{"id":"https://openalex.org/W2160685018","doi":"https://doi.org/10.1109/fskd.2012.6233894","title":"Secure two-party computation of the quadratic function's extreme minimal value","display_name":"Secure two-party computation of the quadratic function's extreme minimal value","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W2160685018","doi":"https://doi.org/10.1109/fskd.2012.6233894","mag":"2160685018"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2012.6233894","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6233894","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086127343","display_name":"Wu Fen","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wu Fen","raw_affiliation_strings":["School of Computer Science and Technology, Anhui University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Hong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing &amp; Signal Processing, Anhui University, Ministry of Education, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing &amp; Signal Processing, Anhui University, Ministry of Education, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030514341","display_name":"Runhua Shi","orcid":"https://orcid.org/0000-0003-4513-1306"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shi Runhua","raw_affiliation_strings":["Key Laboratory of Intelligent Computing &amp; Signal Processing, Anhui University, Ministry of Education, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing &amp; Signal Processing, Anhui University, Ministry of Education, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017900481","display_name":"Huang Hongsheng","orcid":null},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huang Hongsheng","raw_affiliation_strings":["Department of operation and maintence in China Mobile, Xuancheng, China"],"affiliations":[{"raw_affiliation_string":"Department of operation and maintence in China Mobile, Xuancheng, China","institution_ids":["https://openalex.org/I180662265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086127343"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":0.4281,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.73558423,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"2975","last_page":"2978"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8591320514678955},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.8209633827209473},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.7190641164779663},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7148759365081787},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.6486021876335144},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6467725038528442},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.6467472314834595},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5617525577545166},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4673476815223694},{"id":"https://openalex.org/keywords/quadratic-equation","display_name":"Quadratic equation","score":0.4524794816970825},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43079453706741333},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4123919606208801},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28044408559799194},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2722387909889221},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23008784651756287},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20264840126037598},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1944935917854309}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8591320514678955},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.8209633827209473},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.7190641164779663},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7148759365081787},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.6486021876335144},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6467725038528442},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.6467472314834595},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5617525577545166},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4673476815223694},{"id":"https://openalex.org/C129844170","wikidata":"https://www.wikidata.org/wiki/Q41299","display_name":"Quadratic equation","level":2,"score":0.4524794816970825},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43079453706741333},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4123919606208801},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28044408559799194},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2722387909889221},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23008784651756287},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20264840126037598},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1944935917854309},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2012.6233894","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6233894","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W879557890","https://openalex.org/W1762781255","https://openalex.org/W2027471022","https://openalex.org/W2038228603","https://openalex.org/W2073628321","https://openalex.org/W2092422002","https://openalex.org/W2132172731","https://openalex.org/W2162538292","https://openalex.org/W2348570704","https://openalex.org/W2352063504","https://openalex.org/W2361003971","https://openalex.org/W2368675187","https://openalex.org/W2389902580","https://openalex.org/W2992073844","https://openalex.org/W3020754154","https://openalex.org/W3141585064","https://openalex.org/W6776871995"],"related_works":["https://openalex.org/W4323528671","https://openalex.org/W4386820853","https://openalex.org/W2094069016","https://openalex.org/W4212859770","https://openalex.org/W2001084165","https://openalex.org/W2955675149","https://openalex.org/W2921955359","https://openalex.org/W3127779352","https://openalex.org/W2160685018","https://openalex.org/W2612301729"],"abstract_inverted_index":{"Privacy-Preserving":[0],"Computational":[1],"Geometry":[2],"(PPCG)":[3],"is":[4,11,54,72],"a":[5,12,21,36,48],"special":[6,22],"Secure":[7],"Multi-party":[8],"Computation,":[9],"which":[10,79],"hot":[13],"research":[14],"in":[15,83],"information":[16],"security.":[17],"This":[18],"paper":[19],"presented":[20],"PPCG":[23],"problem":[24,53],"of":[25],"secure":[26,45],"two-party":[27],"computing":[28],"the":[29,69],"quadratic":[30],"function's":[31],"extreme":[32],"minimal":[33],"value":[34],"on":[35,40],"secret":[37],"interval.":[38],"Based":[39],"Paillier's":[41],"additive":[42],"homomorphic":[43],"and":[44,60,86],"comparison":[46],"protocol,":[47,78],"novel":[49],"protocol":[50,71],"for":[51],"this":[52],"proposed.":[55],"Furthermore,":[56],"its":[57],"correctness,":[58],"security":[59],"efficiency":[61],"are":[62],"analyzed.":[63],"The":[64],"analysis":[65],"results":[66],"show":[67],"that":[68],"proposed":[70],"much":[73],"more":[74],"efficient":[75],"than":[76],"current":[77],"can":[80],"be":[81],"applied":[82],"some":[84],"military":[85],"commercial":[87],"fields.":[88]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
