex.org/W3109688427","https://openalex.org/W3155184874","https://openalex.org/W4244533844","https://openalex.org/W4288057725","https://openalex.org/W4299301436","https://openalex.org/W4302305514","https://openalex.org/W4378527334"],"related_works":["https://openalex.org/W2397857137","https://openalex.org/W2083084382","https://openalex.org/W1557783852","https://openalex.org/W2188298058","https://openalex.org/W3214129216","https://openalex.org/W2768332800","https://openalex.org/W2951739556","https://openalex.org/W2129756153","https://openalex.org/W2006088653","https://openalex.org/W1474916271"],"abstract_inverted_index":{"Logistic":[0],"regression":[1,27,53,87,131,157,178],"is":[2,41],"an":[3,80],"algorithm":[4],"widely":[5],"used":[6],"for":[7,84],"binary":[8],"classification":[9],"in":[10,73,98],"various":[11],"real-world":[12],"applications":[13],"such":[14],"as":[15],"fraud":[16],"detection,":[17],"medical":[18],"diagnosis,":[19],"and":[20,104,146,153,188,195],"recommendation":[21],"systems.":[22],"However,":[23],"training":[24,64,158,179],"a":[25,42,51,109,129,161],"logistic":[26,52,86,130,156,177],"model":[28,54,132],"with":[29,70,173],"data":[30,72,136],"from":[31],"different":[32],"parties":[33,48],"raises":[34],"privacy":[35],"concerns.":[36],"Secure":[37],"Multi-Party":[38],"Computation":[39],"(MPC)":[40],"cryptographic":[43],"tool":[44],"that":[45],"allows":[46],"multiple":[47],"to":[49,117,149,191],"train":[50,128],"jointly":[55,127],"without":[56],"compromising":[57],"privacy.":[58],"The":[59,166],"efficiency":[60,194],"of":[61,108,197],"the":[62,99,106,118,122,150,155,174,193],"online":[63,81,123,167],"phase":[65],"becomes":[66],"crucial":[67],"when":[68],"dealing":[69],"large-scale":[71],"practice.":[74],"In":[75],"this":[76],"paper,":[77],"we":[78,143],"propose":[79,144],"efficient":[82],"protocol":[83],"privacy-preserving":[85],"based":[88,180],"on":[89,133,181],"Function":[90],"Secret":[91],"Sharing":[92],"(FSS).":[93],"Our":[94],"protocols":[95],"are":[96],"designed":[97],"two":[100,125],"non-colluding":[101],"servers":[102,126],"setting":[103],"assume":[105],"existence":[107],"third-party":[110],"dealer":[111],"who":[112],"only":[113],"poses":[114],"correlated":[115,140],"randomness":[116],"computing":[119],"parties.":[120],"During":[121],"phase,":[124],"their":[134],"private":[135],"by":[137],"utilizing":[138],"pre-generated":[139],"randomness.":[141],"Furthermore,":[142],"accurate":[145],"MPC-friendly":[147],"alternatives":[148],"sigmoid":[151],"function":[152,162],"encapsulate":[154],"process":[159],"into":[160],"secret":[163,182],"sharing":[164],"gate.":[165],"communication":[168],"overhead":[169],"significantly":[170],"decreases":[171],"compared":[172],"traditional":[175],"secure":[176],"sharing.":[183],"We":[184],"provide":[185],"both":[186],"theoretical":[187],"experimental":[189],"analyses":[190],"demonstrate":[192],"effectiveness":[196],"our":[198],"method.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2023-09-20T00:00:00"}
