{"id":"https://openalex.org/W2056185112","doi":"https://doi.org/10.1109/iscc.2010.5546716","title":"Relation of PPAtMP and scalar product protocol and their applications","display_name":"Relation of PPAtMP and scalar product protocol and their applications","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2056185112","doi":"https://doi.org/10.1109/iscc.2010.5546716","mag":"2056185112"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2010.5546716","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2010.5546716","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The IEEE symposium on Computers and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100750950","display_name":"Youwen Zhu","orcid":"https://orcid.org/0000-0003-4365-9713"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Youwen Zhu","raw_affiliation_strings":["University of Science and Technology of China, Hefei, Anhui, CN","National High Performance Computing Center at Hefei, Department of Computer Science and Technology, University of Science and Technology of China, 230026, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China, Hefei, Anhui, CN","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"National High Performance Computing Center at Hefei, Department of Computer Science and Technology, University of Science and Technology of China, 230026, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019604942","display_name":"Liusheng Huang","orcid":"https://orcid.org/0000-0001-8417-3256"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liusheng Huang","raw_affiliation_strings":["University of Science and Technology of China, Hefei, Anhui, CN","National High Performance Computing Center at Hefei, Department of Computer Science and Technology, University of Science and Technology of China, 230026, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China, Hefei, Anhui, CN","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"National High Performance Computing Center at Hefei, Department of Computer Science and Technology, University of Science and Technology of China, 230026, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111867769","display_name":"Wei Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yang","raw_affiliation_strings":["University of Science and Technology of China, Hefei, Anhui, CN","National High Performance Computing Center at Hefei, Department of Computer Science and Technology, University of Science and Technology of China, 230026, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China, Hefei, Anhui, CN","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"National High Performance Computing Center at Hefei, Department of Computer Science and Technology, University of Science and Technology of China, 230026, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100750950"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":1.3531,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84363591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"3506","issue":null,"first_page":"184","last_page":"189"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7786848545074463},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7462482452392578},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.7085181474685669},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6697824001312256},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5913755297660828},{"id":"https://openalex.org/keywords/scalar","display_name":"Scalar (mathematics)","score":0.5743581652641296},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5725257992744446},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5285680890083313},{"id":"https://openalex.org/keywords/communication-complexity","display_name":"Communication complexity","score":0.5146275758743286},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.4861680865287781},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4767240583896637},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.4206240177154541},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.4113415479660034},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36404621601104736},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3427565097808838},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2990170419216156},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2479289174079895},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22490468621253967}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7786848545074463},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7462482452392578},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.7085181474685669},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6697824001312256},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5913755297660828},{"id":"https://openalex.org/C57691317","wikidata":"https://www.wikidata.org/wiki/Q1289248","display_name":"Scalar (mathematics)","level":2,"score":0.5743581652641296},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5725257992744446},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5285680890083313},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.5146275758743286},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.4861680865287781},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4767240583896637},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.4206240177154541},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4113415479660034},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36404621601104736},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3427565097808838},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2990170419216156},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2479289174079895},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22490468621253967},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2010.5546716","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2010.5546716","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The IEEE symposium on Computers and Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1488526968","https://openalex.org/W1528076390","https://openalex.org/W1552158811","https://openalex.org/W1871114411","https://openalex.org/W2083847133","https://openalex.org/W2092422002","https://openalex.org/W2093367651","https://openalex.org/W2099254566","https://openalex.org/W2132172731","https://openalex.org/W2136195300","https://openalex.org/W2149998042","https://openalex.org/W2160321046","https://openalex.org/W3141585064","https://openalex.org/W4233906786","https://openalex.org/W4248358572","https://openalex.org/W6629139986","https://openalex.org/W6631628602","https://openalex.org/W6632937542","https://openalex.org/W6639200140","https://openalex.org/W6679763910"],"related_works":["https://openalex.org/W2382527959","https://openalex.org/W2083701517","https://openalex.org/W2182952131","https://openalex.org/W2343374647","https://openalex.org/W1487501992","https://openalex.org/W1587595757","https://openalex.org/W1458516385","https://openalex.org/W1511450293","https://openalex.org/W3031847131","https://openalex.org/W2930832027"],"abstract_inverted_index":{"Scalar":[0],"product":[1,71],"protocol":[2,9,72,88],"and":[3,33,46,62,73,83],"privacy":[4],"preserving":[5],"add":[6],"to":[7,30],"multiply":[8],"(PPAtMP)":[10],"are":[11,28],"two":[12,26],"significant":[13],"basic":[14],"secure":[15],"multiparty":[16],"computation":[17,47,84],"protocols.":[18],"In":[19],"this":[20,91],"paper,":[21],"we":[22,34,50,76],"claim":[23],"that":[24],"the":[25,40,43,78],"protocols":[27],"equivalent":[29],"each":[31,87],"other":[32,41],"can":[35],"achieve":[36],"one":[37],"based":[38,68],"on":[39,69],"with":[42],"same":[44],"communication":[45,81],"complexity.":[48],"Then,":[49],"propose":[51],"Secure":[52,56,63],"Two-party":[53],"Mean":[54],"Protocol,":[55],"Shared":[57,64],"x":[58,60],"ln":[59],"Protocol":[61,67],"Generic":[65],"Polynomial":[66],"scalar":[70],"PPAtMP.":[74],"Additionally,":[75],"analyze":[77],"correctness,":[79],"security,":[80],"overheads":[82],"complexity":[85],"of":[86],"proposed":[89],"in":[90],"paper.":[92]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
