{"id":"https://openalex.org/W2547665653","doi":"https://doi.org/10.1109/idt.2015.7396726","title":"Obfuscated arbitrary computation using cryptographic primitives","display_name":"Obfuscated arbitrary computation using cryptographic primitives","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2547665653","doi":"https://doi.org/10.1109/idt.2015.7396726","mag":"2547665653"},"language":"en","primary_location":{"id":"doi:10.1109/idt.2015.7396726","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idt.2015.7396726","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Design &amp; Test Symposium (IDT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064496184","display_name":"Nektarios Georgios Tsoutsos","orcid":"https://orcid.org/0000-0002-5769-0124"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nektarios Georgios Tsoutsos","raw_affiliation_strings":["New York University, New York, NY, US"],"affiliations":[{"raw_affiliation_string":"New York University, New York, NY, US","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043325974","display_name":"Michail Maniatakos","orcid":"https://orcid.org/0000-0001-6899-0651"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michail Maniatakos","raw_affiliation_strings":["Electrical and Computer Engineering, New York University Abu Dhabi"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, New York University Abu Dhabi","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064496184"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17939031,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"5","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8953733444213867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8141034841537476},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7018078565597534},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6432960033416748},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6038314700126648},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5890237092971802},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5627097487449646},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5567764043807983},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.49591264128685},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4819492995738983},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.441241979598999},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.43895968794822693},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.4133601188659668},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28319135308265686},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2229282259941101},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.18416652083396912},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11211225390434265},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09236553311347961}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8953733444213867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8141034841537476},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7018078565597534},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6432960033416748},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6038314700126648},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5890237092971802},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5627097487449646},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5567764043807983},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.49591264128685},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4819492995738983},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.441241979598999},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.43895968794822693},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.4133601188659668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28319135308265686},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2229282259941101},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.18416652083396912},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11211225390434265},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09236553311347961},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idt.2015.7396726","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idt.2015.7396726","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Design &amp; Test Symposium (IDT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W199868102","https://openalex.org/W774911181","https://openalex.org/W1564514837","https://openalex.org/W1567046609","https://openalex.org/W1877577203","https://openalex.org/W1900357389","https://openalex.org/W1984641795","https://openalex.org/W1998188195","https://openalex.org/W2004814164","https://openalex.org/W2011356012","https://openalex.org/W2031533839","https://openalex.org/W2045579038","https://openalex.org/W2084441964","https://openalex.org/W2085933309","https://openalex.org/W2092422002","https://openalex.org/W2101992994","https://openalex.org/W2102075452","https://openalex.org/W2120596458","https://openalex.org/W2124873267","https://openalex.org/W2125730340","https://openalex.org/W2132172731","https://openalex.org/W2136530453","https://openalex.org/W2148888468","https://openalex.org/W2152926062","https://openalex.org/W2159460804","https://openalex.org/W3141585064","https://openalex.org/W4237569313","https://openalex.org/W4237773356","https://openalex.org/W4246563487","https://openalex.org/W6633770525","https://openalex.org/W6634033044","https://openalex.org/W6639359801","https://openalex.org/W6677679063"],"related_works":["https://openalex.org/W4316659877","https://openalex.org/W2601739120","https://openalex.org/W3035389378","https://openalex.org/W2607647996","https://openalex.org/W3212491810","https://openalex.org/W3157882375","https://openalex.org/W2363701519","https://openalex.org/W2947510282","https://openalex.org/W2292786713","https://openalex.org/W2585986919"],"abstract_inverted_index":{"The":[0],"breakthrough":[1],"of":[2,55,96],"fully":[3],"homomorphic":[4,46,56,92],"encryption":[5,47,93],"(FHE)":[6],"enables":[7],"privacy-preserving":[8,108],"arbitrary":[9,60],"computation":[10,61,73],"in":[11,110],"the":[12,111],"cloud,":[13],"supporting":[14],"both":[15],"addition":[16],"and":[17,31,58],"multiplication":[18],"over":[19,84],"encrypted":[20,85],"data.":[21],"Current":[22],"FHE":[23],"implementations,":[24],"however,":[25],"suffer":[26],"from":[27],"high":[28],"performance":[29],"overheads":[30],"require":[32],"expensive":[33,99],"boot-strapping":[34],"operations":[35,57],"to":[36,80],"decrease":[37],"ciphertext":[38],"noise.":[39],"In":[40],"this":[41],"work,":[42],"we":[43],"discuss":[44],"how":[45],"primitives":[48],"can":[49,103],"implement":[50],"a":[51,66],"functionally":[52],"complete":[53],"set":[54],"enable":[59,81],"that":[62],"is":[63,94],"outsourced":[64],"by":[65],"single":[67],"party.":[68],"We":[69],"focus":[70],"on":[71],"obfuscated":[72],"with":[74],"or":[75],"without":[76],"special":[77],"look-up":[78],"tables,":[79],"branch":[82],"decisions":[83],"values":[86],"while":[87],"preserving":[88],"privacy.":[89],"Since":[90],"partial":[91],"orders":[95],"magnitude":[97],"less":[98],"than":[100],"FHE,":[101],"it":[102],"be":[104],"more":[105],"practical":[106],"for":[107],"applications":[109],"cloud.":[112]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
