{"id":"https://openalex.org/W2963752132","doi":"https://doi.org/10.2478/popets-2019-0035","title":"SecureNN: 3-Party Secure Computation for Neural Network Training","display_name":"SecureNN: 3-Party Secure Computation for Neural Network Training","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2963752132","doi":"https://doi.org/10.2478/popets-2019-0035","mag":"2963752132"},"language":"en","primary_location":{"id":"doi:10.2478/popets-2019-0035","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0035","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/3/article-p26.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/3/article-p26.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047021537","display_name":"Sameer Wagh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210124949","display_name":"Microsoft Research (India)","ror":"https://ror.org/02w7f3w92","country_code":"IN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210124949"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sameer Wagh","raw_affiliation_strings":["Princeton University, Work done primarily at Microsoft Research , India"],"affiliations":[{"raw_affiliation_string":"Princeton University, Work done primarily at Microsoft Research , India","institution_ids":["https://openalex.org/I4210124949"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086286604","display_name":"Divya Gupta","orcid":"https://orcid.org/0000-0003-1214-635X"},"institutions":[{"id":"https://openalex.org/I4210124949","display_name":"Microsoft Research (India)","ror":"https://ror.org/02w7f3w92","country_code":"IN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210124949"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Divya Gupta","raw_affiliation_strings":["Microsoft Research , India"],"affiliations":[{"raw_affiliation_string":"Microsoft Research , India","institution_ids":["https://openalex.org/I4210124949"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077806978","display_name":"Nishanth Chandran","orcid":"https://orcid.org/0000-0002-8528-9768"},"institutions":[{"id":"https://openalex.org/I4210124949","display_name":"Microsoft Research (India)","ror":"https://ror.org/02w7f3w92","country_code":"IN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210124949"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nishanth Chandran","raw_affiliation_strings":["Microsoft Research , India"],"affiliations":[{"raw_affiliation_string":"Microsoft Research , India","institution_ids":["https://openalex.org/I4210124949"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047021537"],"corresponding_institution_ids":["https://openalex.org/I4210124949"],"apc_list":null,"apc_paid":null,"fwci":28.3252,"has_fulltext":false,"cited_by_count":396,"citation_normalized_percentile":{"value":0.99703902,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"2019","issue":"3","first_page":"26","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8388656377792358},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7166616916656494},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6666402816772461},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5997438430786133},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.5812134742736816},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5464009046554565},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5434080362319946},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5208214521408081},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5055665969848633},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.497712641954422},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.4525038003921509},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4284176528453827},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.4256998896598816},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3700842261314392},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3632960915565491},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35067760944366455},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3503035306930542},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16911756992340088},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14041873812675476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8388656377792358},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7166616916656494},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6666402816772461},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5997438430786133},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.5812134742736816},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5464009046554565},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5434080362319946},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5208214521408081},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5055665969848633},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.497712641954422},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.4525038003921509},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4284176528453827},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.4256998896598816},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3700842261314392},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3632960915565491},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35067760944366455},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3503035306930542},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16911756992340088},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14041873812675476},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2478/popets-2019-0035","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0035","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/3/article-p26.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7798e6a226aa4eb2bb873da1be0d349e","is_oa":true,"landing_page_url":"https://doaj.org/article/7798e6a226aa4eb2bb873da1be0d349e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2019, Iss 3, Pp 26-49 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.2478/popets-2019-0035","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0035","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/3/article-p26.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8399999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2963752132.pdf","grobid_xml":"https://content.openalex.org/works/W2963752132.grobid-xml"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W59079490","https://openalex.org/W147290027","https://openalex.org/W1485800369","https://openalex.org/W1499934958","https://openalex.org/W1524288918","https://openalex.org/W1528076390","https://openalex.org/W1579771234","https://openalex.org/W1888364621","https://openalex.org/W1969009977","https://openalex.org/W1984332407","https://openalex.org/W1997859100","https://openalex.org/W2003668524","https://openalex.org/W2006453614","https://openalex.org/W2010365091","https://openalex.org/W2027471022","https://openalex.org/W2027595342","https://openalex.org/W2031738616","https://openalex.org/W2053637704","https://openalex.org/W2080911030","https://openalex.org/W2082624086","https://openalex.org/W2112796928","https://openalex.org/W2149603017","https://openalex.org/W2156001253","https://openalex.org/W2167094273","https://openalex.org/W2398935881","https://openalex.org/W2435473771","https://openalex.org/W2536058570","https://openalex.org/W2585580772","https://openalex.org/W2614104334","https://openalex.org/W2701059868","https://openalex.org/W2765200655","https://openalex.org/W2765632506","https://openalex.org/W2783769334","https://openalex.org/W2884909828","https://openalex.org/W2895865029","https://openalex.org/W2963106566","https://openalex.org/W2963733194","https://openalex.org/W2963752132","https://openalex.org/W2990399857","https://openalex.org/W3125817276"],"related_works":["https://openalex.org/W2083701517","https://openalex.org/W2082804893","https://openalex.org/W2732566398","https://openalex.org/W2539281752","https://openalex.org/W2382527959","https://openalex.org/W87038205","https://openalex.org/W2550686250","https://openalex.org/W2166322483","https://openalex.org/W2069340834","https://openalex.org/W3152465837"],"abstract_inverted_index":{"Abstract":[0],"Neural":[1,130],"Networks":[2,131],"(NN)":[3],"provide":[4,39,124,240,272,282],"a":[5,201,306],"powerful":[6],"method":[7],"for":[8,20,45,71,110,288],"machine":[9],"learning":[10],"training":[11,72,127],"and":[12,60,73,154,211,217,229,248,254,275,300,318],"inference.":[13],"To":[14],"effectively":[15],"train,":[16],"it":[17],"is":[18,277],"desirable":[19],"multiple":[21],"parties":[22],"to":[23,66,123,193,281],"combine":[24],"their":[25,215],"data":[26,33],"\u2013":[27],"however,":[28],"doing":[29],"so":[30,61],"conflicts":[31],"with":[32],"privacy.":[34],"In":[35,220],"this":[36],"work,":[37],"we":[38,91,230],"novel":[40],"three-party":[41,68],"secure":[42,69,108,147,190,290],"computation":[43,109,291],"protocols":[44,70,208,239],"various":[46],"NN":[47,77],"building":[48],"blocks":[49],"such":[50,79,295],"as":[51,296],"matrix":[52],"multiplication,":[53],"convolutions,":[54],"Rectified":[55],"Linear":[56],"Units,":[57],"Maxpool,":[58],"normalization":[59],"on.":[62],"This":[63],"enables":[64],"us":[65],"construct":[67],"inference":[74,299],"of":[75,107,137,186,234,243,257,292,314],"several":[76],"architectures":[78],"that":[80,133,199],"no":[81],"single":[82],"party":[83],"learns":[84],"any":[85,283],"information":[86],"about":[87],"the":[88,105,120,141,183,194,221,255,278,289,312],"data.":[89],"Experimentally,":[90],"implement":[92],"our":[93,149,207],"system":[94,150,280],"over":[95],"Amazon":[96],"EC2":[97],"servers":[98],"in":[99,113,167,309],"different":[100],"settings.":[101],"Our":[102,171,238,302],"work":[103,122,197],"advances":[104],"state-of-the-art":[106],"neural":[111,125,297],"networks":[112],"three":[114],"ways:":[115],"1.":[116],"Scalability:":[117],"We":[118],"are":[119,175,209,226],"first":[121,279],"network":[126,298],"on":[128,140],"Convolutional":[129],"(CNNs)":[132],"have":[134],"an":[135,232],"accuracy":[136],"&gt;":[138],"99%":[139],"MNIST":[142],"dataset;":[143],"2.":[144],"Performance:":[145],"For":[146,189],"inference,":[148],"outperforms":[151],"prior":[152,196,269],"2":[153,176,216],"3-server":[155,218],"works":[156,270],"(SecureML,":[157],"MiniONN,":[158],"Chameleon,":[159],"Gazelle)":[160],"by":[161],"6\u00d7-113\u00d7":[162],"(with":[163],"larger":[164],"gains":[165,303],"obtained":[166],"more":[168,227],"complex":[169,293],"networks).":[170],"total":[172],"execution":[173],"times":[174,185],"\u2212":[177],"4\u00d7":[178],"faster":[179,213],"than":[180,214],"even":[181],"just":[182],"online":[184],"these":[187,224],"works.":[188],"training,":[191],"compared":[192],"only":[195,271],"(SecureML)":[198],"considered":[200],"much":[202],"smaller":[203],"fully":[204],"connected":[205],"network,":[206],"79\u00d7":[210],"7\u00d7":[212],"protocols.":[219,321],"WAN":[222],"setting,":[223],"improvements":[225],"dramatic":[228],"obtain":[231],"improvement":[233,308],"553\u00d7!":[235],"3.":[236],"Security:":[237],"two":[241],"kinds":[242],"security:":[244],"full":[245],"security":[246,274,284],"(privacy":[247],"correctness)":[249],"against":[250,259,285],"one":[251,260],"semi-honest":[252,273],"corruption":[253,262],"notion":[256],"privacy":[258],"malicious":[261,286],"[Araki":[263],"et":[264],"al":[265],".":[266],"CCS\u201916].":[267],"All":[268],"ours":[276],"adversaries":[287],"algorithms":[294],"training.":[301],"come":[304],"from":[305],"significant":[307],"communication":[310],"through":[311],"elimination":[313],"expensive":[315],"garbled":[316],"circuits":[317],"oblivious":[319],"transfer":[320]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":69},{"year":2024,"cited_by_count":58},{"year":2023,"cited_by_count":70},{"year":2022,"cited_by_count":63},{"year":2021,"cited_by_count":70},{"year":2020,"cited_by_count":53},{"year":2019,"cited_by_count":10}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
