{"id":"https://openalex.org/W4290087514","doi":"https://doi.org/10.1007/978-3-031-13185-1_19","title":"PoS4MPC: Automated Security Policy Synthesis for\u00a0Secure Multi-party Computation","display_name":"PoS4MPC: Automated Security Policy Synthesis for\u00a0Secure Multi-party Computation","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4290087514","doi":"https://doi.org/10.1007/978-3-031-13185-1_19"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-13185-1_19","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-13185-1_19","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-13185-1_19.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-13185-1_19.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101712590","display_name":"Yuxin Fan","orcid":"https://orcid.org/0000-0003-1561-1472"},"institutions":[{"id":"https://openalex.org/I30809798","display_name":"ShanghaiTech University","ror":"https://ror.org/030bhh786","country_code":"CN","type":"education","lineage":["https://openalex.org/I30809798"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuxin Fan","raw_affiliation_strings":["School of Information Science and Technology, ShanghaiTech University, Shanghai, 201210, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, ShanghaiTech University, Shanghai, 201210, China","institution_ids":["https://openalex.org/I30809798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027425633","display_name":"Fu Song","orcid":"https://orcid.org/0000-0002-0581-2679"},"institutions":[{"id":"https://openalex.org/I30809798","display_name":"ShanghaiTech University","ror":"https://ror.org/030bhh786","country_code":"CN","type":"education","lineage":["https://openalex.org/I30809798"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fu Song","raw_affiliation_strings":["School of Information Science and Technology, ShanghaiTech University, Shanghai, 201210, China","Shanghai Engineering Research Center of Intelligent Vision and Imaging, Shanghai, 201210, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, ShanghaiTech University, Shanghai, 201210, China","institution_ids":["https://openalex.org/I30809798"]},{"raw_affiliation_string":"Shanghai Engineering Research Center of Intelligent Vision and Imaging, Shanghai, 201210, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030747944","display_name":"Taolue Chen","orcid":"https://orcid.org/0000-0002-5993-1665"},"institutions":[{"id":"https://openalex.org/I98259816","display_name":"Birkbeck, University of London","ror":"https://ror.org/02mb95055","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I98259816"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Taolue Chen","raw_affiliation_strings":["Department of Computer Science, Birkbeck, University of London, London, WC1E 7HX, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Birkbeck, University of London, London, WC1E 7HX, UK","institution_ids":["https://openalex.org/I98259816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019892687","display_name":"Liangfeng Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I30809798","display_name":"ShanghaiTech University","ror":"https://ror.org/030bhh786","country_code":"CN","type":"education","lineage":["https://openalex.org/I30809798"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangfeng Zhang","raw_affiliation_strings":["School of Information Science and Technology, ShanghaiTech University, Shanghai, 201210, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, ShanghaiTech University, Shanghai, 201210, China","institution_ids":["https://openalex.org/I30809798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082329778","display_name":"Wanwei Liu","orcid":"https://orcid.org/0000-0002-2315-1704"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I4210154819","display_name":"Centre for High Performance Computing","ror":"https://ror.org/0409egh51","country_code":"ZA","type":"other","lineage":["https://openalex.org/I4210154819"]}],"countries":["CN","ZA"],"is_corresponding":false,"raw_author_name":"Wanwei Liu","raw_affiliation_strings":["College of Computer Science, National University of Defense Technology, Changsha, 410073, China","State Key Laboratory for High Performance Computing, Changsha, 410073, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, National University of Defense Technology, Changsha, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"State Key Laboratory for High Performance Computing, Changsha, 410073, China","institution_ids":["https://openalex.org/I4210154819"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101712590"],"corresponding_institution_ids":["https://openalex.org/I30809798"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":1.3687,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83529525,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"385","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12808","display_name":"Ferroelectric and Negative Capacitance Devices","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8905370235443115},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6586077213287354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5605465769767761},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.525821328163147},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5246087312698364},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5123899579048157},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4332750737667084},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35341688990592957},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3036814033985138},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22099816799163818},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18444809317588806}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8905370235443115},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6586077213287354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5605465769767761},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.525821328163147},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5246087312698364},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5123899579048157},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4332750737667084},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35341688990592957},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3036814033985138},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22099816799163818},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18444809317588806}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-13185-1_19","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-13185-1_19","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-13185-1_19.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-13185-1_19","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-13185-1_19","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-13185-1_19.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G450653452","display_name":null,"funder_award_id":"62072309","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5509612950","display_name":null,"funder_award_id":"61872340","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5848258319","display_name":null,"funder_award_id":"0 and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6058138561","display_name":null,"funder_award_id":", No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8165155651","display_name":null,"funder_award_id":"61872371","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8863666567","display_name":null,"funder_award_id":"and No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324852","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760"},{"id":"https://openalex.org/F4320326895","display_name":"State Key Laboratory of Novel Software Technology","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4290087514.pdf","grobid_xml":"https://content.openalex.org/works/W4290087514.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W151752673","https://openalex.org/W1520270249","https://openalex.org/W1984680759","https://openalex.org/W1988374166","https://openalex.org/W1991050609","https://openalex.org/W2004154155","https://openalex.org/W2039605106","https://openalex.org/W2059671515","https://openalex.org/W2129278597","https://openalex.org/W2139799388","https://openalex.org/W2141420453","https://openalex.org/W2150174204","https://openalex.org/W2380240963","https://openalex.org/W2511015845","https://openalex.org/W2516108421","https://openalex.org/W2766853874","https://openalex.org/W2883707793","https://openalex.org/W2884937557","https://openalex.org/W2886689407","https://openalex.org/W2887202664","https://openalex.org/W2887610974","https://openalex.org/W2903850320","https://openalex.org/W2905722102","https://openalex.org/W2912873165","https://openalex.org/W2997262806","https://openalex.org/W3009776881","https://openalex.org/W3026923845","https://openalex.org/W3108672920","https://openalex.org/W3132102707","https://openalex.org/W3141585064","https://openalex.org/W4205289787","https://openalex.org/W4253342685","https://openalex.org/W4290087514"],"related_works":["https://openalex.org/W2188814192","https://openalex.org/W2114705216","https://openalex.org/W3094039898","https://openalex.org/W2151761340","https://openalex.org/W1555133226","https://openalex.org/W2173238669","https://openalex.org/W2130339907","https://openalex.org/W1519114293","https://openalex.org/W2188404590","https://openalex.org/W2049966995"],"abstract_inverted_index":{"Abstract":[0],"Secure":[1],"multi-party":[2],"computation":[3],"(MPC)":[4],"is":[5,61,112,124],"a":[6,113,129,143,151,178],"promising":[7],"technique":[8],"for":[9,50,65],"privacy-persevering":[10],"applications.":[11,36],"A":[12],"number":[13],"of":[14,24,116,193],"MPC":[15,35,41,188],"frameworks":[16,42],"have":[17],"been":[18],"proposed":[19],"to":[20,30,45,54,67,98,126,138,163,166],"reduce":[21],"the":[22,75,135,155,168,191],"burden":[23],"designing":[25],"customized":[26],"protocols,":[27],"allowing":[28],"non-experts":[29,66],"quickly":[31,127],"develop":[32],"and":[33,119],"deploy":[34],"To":[37,83],"improve":[38],"performance,":[39],"recent":[40],"allow":[43],"users":[44],"declare":[46,99],"variables":[47,103,141],"secret":[48,69,102,140],"only":[49],"these":[51],"which":[52],"are":[53,160],"be":[55,148],"protected.":[56],"However,":[57],"in":[58,87,142,150,177],"practice,":[59],"it":[60],"usually":[62],"highly":[63],"non-trivial":[64],"specify":[68],"variables:":[70],"declaring":[71,78],"too":[72,79],"many":[73],"degrades":[74],"performance":[76],"while":[77],"less":[80],"compromises":[81],"privacy.":[82],"address":[84],"this":[85,88],"problem,":[86],"work":[89],"we":[90],"propose":[91],"an":[92],"automated":[93],"security":[94,144,169],"policy":[95,145],"synthesis":[96],"approach":[97,111,176],"as":[100,104],"few":[101],"possible":[105],"but":[106],"without":[107],"compromising":[108],"security.":[109],"Our":[110],"synergistic":[114],"integration":[115],"type":[117,164],"inference":[118,165],"symbolic":[120,158],"reasoning.":[121],"The":[122],"former":[123],"able":[125],"infer":[128],"sound\u2014but":[130],"sometimes":[131],"conservative\u2014security":[132],"policy,":[133],"whereas":[134],"latter":[136],"allows":[137],"identify":[139],"that":[146],"can":[147],"declassified":[149],"precise":[152],"manner.":[153],"Moreover,":[154],"results":[156,184],"from":[157],"reasoning":[159],"fed":[161],"back":[162],"refine":[167],"types":[170],"even":[171],"further.":[172],"We":[173],"implement":[174],"our":[175,194],"new":[179],"tool":[180],"PoS4MPC":[181],".":[182],"Experimental":[183],"on":[185],"five":[186],"typical":[187],"applications":[189],"confirm":[190],"efficacy":[192],"approach.":[195]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
