{"id":"https://openalex.org/W2725327871","doi":"https://doi.org/10.1007/978-3-319-70503-3_15","title":"Resource-Efficient OT Combiners with Active Security","display_name":"Resource-Efficient OT Combiners with Active Security","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2725327871","doi":"https://doi.org/10.1007/978-3-319-70503-3_15","mag":"2725327871"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-70503-3_15","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-70503-3_15","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058563643","display_name":"Ignacio Cascudo","orcid":"https://orcid.org/0000-0001-5520-5386"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Ignacio Cascudo","raw_affiliation_strings":["Aalborg University, Aalborg, Denmark"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Aalborg University, Aalborg, Denmark","institution_ids":["https://openalex.org/I891191580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079826922","display_name":"Ivan Damg\u00e5rd","orcid":"https://orcid.org/0009-0003-6164-0896"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Ivan Damg\u00e5rd","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007447603","display_name":"Oriol Farr\u00e0s","orcid":"https://orcid.org/0000-0002-7495-5980"},"institutions":[{"id":"https://openalex.org/I55952717","display_name":"Universidad Rovira i Virgili","ror":"https://ror.org/00g5sqv46","country_code":"ES","type":"education","lineage":["https://openalex.org/I55952717"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Oriol Farr\u00e0s","raw_affiliation_strings":["Universitat Rovira i Virgili, Tarragona, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universitat Rovira i Virgili, Tarragona, Spain","institution_ids":["https://openalex.org/I55952717"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015202717","display_name":"Samuel Ranellucci","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]},{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Samuel Ranellucci","raw_affiliation_strings":["George Mason University, Fairfax, USA","University of Maryland, College Park, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"University of Maryland, College Park, USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058563643"],"corresponding_institution_ids":["https://openalex.org/I891191580"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2827,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.5592283,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"461","last_page":"486"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7724966406822205},{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.6903067231178284},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5960747599601746},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4947070777416229},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.47866472601890564},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.45437169075012207},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44469428062438965},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.44434884190559387},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4105928838253021},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3693634867668152},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29828473925590515},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2553102970123291}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7724966406822205},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.6903067231178284},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5960747599601746},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4947070777416229},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.47866472601890564},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.45437169075012207},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44469428062438965},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.44434884190559387},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4105928838253021},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3693634867668152},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29828473925590515},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2553102970123291},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-70503-3_15","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-70503-3_15","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:publications/5c943e00-3cb8-43c4-ae7f-a898407a5e78","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/5c943e00-3cb8-43c4-ae7f-a898407a5e78","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cascudo, I, Damg\u00e5rd, I, Farr\u00e0s, O & Ranellucci, S 2017, Resource-Efficient OT Combiners with Active Security. in Y Kalai & L Reyzin (eds), Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. vol. 10678, Springer VS, Lecture Notes in Computer Science, vol. 10678, pp. 461-486, Fifteenth IACR Theory of Cryptography Conference - TCC 2017, Baltimore, United States, 12/11/2017. https://doi.org/10.1007/978-3-319-70503-3_15","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/a1e4c491-f65c-451a-9f99-ee7da5a79f61","is_oa":false,"landing_page_url":"https://vbn.aau.dk/da/publications/a1e4c491-f65c-451a-9f99-ee7da5a79f61","pdf_url":null,"source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cascudo, I, Damg\u00e5rd, I, Farr\u00e0s, O & Ranellucci, S 2017, Resource-efficient OT combiners with active security. in Y Kalai & L Reyzin (eds), Theory of Cryptography : 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II. Springer, Lecture Notes in Computer Science, vol. LNCS 10678, pp. 461-486, International Conference of Theory of Cryptography, Baltimore, United States, 12/11/2017. https://doi.org/10.1007/978-3-319-70503-3_15","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1176565477","display_name":null,"funder_award_id":"H2020-ICT-2014-1","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G1535130713","display_name":null,"funder_award_id":"H2020-ICT","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G2153309609","display_name":null,"funder_award_id":"ICT-2014-1","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G2445369504","display_name":null,"funder_award_id":"H2020-ICT-2014","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G2502225020","display_name":null,"funder_award_id":"H2020-ICT-2014-1-644024","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G3598852344","display_name":null,"funder_award_id":"700540","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G3854465928","display_name":"TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation","funder_award_id":"1563722","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4470712837","display_name":"TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation","funder_award_id":"1564088","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4937468798","display_name":null,"funder_award_id":"H2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5530824169","display_name":"Better MPC Protocols in Theory and in Practice","funder_award_id":"669255","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G6511652907","display_name":"A FRAMEWORK FOR USER CENTRED PRIVACY AND SECURITY IN THE CLOUD","funder_award_id":"644024","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7847148445","display_name":null,"funder_award_id":"H2020-ICT-2014-1","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G854504215","display_name":null,"funder_award_id":"DFF-4002-00367","funder_id":"https://openalex.org/F4320322928","funder_display_name":"Danmarks Frie Forskningsfond"},{"id":"https://openalex.org/G955785279","display_name":"Constructing an Alliance for Value-driven Cybersecurity","funder_award_id":"700540","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320322928","display_name":"Danmarks Frie Forskningsfond","ror":"https://ror.org/02sptwz63"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1487501992","https://openalex.org/W1498297643","https://openalex.org/W1499934958","https://openalex.org/W1501386175","https://openalex.org/W1515669336","https://openalex.org/W1533708960","https://openalex.org/W1560201081","https://openalex.org/W1573068452","https://openalex.org/W1580656816","https://openalex.org/W1640980902","https://openalex.org/W1840749574","https://openalex.org/W1887434847","https://openalex.org/W1958037614","https://openalex.org/W1968182724","https://openalex.org/W1987667503","https://openalex.org/W2016443801","https://openalex.org/W2020316223","https://openalex.org/W2026940674","https://openalex.org/W2097407854","https://openalex.org/W2102302508","https://openalex.org/W2119422255","https://openalex.org/W2136563111","https://openalex.org/W2141420453","https://openalex.org/W2164987725","https://openalex.org/W2167236842","https://openalex.org/W2181513051","https://openalex.org/W2293606446","https://openalex.org/W2300339977","https://openalex.org/W2397857137","https://openalex.org/W2970097841","https://openalex.org/W4206744556"],"related_works":["https://openalex.org/W2397857137","https://openalex.org/W2083084382","https://openalex.org/W1557783852","https://openalex.org/W2188298058","https://openalex.org/W3214129216","https://openalex.org/W2768332800","https://openalex.org/W2096024255","https://openalex.org/W2006088653","https://openalex.org/W2950578674","https://openalex.org/W2564297870"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2026-05-17T08:19:37.847499","created_date":"2025-10-10T00:00:00"}
