{"id":"https://openalex.org/W4385654341","doi":"https://doi.org/10.1007/978-3-031-38557-5_20","title":"Secure Multiparty Computation from Threshold Encryption Based on\u00a0Class Groups","display_name":"Secure Multiparty Computation from Threshold Encryption Based on\u00a0Class Groups","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385654341","doi":"https://doi.org/10.1007/978-3-031-38557-5_20"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-38557-5_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-38557-5_20","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://pure.au.dk/portal/en/publications/13ac331d-18f2-42b8-9f1f-d6118a24a715","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079826581","display_name":"Lennart Braun","orcid":"https://orcid.org/0000-0001-9164-305X"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Lennart Braun","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"raw_orcid":"https://orcid.org/0000-0001-9164-305X","affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079826922","display_name":"Ivan Damg\u00e5rd","orcid":"https://orcid.org/0009-0003-6164-0896"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Ivan Damg\u00e5rd","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028570693","display_name":"Claudio Orlandi","orcid":"https://orcid.org/0000-0003-4992-0249"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Claudio Orlandi","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"raw_orcid":"https://orcid.org/0000-0003-4992-0249","affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079826581"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":17.688,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.99452701,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"613","last_page":"645"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8113363981246948},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7385455369949341},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.579473614692688},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5551241040229797},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5537051558494568},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5294952988624573},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5180494785308838},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5094500184059143},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.4937637746334076},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4858414828777313},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.4850277304649353},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.4698813259601593},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.46601346135139465},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.45129746198654175},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.43933480978012085},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.42686909437179565},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4253201186656952},{"id":"https://openalex.org/keywords/commitment-scheme","display_name":"Commitment scheme","score":0.41987326741218567},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4170433282852173},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3351878523826599},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2545914947986603},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24010595679283142},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14428138732910156},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07287803292274475},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06413215398788452}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8113363981246948},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7385455369949341},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.579473614692688},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5551241040229797},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5537051558494568},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5294952988624573},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5180494785308838},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5094500184059143},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.4937637746334076},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4858414828777313},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.4850277304649353},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.4698813259601593},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.46601346135139465},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.45129746198654175},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.43933480978012085},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.42686909437179565},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4253201186656952},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.41987326741218567},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4170433282852173},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3351878523826599},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2545914947986603},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24010595679283142},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14428138732910156},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07287803292274475},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06413215398788452},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-031-38557-5_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-38557-5_20","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:openaire/13ac331d-18f2-42b8-9f1f-d6118a24a715","is_oa":true,"landing_page_url":"https://pure.au.dk/portal/en/publications/13ac331d-18f2-42b8-9f1f-d6118a24a715","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Braun, L, Damg\u00e5rd, I B & Orlandi, C 2023, Secure Multiparty Computation from Threshold Encryption Based on Class Groups. in H Handschuh & A Lysyanskaya (eds), Advances in Cryptology : CRYPTO 2023. Springer, Cham, Lecture Notes in Computer Science, vol. 14081, pp. 613-645. https://doi.org/10.1007/978-3-031-38557-5_20","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/13ac331d-18f2-42b8-9f1f-d6118a24a715","is_oa":true,"landing_page_url":"https://eprint.iacr.org/2022/1437","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Braun, L, Damg\u00e5rd, I B & Orlandi, C 2023, Secure Multiparty Computation from Threshold Encryption Based on Class Groups. in H Handschuh & A Lysyanskaya (eds), Advances in Cryptology : CRYPTO 2023. Springer, Cham, Lecture Notes in Computer Science, vol. 14081, pp. 613-645. https://doi.org/10.1007/978-3-031-38557-5_20","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/13ac331d-18f2-42b8-9f1f-d6118a24a715","is_oa":true,"landing_page_url":"https://pure.au.dk/portal/en/publications/13ac331d-18f2-42b8-9f1f-d6118a24a715","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Braun, L, Damg\u00e5rd, I B & Orlandi, C 2023, Secure Multiparty Computation from Threshold Encryption Based on Class Groups. in H Handschuh & A Lysyanskaya (eds), Advances in Cryptology : CRYPTO 2023. Springer, Cham, Lecture Notes in Computer Science, vol. 14081, pp. 613-645. https://doi.org/10.1007/978-3-031-38557-5_20","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W301822183","https://openalex.org/W1493614564","https://openalex.org/W1494774797","https://openalex.org/W1505345253","https://openalex.org/W1524288918","https://openalex.org/W1550422670","https://openalex.org/W1589586740","https://openalex.org/W1600010237","https://openalex.org/W1757892214","https://openalex.org/W1863832336","https://openalex.org/W1883290937","https://openalex.org/W2099950221","https://openalex.org/W2102632861","https://openalex.org/W2132172731","https://openalex.org/W2141420453","https://openalex.org/W2147270806","https://openalex.org/W2159366854","https://openalex.org/W2168970529","https://openalex.org/W2402235285","https://openalex.org/W2794685135","https://openalex.org/W2885172320","https://openalex.org/W2893016992","https://openalex.org/W2899466157","https://openalex.org/W2911825405","https://openalex.org/W2941663220","https://openalex.org/W2968538997","https://openalex.org/W3021332472","https://openalex.org/W3111550222","https://openalex.org/W3157694659","https://openalex.org/W4312588025","https://openalex.org/W4320155073","https://openalex.org/W4367593152"],"related_works":["https://openalex.org/W2361565459","https://openalex.org/W1973527459","https://openalex.org/W3172432269","https://openalex.org/W2949886604","https://openalex.org/W3112610909","https://openalex.org/W1576843907","https://openalex.org/W2610681567","https://openalex.org/W2069535412","https://openalex.org/W2613676064","https://openalex.org/W4226183777"],"abstract_inverted_index":{"We":[0,23],"construct":[1],"the":[2,8,15,52,79,100,146,150,162,165],"first":[3],"actively-secure":[4],"threshold":[5,29],"version":[6],"of":[7,164],"cryptosystem":[9],"based":[10],"on":[11,161],"class":[12],"groups":[13],"from":[14],"so-called":[16],"CL":[17],"framework":[18],"(Castagnos":[19],"and":[20,129],"Laguillaumie,":[21],"2015).":[22],"show":[24,155],"how":[25],"to":[26,31,54,77,82,135,148],"use":[27,78],"our":[28,55,97,123,140],"scheme":[30],"achieve":[32,83],"general":[33],"universally":[34],"composable":[35],"(UC)":[36],"secure":[37],"multiparty":[38],"computation":[39],"(MPC)":[40],"with":[41,46,63,85,88],"only":[42,89],"transparent":[43],"set-up,":[44],"i.e.,":[45],"no":[47,159],"secret":[48],"trapdoors":[49],"involved.":[50],"On":[51],"way":[53],"goal,":[56],"we":[57,95,154],"design":[58],"new":[59,141],"zero-knowledge":[60],"(ZK)":[61],"protocols":[62],"constant":[64,91],"communication":[65],"complexity":[66],"for":[67,99,113],"proving":[68],"multiplicative":[69],"relations":[70],"between":[71],"encrypted":[72],"values.":[73],"This":[74,119],"allows":[75,145],"us":[76],"ZK":[80],"proofs":[81],"MPC":[84,115],"active":[86],"security":[87,163],"a":[90,108,117],"factor":[92],"overhead.":[93],"Finally,":[94],"adapt":[96],"protocol":[98,126,144],"so":[101],"called":[102],"\u201cYou-Only-Speak-Once\u201d":[103],"(YOSO)":[104],"setting,":[105],"which":[106],"is":[107,120,127],"very":[109],"promising":[110],"recent":[111],"approach":[112],"performing":[114],"over":[116],"blockchain.":[118],"possible":[121],"because":[122],"key":[124,142],"generation":[125,143],"simpler":[128],"requires":[130],"significantly":[131],"less":[132],"interaction":[133],"compared":[134],"previous":[136],"approaches:":[137],"in":[138],"particular,":[139],"adversary":[147],"bias":[149],"public":[151],"key,":[152],"but":[153],"that":[156],"this":[157],"has":[158],"impact":[160],"resulting":[166],"cryptosystem.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":11}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
