{"id":"https://openalex.org/W4247861941","doi":"https://doi.org/10.1109/glocom.2014.7417743","title":"An Efficient, Privacy-Preserving, and Verifiable Online Auction Mechanism for Ad Exchanges","display_name":"An Efficient, Privacy-Preserving, and Verifiable Online Auction Mechanism for Ad Exchanges","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W4247861941","doi":"https://doi.org/10.1109/glocom.2014.7417743"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2014.7417743","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2014.7417743","pdf_url":null,"source":{"id":"https://openalex.org/S4363607712","display_name":"2015 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079307419","display_name":"Minping Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Minping Zhou","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103086027","display_name":"Chaoyue Niu","orcid":"https://orcid.org/0000-0002-1650-4233"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaoyue Niu","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050396482","display_name":"Zhenzhe Zheng","orcid":"https://orcid.org/0000-0003-3447-5349"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenzhe Zheng","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100380478","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0001-5051-3005"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Wu","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100428808","display_name":"Guihai Chen","orcid":"https://orcid.org/0000-0002-6934-1685"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guihai Chen","raw_affiliation_strings":["Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5079307419"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.45580978,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8062613010406494},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7834327220916748},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6199771761894226},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6099149584770203},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5392768383026123},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.5202297568321228},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44172945618629456},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.44151145219802856},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4152452349662781},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34269315004348755},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2437456250190735},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.07429203391075134}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8062613010406494},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7834327220916748},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6199771761894226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6099149584770203},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5392768383026123},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.5202297568321228},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44172945618629456},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.44151145219802856},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4152452349662781},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34269315004348755},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2437456250190735},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.07429203391075134},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2014.7417743","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2014.7417743","pdf_url":null,"source":{"id":"https://openalex.org/S4363607712","display_name":"2015 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W69568143","https://openalex.org/W1486625459","https://openalex.org/W1554763265","https://openalex.org/W1561414761","https://openalex.org/W1599852298","https://openalex.org/W1984808769","https://openalex.org/W2040168265","https://openalex.org/W2056788611","https://openalex.org/W2065487715","https://openalex.org/W2080911030","https://openalex.org/W2096270679","https://openalex.org/W2132172731","https://openalex.org/W2133948077","https://openalex.org/W2154496743","https://openalex.org/W2630413468","https://openalex.org/W6628863016"],"related_works":["https://openalex.org/W4386820853","https://openalex.org/W4390887375","https://openalex.org/W2094069016","https://openalex.org/W4212859770","https://openalex.org/W1484081998","https://openalex.org/W3036675567","https://openalex.org/W2955273252","https://openalex.org/W2518050971","https://openalex.org/W1507098372","https://openalex.org/W2092515448"],"abstract_inverted_index":{"Ad":[0,18],"exchanges":[1,19],"are":[2,61],"kind":[3],"of":[4,128,148,160],"the":[5,16,24,38,42,45,50,59,73,81,137,146,158],"most":[6],"popular":[7],"online":[8,98],"advertising":[9],"marketplaces":[10],"for":[11,101],"trading":[12],"ad":[13,25,39,102,175],"spaces":[14,26],"over":[15],"Internet.":[17],"run":[20],"auctions":[21],"to":[22,30,34,65,112],"sell":[23],"on":[27,37,136],"publishers'":[28],"web-pages":[29],"advertisers,":[31],"who":[32],"want":[33],"display":[35],"ads":[36],"spaces.":[40],"However,":[41],"parties":[43],"in":[44,72,173],"auction":[46,51,82,99],"cannot":[47],"check":[48],"whether":[49],"is":[52,92,134],"carried":[53],"out":[54],"correctly":[55],"or":[56],"not.":[57],"Furthermore,":[58],"advertisers":[60],"usually":[62],"not":[63],"willing":[64],"reveal":[66],"their":[67],"sensitive":[68],"information":[69],"when":[70],"participating":[71],"auction.":[74],"In":[75],"this":[76],"paper,":[77],"we":[78],"jointly":[79],"consider":[80],"verifiability":[83,117,161],"and":[84,88,96,115,125,150,162],"advertisers'":[85],"privacy":[86],"preservation,":[87],"propose":[89],"ERA,":[90,149],"which":[91,133],"an":[93,106],"Efficient,":[94],"pRivacy-preserving,":[95],"verifiAble":[97],"mechanism":[100],"exchanges.":[103,176],"ERA":[104,156,168],"exploits":[105],"Order":[107],"Preserving":[108],"Encryption":[109,140],"Scheme":[110,141],"(OPES)":[111],"guarantee":[113],"privacy-preservation,":[114],"achieves":[116],"by":[118],"integrating":[119],"a":[120,126],"Certified":[121],"Bulletin":[122],"Board":[123],"(CBB)":[124],"protocol":[127],"Privacy-Preserving":[129],"Integer":[130],"Comparison":[131],"(PPIC),":[132],"based":[135],"Paillier's":[138],"Homomorphic":[139],"(PHES).":[142],"We":[143],"extensively":[144],"evaluate":[145],"performance":[147],"our":[151],"evaluation":[152],"results":[153],"show":[154],"that":[155],"satisfies":[157],"properties":[159],"privacy-preservation":[163],"with":[164],"low":[165],"overhead,":[166],"so":[167],"can":[169],"be":[170],"easily":[171],"deployed":[172],"today's":[174]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
