{"id":"https://openalex.org/W2903324634","doi":"https://doi.org/10.1007/978-3-030-34621-8_22","title":"Efficient UC Commitment Extension with Homomorphism for Free (and Applications)","display_name":"Efficient UC Commitment Extension with Homomorphism for Free (and Applications)","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2903324634","doi":"https://doi.org/10.1007/978-3-030-34621-8_22","mag":"2903324634"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-34621-8_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-34621-8_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"preprint","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.itu.dk/portal/da/publications/8859ac92-add0-4819-9390-9ccf6fe26878","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058563643","display_name":"Ignacio Cascudo","orcid":"https://orcid.org/0000-0001-5520-5386"},"institutions":[{"id":"https://openalex.org/I4210162154","display_name":"IMDEA Software","ror":"https://ror.org/04xvfkh51","country_code":"ES","type":"facility","lineage":["https://openalex.org/I105140100","https://openalex.org/I4210162154"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Ignacio Cascudo","raw_affiliation_strings":["IMDEA Software Institute, Madrid, Spain","IMDEA Software Institute#TAB#"],"affiliations":[{"raw_affiliation_string":"IMDEA Software Institute, Madrid, Spain","institution_ids":["https://openalex.org/I4210162154"]},{"raw_affiliation_string":"IMDEA Software Institute#TAB#","institution_ids":["https://openalex.org/I4210162154"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079826922","display_name":"Ivan Damg\u00e5rd","orcid":"https://orcid.org/0009-0003-6164-0896"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Ivan Damg\u00e5rd","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark","Aarhus University, Aarhus, DENMARK,"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]},{"raw_affiliation_string":"Aarhus University, Aarhus, DENMARK,","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060580234","display_name":"Bernardo David","orcid":"https://orcid.org/0000-0002-1872-7799"},"institutions":[{"id":"https://openalex.org/I83467386","display_name":"IT University of Copenhagen","ror":"https://ror.org/02309jg23","country_code":"DK","type":"education","lineage":["https://openalex.org/I83467386"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Bernardo David","raw_affiliation_strings":["IT University of Copenhagen, Copenhagen, Denmark","IT-UNIVERSITY OF COPENHAGEN"],"affiliations":[{"raw_affiliation_string":"IT University of Copenhagen, Copenhagen, Denmark","institution_ids":["https://openalex.org/I83467386"]},{"raw_affiliation_string":"IT-UNIVERSITY OF COPENHAGEN","institution_ids":["https://openalex.org/I83467386"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051096181","display_name":"Nico D\u00f6ttling","orcid":"https://orcid.org/0000-0002-5914-7635"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nico D\u00f6ttling","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014034048","display_name":"Rafael Dowsley","orcid":"https://orcid.org/0000-0002-7588-2410"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Rafael Dowsley","raw_affiliation_strings":["Bar Ilan University, Tel Aviv, Israel","Bar-Ilan University"],"affiliations":[{"raw_affiliation_string":"Bar Ilan University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I13955877"]},{"raw_affiliation_string":"Bar-Ilan University","institution_ids":["https://openalex.org/I13955877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034360202","display_name":"Irene Giacomelli","orcid":"https://orcid.org/0000-0002-4589-287X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Irene Giacomelli","raw_affiliation_strings":["Protocol Labs, Inc., Basel, Switzerland","Protocol Labs, Inc"],"affiliations":[{"raw_affiliation_string":"Protocol Labs, Inc., Basel, Switzerland","institution_ids":[]},{"raw_affiliation_string":"Protocol Labs, Inc","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5058563643"],"corresponding_institution_ids":["https://openalex.org/I4210162154"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01494186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2018","issue":null,"first_page":"606","last_page":"635"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9663000106811523,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.900335967540741},{"id":"https://openalex.org/keywords/homomorphism","display_name":"Homomorphism","score":0.8114727139472961},{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.7811175584793091},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7181590795516968},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.681688666343689},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.6525018215179443},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.6497461795806885},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.5614266395568848},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5561684370040894},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5423006415367126},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5084001421928406},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.4931933283805847},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.49114009737968445},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.47994711995124817},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.45749932527542114},{"id":"https://openalex.org/keywords/communication-complexity","display_name":"Communication complexity","score":0.43432775139808655},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4137246608734131},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.27355054020881653},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.27303382754325867},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19172358512878418},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.15587890148162842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1302413046360016},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.09595611691474915},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08340317010879517},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.0805605947971344}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.900335967540741},{"id":"https://openalex.org/C4042151","wikidata":"https://www.wikidata.org/wiki/Q215111","display_name":"Homomorphism","level":2,"score":0.8114727139472961},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.7811175584793091},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7181590795516968},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.681688666343689},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.6525018215179443},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.6497461795806885},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.5614266395568848},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5561684370040894},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5423006415367126},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5084001421928406},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.4931933283805847},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.49114009737968445},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.47994711995124817},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.45749932527542114},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.43432775139808655},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4137246608734131},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27355054020881653},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.27303382754325867},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19172358512878418},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.15587890148162842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1302413046360016},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.09595611691474915},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08340317010879517},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0805605947971344},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1007/978-3-030-34621-8_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-34621-8_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:openaire/8859ac92-add0-4819-9390-9ccf6fe26878","is_oa":true,"landing_page_url":"https://pure.itu.dk/portal/da/publications/8859ac92-add0-4819-9390-9ccf6fe26878","pdf_url":null,"source":{"id":"https://openalex.org/S4377196680","display_name":"IT University Of Copenhagen (IT University of Copenhagen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I83467386","host_organization_name":"IT University of Copenhagen","host_organization_lineage":["https://openalex.org/I83467386"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cascudo, I, Damg\u00e5rd, I, David, B, Dowsley, R, D\u00f6ttling, N & Giacomelli, I 2019, Efficient UC Commitment Extension with Homomorphism for Free (and Applications). in S Galbraith & S Moriai (eds), Advances in Cryptology \u2013 ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8\u201312, 2019, Proceedings, Part II. Springer, Lecture Notes in Computer Science, vol. 11922, pp. 606-635. < https://eprint.iacr.org/2018/983.pdf >","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"mag:2903324634","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2018/983.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null},{"id":"pmh:oai:figshare.com:article/24613023","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Efficient_UC_Commitment_Extension_with_Homomorphism_for_Free_and_Applications_/24613023","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference contribution"},{"id":"pmh:oai:pure.atira.dk:publications/1ba67348-e636-4788-a70e-60feb5e34b63","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/1ba67348-e636-4788-a70e-60feb5e34b63","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cascudo, I, Damg\u00e5rd, I, David, B, D\u00f6ttling, N, Dowsley, R & Giacomelli, I 2019, Efficient UC Commitment Extension with Homomorphism for Free (and Applications). in S D Galbraith & S Moriai (eds), Advances in Cryptology \u2013 ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, Lecture Notes in Computer Science, vol. 11922, pp. 606-635, 25th Annual International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, Kobe, Japan, 08/12/2019. https://doi.org/10.1007/978-3-030-34621-8_22","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"doi:10.60882/cispa.24613023","is_oa":true,"landing_page_url":"https://doi.org/10.60882/cispa.24613023","pdf_url":null,"source":{"id":"https://openalex.org/S7407050916","display_name":"CISPA Helmholtz Center","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"doi:10.60882/cispa.24613023.v1","is_oa":true,"landing_page_url":"https://doi.org/10.60882/cispa.24613023.v1","pdf_url":null,"source":{"id":"https://openalex.org/S7407050916","display_name":"CISPA Helmholtz Center","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/8859ac92-add0-4819-9390-9ccf6fe26878","is_oa":true,"landing_page_url":"https://pure.itu.dk/portal/da/publications/8859ac92-add0-4819-9390-9ccf6fe26878","pdf_url":null,"source":{"id":"https://openalex.org/S4377196680","display_name":"IT University Of Copenhagen (IT University of Copenhagen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I83467386","host_organization_name":"IT University of Copenhagen","host_organization_lineage":["https://openalex.org/I83467386"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cascudo, I, Damg\u00e5rd, I, David, B, Dowsley, R, D\u00f6ttling, N & Giacomelli, I 2019, Efficient UC Commitment Extension with Homomorphism for Free (and Applications). in S Galbraith & S Moriai (eds), Advances in Cryptology \u2013 ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8\u201312, 2019, Proceedings, Part II. Springer, Lecture Notes in Computer Science, vol. 11922, pp. 606-635. < https://eprint.iacr.org/2018/983.pdf >","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W100837511","https://openalex.org/W111114747","https://openalex.org/W262831521","https://openalex.org/W1499934958","https://openalex.org/W1505871300","https://openalex.org/W1539572409","https://openalex.org/W1589034595","https://openalex.org/W1867273832","https://openalex.org/W2031015560","https://openalex.org/W2113085788","https://openalex.org/W2122828120","https://openalex.org/W2126484007","https://openalex.org/W2146099890","https://openalex.org/W2150005435","https://openalex.org/W2171959510","https://openalex.org/W2204895368","https://openalex.org/W2294211439","https://openalex.org/W2294400283","https://openalex.org/W2416431186","https://openalex.org/W2430991892","https://openalex.org/W2493644741","https://openalex.org/W2580257616","https://openalex.org/W2594323998","https://openalex.org/W2604903677","https://openalex.org/W2765206040","https://openalex.org/W2795109472","https://openalex.org/W2883585522","https://openalex.org/W2883748642","https://openalex.org/W2950393457"],"related_works":["https://openalex.org/W2989937780","https://openalex.org/W2122828120","https://openalex.org/W2950221447","https://openalex.org/W1904753036","https://openalex.org/W2153795664","https://openalex.org/W2545013521","https://openalex.org/W1909324101","https://openalex.org/W2401099821","https://openalex.org/W1529116701","https://openalex.org/W3106674001","https://openalex.org/W3121832407","https://openalex.org/W2093785875","https://openalex.org/W2952720749","https://openalex.org/W2768526869","https://openalex.org/W2277839617","https://openalex.org/W436176431","https://openalex.org/W1988512541","https://openalex.org/W2114118999","https://openalex.org/W2952537851","https://openalex.org/W2343630731"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
