
ber 16–19, 2020, Proceedings, Part I 18, pages 28–57.
Springer.
Chen, H., Chillotti, I., and Song, Y. (2019a). Multi-key
homomorphic encryption from tfhe. In Advances
in Cryptology–ASIACRYPT 2019: 25th International
Conference on the Theory and Application of Cryptol-
ogy and Information Security, Kobe, Japan, December
8–12, 2019, Proceedings, Part II 25, pages 446–472.
Springer.
Chen, H., Dai, W., Kim, M., and Song, Y. (2019b). Efficient
multi-key homomorphic encryption with packed ci-
phertexts with application to oblivious neural network
inference. In Proceedings of the 2019 ACM SIGSAC
Conference on Computer and Communications Secu-
rity, pages 395–412.
Cheon, J. H., Kim, A., Kim, M., and Song, Y. (2017). Ho-
momorphic encryption for arithmetic of approximate
numbers. In Advances in Cryptology–ASIACRYPT
2017: 23rd International Conference on the Theory
and Applications of Cryptology and Information Se-
curity, Hong Kong, China, December 3-7, 2017, Pro-
ceedings, Part I 23, pages 409–437. Springer.
Gentry, C. (2009). Fully homomorphic encryption using
ideal lattices. In Proceedings of the forty-first annual
ACM symposium on Theory of computing, pages 169–
178.
Hu, X., Liang, L., Deng, L., Li, S., Xie, X., Ji, Y.,
Ding, Y., Liu, C., Sherwood, T., and Xie, Y. (2019).
Neural network model extraction attacks in edge de-
vices by hearing architectural hints. arXiv preprint
arXiv:1903.03916.
Jindal, A. K., Shaik, I., Vasudha, V., Chalamala, S. R., Ma,
R., and Lodha, S. (2020). Secure and privacy pre-
serving method for biometric template protection us-
ing fully homomorphic encryption. In 2020 IEEE 19th
international conference on trust, security and privacy
in computing and communications (TrustCom), pages
1127–1134. IEEE.
L
´
opez-Alt, A., Tromer, E., and Vaikuntanathan, V. (2012).
On-the-fly multiparty computation on the cloud via
multikey fully homomorphic encryption. In Proceed-
ings of the forty-fourth annual ACM symposium on
Theory of computing, pages 1219–1234.
Lowd, D. and Meek, C. (2005). Adversarial learning. In
Proceedings of the eleventh ACM SIGKDD interna-
tional conference on Knowledge discovery in data
mining, pages 641–647.
Ma, J., Naas, S.-A., Sigg, S., and Lyu, X. (2022). Privacy-
preserving federated learning based on multi-key ho-
momorphic encryption. International Journal of In-
telligent Systems, 37(9):5880–5901.
Mai, G., Cao, K., Yuen, P. C., and Jain, A. K. (2018). On
the reconstruction of face images from deep face tem-
plates. IEEE transactions on pattern analysis and ma-
chine intelligence, 41(5):1188–1202.
Mann, Z.
´
A., Weinert, C., Chabal, D., and Bos, J. W. (2023).
Towards practical secure neural network inference:
the journey so far and the road ahead. ACM Com-
puting Surveys, 56(5):1–37.
Oh, S. J., Schiele, B., and Fritz, M. (2019). Towards
reverse-engineering black-box neural networks. Ex-
plainable AI: interpreting, explaining and visualizing
deep learning, pages 121–144.
Reith, R. N., Schneider, T., and Tkachenko, O. (2019). Ef-
ficiently stealing your machine learning models. In
Proceedings of the 18th ACM Workshop on Privacy in
the Electronic Society, pages 198–210.
Riazi, M. S., Samragh, M., Chen, H., Laine, K., Lauter,
K., and Koushanfar, F. (2019). {XONN}:{XNOR-
based} oblivious deep neural network inference. In
28th USENIX Security Symposium (USENIX Security
19), pages 1501–1518.
Sperling, L. and Kulkarni, S. S. (2025). Sonni: Secure
oblivious neural network inference.
Sperling, L., Ratha, N., Ross, A., and Boddeti, V. N. (2022).
Heft: Homomorphically encrypted fusion of biomet-
ric templates. In 2022 IEEE International Joint Con-
ference on Biometrics (IJCB), pages 1–10. IEEE.
Wang, B. and Gong, N. Z. (2018). Stealing hyperparame-
ters in machine learning. In 2018 IEEE symposium on
security and privacy (SP), pages 36–52. IEEE.
Yan, M., Fletcher, C. W., and Torrellas, J. (2020). Cache
telepathy: Leveraging shared resource attacks to learn
{DNN} architectures. In 29th USENIX Security Sym-
posium (USENIX Security 20), pages 2003–2020.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
522