{"id":"https://openalex.org/W2031533473","doi":"https://doi.org/10.1007/s10207-006-0007-5","title":"Low-randomness constant-round private XOR computations","display_name":"Low-randomness constant-round private XOR computations","publication_year":2006,"publication_date":"2006-08-07","ids":{"openalex":"https://openalex.org/W2031533473","doi":"https://doi.org/10.1007/s10207-006-0007-5","mag":"2031533473"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-006-0007-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-006-0007-5","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022225365","display_name":"Carlo Blundo","orcid":"https://orcid.org/0000-0002-8225-3401"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Carlo Blundo","raw_affiliation_strings":["Dipartimento di Informatica ed Applicazioni, Universit\u00e0 di Salerno, Via Ponte don Melillo, 84084, Fisciano, SA, Italy","Dipartimento di Informatica ed Applicazioni, Universit\u00e0 di Salerno, Via Ponte don Melillo, 84084, Fisciano, SA, Italy#TAB#"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica ed Applicazioni, Universit\u00e0 di Salerno, Via Ponte don Melillo, 84084, Fisciano, SA, Italy","institution_ids":["https://openalex.org/I131729948"]},{"raw_affiliation_string":"Dipartimento di Informatica ed Applicazioni, Universit\u00e0 di Salerno, Via Ponte don Melillo, 84084, Fisciano, SA, Italy#TAB#","institution_ids":["https://openalex.org/I131729948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026500214","display_name":"Clemente Galdi","orcid":"https://orcid.org/0000-0002-2988-700X"},"institutions":[{"id":"https://openalex.org/I4210108560","display_name":"Istituto Nazionale di Fisica Nucleare, Sezione di Napoli","ror":"https://ror.org/015kcdd40","country_code":"IT","type":"facility","lineage":["https://openalex.org/I160013858","https://openalex.org/I4210108560"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Clemente Galdi","raw_affiliation_strings":["Dipartimento di Scienze Fisiche, Universit\u00e0 di Napoli \u201cFederico II\u201d, Complesso Universitario di Monte Sant\u2019Angelo, Via Cinthia, 80126, Napoli, Italy","Dipartimento di Scienze Fisiche, Universit\u00e0 di Napoli \u201cFederico II\u201d, Complesso Universitario di Monte Sant\u2019Angelo, Via Cinthia, 80126, Napoli, SA, Italy#TAB#"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze Fisiche, Universit\u00e0 di Napoli \u201cFederico II\u201d, Complesso Universitario di Monte Sant\u2019Angelo, Via Cinthia, 80126, Napoli, Italy","institution_ids":["https://openalex.org/I4210108560"]},{"raw_affiliation_string":"Dipartimento di Scienze Fisiche, Universit\u00e0 di Napoli \u201cFederico II\u201d, Complesso Universitario di Monte Sant\u2019Angelo, Via Cinthia, 80126, Napoli, SA, Italy#TAB#","institution_ids":["https://openalex.org/I4210108560"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050503720","display_name":"Giuseppe Persiano","orcid":"https://orcid.org/0000-0001-6579-4807"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppe Persiano","raw_affiliation_strings":["Dipartimento di Informatica ed Applicazioni, Universit\u00e0 di Salerno, Via Ponte don Melillo, 84084, Fisciano, SA, Italy","Dipartimento di Informatica ed Applicazioni, Universit\u00e0 di Salerno, Via Ponte don Melillo, 84084, Fisciano, SA, Italy#TAB#"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica ed Applicazioni, Universit\u00e0 di Salerno, Via Ponte don Melillo, 84084, Fisciano, SA, Italy","institution_ids":["https://openalex.org/I131729948"]},{"raw_affiliation_string":"Dipartimento di Informatica ed Applicazioni, Universit\u00e0 di Salerno, Via Ponte don Melillo, 84084, Fisciano, SA, Italy#TAB#","institution_ids":["https://openalex.org/I131729948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022225365"],"corresponding_institution_ids":["https://openalex.org/I131729948"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.09851906,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6","issue":"1","first_page":"15","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.8994392156600952},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.7360379695892334},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.705743670463562},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.627623438835144},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5907847285270691},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5588003396987915},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5493646264076233},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5207490921020508},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.49606356024742126},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4632408022880554},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3595620095729828},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3341969847679138},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.11740025877952576}],"concepts":[{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.8994392156600952},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.7360379695892334},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.705743670463562},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.627623438835144},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5907847285270691},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5588003396987915},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5493646264076233},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5207490921020508},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.49606356024742126},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4632408022880554},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3595620095729828},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3341969847679138},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.11740025877952576},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-006-0007-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-006-0007-5","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1555098771","https://openalex.org/W1607280525","https://openalex.org/W1973599573","https://openalex.org/W1984332407","https://openalex.org/W2006453614","https://openalex.org/W2013784340","https://openalex.org/W2032956091","https://openalex.org/W2033027791","https://openalex.org/W2035912926","https://openalex.org/W2039605106","https://openalex.org/W2053362087","https://openalex.org/W2077315235","https://openalex.org/W2080911030","https://openalex.org/W2085125115","https://openalex.org/W2164604747","https://openalex.org/W4298949291"],"related_works":["https://openalex.org/W2206791037","https://openalex.org/W2082804893","https://openalex.org/W2782824540","https://openalex.org/W2808844937","https://openalex.org/W1557606368","https://openalex.org/W1451223395","https://openalex.org/W2275340472","https://openalex.org/W1828891199","https://openalex.org/W3124898189","https://openalex.org/W2222421382"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
