{"id":"https://openalex.org/W4210505790","doi":"https://doi.org/10.1109/cdc45484.2021.9683026","title":"Multi-party computation enables secure polynomial control based solely on secret-sharing","display_name":"Multi-party computation enables secure polynomial control based solely on secret-sharing","publication_year":2021,"publication_date":"2021-12-14","ids":{"openalex":"https://openalex.org/W4210505790","doi":"https://doi.org/10.1109/cdc45484.2021.9683026"},"language":"en","primary_location":{"id":"doi:10.1109/cdc45484.2021.9683026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc45484.2021.9683026","pdf_url":null,"source":{"id":"https://openalex.org/S4363607724","display_name":"2021 60th IEEE Conference on Decision and Control (CDC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 60th IEEE Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090922214","display_name":"Sebastian Schlor","orcid":"https://orcid.org/0000-0002-8022-472X"},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian Schlor","raw_affiliation_strings":["University of Stuttgart, Institute for Systems Theory and Automatic Control,Germany","University of Stuttgart, Institute for Systems Theory and Automatic Control, Germany"],"affiliations":[{"raw_affiliation_string":"University of Stuttgart, Institute for Systems Theory and Automatic Control,Germany","institution_ids":["https://openalex.org/I100066346"]},{"raw_affiliation_string":"University of Stuttgart, Institute for Systems Theory and Automatic Control, Germany","institution_ids":["https://openalex.org/I100066346"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002102070","display_name":"Michael Hertneck","orcid":"https://orcid.org/0000-0002-3935-1700"},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Hertneck","raw_affiliation_strings":["University of Stuttgart, Institute for Systems Theory and Automatic Control,Germany","University of Stuttgart, Institute for Systems Theory and Automatic Control, Germany"],"affiliations":[{"raw_affiliation_string":"University of Stuttgart, Institute for Systems Theory and Automatic Control,Germany","institution_ids":["https://openalex.org/I100066346"]},{"raw_affiliation_string":"University of Stuttgart, Institute for Systems Theory and Automatic Control, Germany","institution_ids":["https://openalex.org/I100066346"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043014441","display_name":"Stefan Wildhagen","orcid":"https://orcid.org/0000-0001-9180-6840"},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan Wildhagen","raw_affiliation_strings":["University of Stuttgart, Institute for Systems Theory and Automatic Control,Germany","University of Stuttgart, Institute for Systems Theory and Automatic Control, Germany"],"affiliations":[{"raw_affiliation_string":"University of Stuttgart, Institute for Systems Theory and Automatic Control,Germany","institution_ids":["https://openalex.org/I100066346"]},{"raw_affiliation_string":"University of Stuttgart, Institute for Systems Theory and Automatic Control, Germany","institution_ids":["https://openalex.org/I100066346"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001090900","display_name":"Frank Allg\u00f6wer","orcid":"https://orcid.org/0000-0002-3702-3658"},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Frank Allgower","raw_affiliation_strings":["University of Stuttgart, Institute for Systems Theory and Automatic Control,Germany","University of Stuttgart, Institute for Systems Theory and Automatic Control, Germany"],"affiliations":[{"raw_affiliation_string":"University of Stuttgart, Institute for Systems Theory and Automatic Control,Germany","institution_ids":["https://openalex.org/I100066346"]},{"raw_affiliation_string":"University of Stuttgart, Institute for Systems Theory and Automatic Control, Germany","institution_ids":["https://openalex.org/I100066346"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5090922214"],"corresponding_institution_ids":["https://openalex.org/I100066346"],"apc_list":null,"apc_paid":null,"fwci":0.6283,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.71994765,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"4882","last_page":"4887"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8371519446372986},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7646013498306274},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6466702818870544},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6170949339866638},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.6053733229637146},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.5594073534011841},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5395727157592773},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.534934937953949},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5253181457519531},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4614831805229187},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4424205422401428},{"id":"https://openalex.org/keywords/communication-complexity","display_name":"Communication complexity","score":0.4290957450866699},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.421235591173172},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.4203600287437439},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.4170876145362854},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35240310430526733},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3398344814777374},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1428336799144745},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1287621259689331}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8371519446372986},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7646013498306274},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6466702818870544},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6170949339866638},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.6053733229637146},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.5594073534011841},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5395727157592773},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.534934937953949},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5253181457519531},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4614831805229187},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4424205422401428},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.4290957450866699},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.421235591173172},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.4203600287437439},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.4170876145362854},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35240310430526733},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3398344814777374},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1428336799144745},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1287621259689331},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cdc45484.2021.9683026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc45484.2021.9683026","pdf_url":null,"source":{"id":"https://openalex.org/S4363607724","display_name":"2021 60th IEEE Conference on Decision and Control (CDC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 60th IEEE Conference on Decision and Control (CDC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W51265332","https://openalex.org/W1556155774","https://openalex.org/W1971286892","https://openalex.org/W2006453614","https://openalex.org/W2108834246","https://openalex.org/W2132172731","https://openalex.org/W2171495471","https://openalex.org/W2290211681","https://openalex.org/W2536058570","https://openalex.org/W2739578598","https://openalex.org/W2774167780","https://openalex.org/W2883048673","https://openalex.org/W2895865029","https://openalex.org/W2903850320","https://openalex.org/W2905764233","https://openalex.org/W2964529893","https://openalex.org/W2990644065","https://openalex.org/W3008381581","https://openalex.org/W3012309368","https://openalex.org/W3020912434","https://openalex.org/W3027981004","https://openalex.org/W3103297508"],"related_works":["https://openalex.org/W2963730492","https://openalex.org/W2166322483","https://openalex.org/W2182952131","https://openalex.org/W2168067755","https://openalex.org/W1499365849","https://openalex.org/W2343374647","https://openalex.org/W1518057863","https://openalex.org/W2902863635","https://openalex.org/W2790638983","https://openalex.org/W2060852056"],"abstract_inverted_index":{"Encrypted":[0],"control":[1,21,33,50,58,114,126,138,180],"systems":[2],"allow":[3],"to":[4,55,140,158],"evaluate":[5,142],"feedback":[6,38,144],"laws":[7,145],"on":[8,62,117,129],"external":[9],"servers":[10],"without":[11,149],"revealing":[12],"private":[13],"information":[14],"about":[15],"state":[16],"and":[17,66],"input":[18],"data,":[19],"the":[20,24,45,93,160,166,178,189],"law,":[22],"or":[23],"plant.":[25],"While":[26],"there":[27],"are":[28,77,182],"a":[29,89,122,135],"number":[30],"of":[31,47,92,97,146,165],"encrypted":[32,56],"schemes":[34,181],"available":[35],"for":[36,44,88],"linear":[37],"laws,":[39],"only":[40],"few":[41],"results":[42],"exist":[43],"evaluation":[46],"more":[48,79],"general":[49],"laws.":[51],"Recently,":[52],"an":[53,67],"approach":[54],"polynomial":[57,113,143],"was":[59],"presented,":[60],"relying":[61],"two-party":[63,190],"secret":[64,83,118],"sharing":[65],"inter-server":[68,150],"communication":[69],"protocol":[70],"using":[71],"homomorphic":[72,75],"encryption.":[73],"As":[74],"encryptions":[76],"much":[78],"computationally":[80,186],"demanding":[81,187],"than":[82,188],"sharing,":[84],"they":[85],"make":[86],"up":[87],"tremendous":[90],"amount":[91],"overall":[94],"computational":[95],"demand":[96],"this":[98,101,104],"scheme.":[99],"For":[100],"reason,":[102],"in":[103],"paper,":[105],"we":[106,133],"demonstrate":[107],"that":[108,177],"multi-party":[109],"computation":[110],"enables":[111],"secure":[112,124],"based":[115,128],"solely":[116],"sharing.":[119],"We":[120],"introduce":[121],"novel":[123,136],"three-party":[125,130],"scheme":[127,139,191],"computation.":[131],"Further,":[132],"propose":[134],"n-party":[137],"securely":[141],"arbitrary":[147],"degree":[148],"communication.":[151],"The":[152],"latter":[153],"property":[154],"makes":[155],"it":[156],"easier":[157],"realize":[159],"necessary":[161],"requirement":[162],"regarding":[163],"non-collusion":[164],"servers,":[167],"with":[168],"which":[169],"perfect":[170],"security":[171],"can":[172],"be":[173],"guaranteed.":[174],"Simulations":[175],"suggest":[176],"presented":[179],"many":[183],"times":[184],"less":[185],"mentioned":[192],"above.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
