{"id":"https://openalex.org/W7148469999","doi":"https://doi.org/10.48550/arxiv.2604.00169","title":"Beyond Latency: A System-Level Characterization of MPC and FHE for PPML","display_name":"Beyond Latency: A System-Level Characterization of MPC and FHE for PPML","publication_year":2026,"publication_date":"2026-03-31","ids":{"openalex":"https://openalex.org/W7148469999","doi":"https://doi.org/10.48550/arxiv.2604.00169"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.00169","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00169","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.00169","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102452249","display_name":"P.-S. Huang","orcid":"https://orcid.org/0009-0002-4315-7254"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Huang, Pengzhi","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035750684","display_name":"Kiwan Maeng","orcid":"https://orcid.org/0000-0002-0321-8406"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maeng, Kiwan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5132817917","display_name":"G. Edward Suh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Suh, G. Edward","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102452249"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.39649999141693115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.39649999141693115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.3962000012397766,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.10209999978542328,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6319000124931335},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5049999952316284},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4691999852657318},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.414900004863739},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4000000059604645},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.3743000030517578},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.3691999912261963},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.33899998664855957}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7979000210762024},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6319000124931335},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5049999952316284},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4691999852657318},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.414900004863739},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4000000059604645},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3880999982357025},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3743000030517578},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37209999561309814},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3691999912261963},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36489999294281006},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33899998664855957},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.3310999870300293},{"id":"https://openalex.org/C2780102126","wikidata":"https://www.wikidata.org/wiki/Q10928179","display_name":"Online and offline","level":2,"score":0.3125},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.289900004863739},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.28949999809265137},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C196921405","wikidata":"https://www.wikidata.org/wiki/Q786431","display_name":"Online algorithm","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.27309998869895935},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.2669999897480011},{"id":"https://openalex.org/C172658912","wikidata":"https://www.wikidata.org/wiki/Q661613","display_name":"Batch processing","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.25589999556541443},{"id":"https://openalex.org/C134261354","wikidata":"https://www.wikidata.org/wiki/Q938438","display_name":"Statistical inference","level":2,"score":0.25099998712539673},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.00169","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00169","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.00169","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00169","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8943184614181519,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Privacy":[0],"protection":[1],"has":[2,16],"become":[3],"an":[4],"increasing":[5],"concern":[6],"in":[7,132],"modern":[8],"machine":[9,13],"learning":[10,14],"applications.":[11],"Privacy-preserving":[12],"(PPML)":[15],"attracted":[17],"growing":[18],"research":[19],"attention,":[20],"with":[21],"approaches":[22,42,109],"such":[23,60],"as":[24,61],"secure":[25],"multiparty":[26],"computation":[27],"(MPC)":[28],"and":[29,52,120,124,130,139,148,155,170,184,195,201,206,219,228],"fully":[30],"homomorphic":[31],"encryption":[32],"(FHE)":[33],"being":[34],"actively":[35],"explored.":[36],"However,":[37],"existing":[38,73],"evaluations":[39],"of":[40,66,106,113,146,173],"these":[41,197],"have":[43],"frequently":[44],"been":[45],"done":[46],"on":[47,55,116,127,136],"a":[48,56,67,103,144,176],"narrow,":[49],"fragmented":[50],"setup":[51],"only":[53,162],"focused":[54],"specific":[57,68],"performance":[58,129,164],"metric,":[59],"the":[62,72,163,167,215],"online":[63,185],"inference":[64,135],"latency":[65],"batch":[69,153],"size.":[70],"From":[71],"reports,":[74],"it":[75],"is":[76],"hard":[77],"to":[78,211,232],"compare":[79],"different":[80],"approaches,":[81],"especially":[82],"when":[83],"considering":[84],"other":[85],"metrics":[86],"like":[87],"energy/cost":[88],"or":[89,234],"broader":[90],"system":[91],"setups":[92],"(various":[93],"hyperparameters,":[94],"offline":[95,183],"overheads,":[96],"future":[97],"hardware/network":[98],"configurations,":[99],"etc.).":[100],"We":[101,142,159,188],"present":[102],"unified":[104],"characterization":[105],"three":[107],"popular":[108],"--":[110,126],"two":[111,216],"variants":[112],"MPC":[114,217],"based":[115],"arithmetic/binary":[117],"sharing":[118],"conversion":[119],"function":[121],"secret":[122],"sharing,":[123],"FHE":[125],"their":[128,182],"cost":[131,172],"performing":[133],"privacy-preserving":[134,198],"multiple":[137],"CNN":[138],"Transformer":[140],"models.":[141],"study":[143],"range":[145],"LAN":[147],"WAN":[149],"environments,":[150],"model":[151],"sizes,":[152,154],"input":[156],"sequence":[157],"lengths.":[158],"evaluate":[160],"not":[161],"but":[165],"also":[166],"energy":[168],"consumption":[169],"monetary":[171],"deploying":[174,196],"under":[175],"realistic":[177],"scenario,":[178],"taking":[179],"into":[180],"account":[181],"computation/communication":[186],"overheads.":[187],"provide":[189],"empirical":[190],"guidance":[191],"for":[192,226],"selecting,":[193],"optimizing,":[194],"compute":[199],"paradigms,":[200],"outline":[202],"how":[203],"evolving":[204],"hardware":[205],"network":[207],"trends":[208],"are":[209],"likely":[210],"shift":[212],"trade-offs":[213],"between":[214],"schemes":[218],"FHE.":[220],"This":[221],"work":[222],"provides":[223],"system-level":[224],"insights":[225],"researchers":[227],"practitioners":[229],"who":[230],"seek":[231],"understand":[233],"accelerate":[235],"PPML":[236],"workloads.":[237]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-04-03T00:00:00"}
