{"id":"https://openalex.org/W2941663220","doi":"https://doi.org/10.1007/978-3-030-38471-5_12","title":"Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ","display_name":"Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W2941663220","doi":"https://doi.org/10.1007/978-3-030-38471-5_12","mag":"2941663220"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-38471-5_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-38471-5_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://pure.au.dk/portal/en/publications/24978cbb-2520-4856-afb5-c36316c1383f","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083071294","display_name":"Carsten Baum","orcid":"https://orcid.org/0000-0001-7905-0198"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Carsten Baum","raw_affiliation_strings":["Department of Computer Science, Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022714340","display_name":"Daniele Cozzo","orcid":"https://orcid.org/0000-0001-5289-3769"},"institutions":[{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Daniele Cozzo","raw_affiliation_strings":["imec-COSIC, KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"imec-COSIC, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013420832","display_name":"Nigel P. Smart","orcid":"https://orcid.org/0000-0003-3567-3304"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]}],"countries":["BE","GB"],"is_corresponding":false,"raw_author_name":"Nigel P. Smart","raw_affiliation_strings":["Department of Computer Science, University of Bristol, Bristol, UK","imec-COSIC, KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"imec-COSIC, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083071294"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":10.1634,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.98603849,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"274","last_page":"302"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.914095401763916},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8791345953941345},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6144945621490479},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5762299299240112},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.542218029499054},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5302424430847168},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.5234505534172058},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5178497433662415},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5144705772399902},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5043407678604126},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.49183130264282227},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4855067729949951},{"id":"https://openalex.org/keywords/commitment-scheme","display_name":"Commitment scheme","score":0.481096476316452},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.475187212228775},{"id":"https://openalex.org/keywords/memory-bandwidth","display_name":"Memory bandwidth","score":0.45438066124916077},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4109462797641754},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34280163049697876},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29747113585472107},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.28824520111083984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20640906691551208},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10015988349914551},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09772831201553345},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07667693495750427}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.914095401763916},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8791345953941345},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6144945621490479},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5762299299240112},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.542218029499054},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5302424430847168},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.5234505534172058},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5178497433662415},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5144705772399902},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5043407678604126},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.49183130264282227},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4855067729949951},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.481096476316452},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.475187212228775},{"id":"https://openalex.org/C188045654","wikidata":"https://www.wikidata.org/wiki/Q17148339","display_name":"Memory bandwidth","level":2,"score":0.45438066124916077},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4109462797641754},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34280163049697876},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29747113585472107},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.28824520111083984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20640906691551208},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10015988349914551},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09772831201553345},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07667693495750427},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-030-38471-5_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-38471-5_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:openaire/24978cbb-2520-4856-afb5-c36316c1383f","is_oa":true,"landing_page_url":"https://pure.au.dk/portal/en/publications/24978cbb-2520-4856-afb5-c36316c1383f","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Baum, C, Cozzo, D & P. Smart, N 2020, Using TopGear in Overdrive : A more efficient ZKPoK for SPDZ. in K G Paterson & D Stebila (eds), Selected Areas in Cryptography \u2013 SAC 2019 - 26th International Conference, Revised Selected Papers : 26th International Conference, Waterloo, ON, Canada, August 12\u201316, 2019, Revised Selected Papers. Springer, Cham, Lecture Notes in Computer Science, vol. 11959, pp. 274-302, 26th International Conference on Selected Areas in Cryptography, Waterloo, Ontario, Canada, 12/08/2019. https://doi.org/10.1007/978-3-030-38471-5_12","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/648354","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/bitstream/123456789/648354/2/SAC-PreProceedings.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Selected Areas in Cryptography - SAC 2019, Waterloo, ON, Canada, 12-16 August 2019","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/24978cbb-2520-4856-afb5-c36316c1383f","is_oa":true,"landing_page_url":"https://pure.au.dk/portal/en/publications/24978cbb-2520-4856-afb5-c36316c1383f","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Baum, C, Cozzo, D & P. Smart, N 2020, Using TopGear in Overdrive : A more efficient ZKPoK for SPDZ. in K G Paterson & D Stebila (eds), Selected Areas in Cryptography \u2013 SAC 2019 - 26th International Conference, Revised Selected Papers : 26th International Conference, Waterloo, ON, Canada, August 12\u201316, 2019, Revised Selected Papers. Springer, Cham, Lecture Notes in Computer Science, vol. 11959, pp. 274-302, 26th International Conference on Selected Areas in Cryptography, Waterloo, Ontario, Canada, 12/08/2019. https://doi.org/10.1007/978-3-030-38471-5_12","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W236632755","https://openalex.org/W1494774797","https://openalex.org/W1506156414","https://openalex.org/W1635361314","https://openalex.org/W1752323684","https://openalex.org/W1755636270","https://openalex.org/W1850468005","https://openalex.org/W1992282993","https://openalex.org/W2080578129","https://openalex.org/W2100847176","https://openalex.org/W2152926062","https://openalex.org/W2291524553","https://openalex.org/W2401959250","https://openalex.org/W2402235285","https://openalex.org/W2494078997","https://openalex.org/W2501280492","https://openalex.org/W2539273492","https://openalex.org/W2572551486","https://openalex.org/W2613594979","https://openalex.org/W2751494174","https://openalex.org/W2791664942","https://openalex.org/W2794685135","https://openalex.org/W2883563728","https://openalex.org/W2900370870","https://openalex.org/W2919746912"],"related_works":["https://openalex.org/W4287326435","https://openalex.org/W2155069045","https://openalex.org/W2484698373","https://openalex.org/W3136220782","https://openalex.org/W4411640668","https://openalex.org/W2951738283","https://openalex.org/W4404752493","https://openalex.org/W1993458326","https://openalex.org/W3127779352","https://openalex.org/W2950393457"],"abstract_inverted_index":{"The":[0],"HighGear":[1,41,88],"protocol":[2],"(Eurocrypt":[3],"2018)":[4],"is":[5,21,55],"the":[6,14,46,73,76,84,106,109,116,131],"fastest":[7],"currently":[8],"known":[9],"approach":[10,71,86],"to":[11,37,58,72,92,104],"preprocessing":[12],"for":[13,75],"SPDZ":[15,77,132],"Multi-Party":[16,78],"Computation":[17,79],"scheme.":[18,80],"Its":[19],"backbone":[20],"formed":[22],"by":[23],"an":[24],"Ideal":[25],"Lattice-based":[26],"Somewhat":[27],"Homomorphic":[28],"Encryption":[29],"Scheme":[30],"and":[31,60,89,122],"accompanying":[32],"Zero-Knowledge":[33],"proofs.":[34],"Unfortunately,":[35],"due":[36,57],"certain":[38],"characteristics":[39],"of":[40,52,87,108,120,130],"such":[42],"current":[43],"implementations":[44],"limit":[45],"security":[47,107],"parameters":[48],"in":[49,118],"a":[50,69,97],"number":[51],"places.":[53],"This":[54,101],"mainly":[56],"memory":[59,121],"bandwidth":[61,123],"consumption":[62,124],"constraints.":[63],"In":[64],"this":[65],"work":[66],"we":[67],"present":[68],"new":[70],"ZKPoKs":[74],"We":[81],"rigorously":[82],"formalize":[83],"original":[85],"show":[90],"how":[91],"improve":[93],"upon":[94],"it":[95],"using":[96],"different":[98],"proof":[99],"strategy.":[100],"allows":[102],"us":[103],"increase":[105],"underlying":[110],"protocols,":[111],"whilst":[112],"simultaneously":[113],"also":[114],"increasing":[115],"performance":[117],"terms":[119],"as":[125,127],"well":[126],"overall":[128],"throughput":[129],"offline":[133],"phase.":[134]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
