{"id":"https://openalex.org/W3006115454","doi":"https://doi.org/10.1109/iscc50000.2020.9219588","title":"Efficient Cloud-based Secret Shuffling via Homomorphic Encryption","display_name":"Efficient Cloud-based Secret Shuffling via Homomorphic Encryption","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3006115454","doi":"https://doi.org/10.1109/iscc50000.2020.9219588","mag":"3006115454"},"language":"en","primary_location":{"id":"doi:10.1109/iscc50000.2020.9219588","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2002.05231","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021321700","display_name":"Kilian Becher","orcid":null},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Kilian Becher","raw_affiliation_strings":["Chair of Privacy and Data Security, TU Dresden, Dresden, Germany","Dresden University of Technology"],"affiliations":[{"raw_affiliation_string":"Chair of Privacy and Data Security, TU Dresden, Dresden, Germany","institution_ids":["https://openalex.org/I78650965"]},{"raw_affiliation_string":"Dresden University of Technology","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053465128","display_name":"Thorsten Strufe","orcid":"https://orcid.org/0000-0002-8723-9692"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thorsten Strufe","raw_affiliation_strings":["Chair of IT Security, Karlsruhe Institute of Technology, Karlsruhe, Germany","Karlsruhe Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Chair of IT Security, Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]},{"raw_affiliation_string":"Karlsruhe Institute of Technology","institution_ids":["https://openalex.org/I102335020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021321700"],"corresponding_institution_ids":["https://openalex.org/I78650965"],"apc_list":null,"apc_paid":null,"fwci":0.14685955,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51095855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.9798390865325928},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9161685705184937},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7261174917221069},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6733829975128174},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.6229995489120483},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5382395386695862},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5279281139373779},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.4641937017440796},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4637247920036316},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.4607689380645752},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.44927605986595154},{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.4321712851524353},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4298448860645294},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42110028862953186},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37625399231910706},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.07875657081604004}],"concepts":[{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.9798390865325928},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9161685705184937},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7261174917221069},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6733829975128174},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.6229995489120483},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5382395386695862},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5279281139373779},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.4641937017440796},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4637247920036316},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.4607689380645752},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.44927605986595154},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.4321712851524353},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4298448860645294},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42110028862953186},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37625399231910706},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.07875657081604004},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/iscc50000.2020.9219588","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2002.05231","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2002.05231","pdf_url":"https://arxiv.org/pdf/2002.05231","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:3006115454","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/2002.05231v1","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.2002.05231","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2002.05231","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"doi:10.5445/ir/1000126316","is_oa":true,"landing_page_url":"https://doi.org/10.5445/ir/1000126316","pdf_url":null,"source":{"id":"https://openalex.org/S7407052948","display_name":"KITopen","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2002.05231","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2002.05231","pdf_url":"https://arxiv.org/pdf/2002.05231","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3006115454.pdf","grobid_xml":"https://content.openalex.org/works/W3006115454.grobid-xml"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W64163362","https://openalex.org/W150396298","https://openalex.org/W233279079","https://openalex.org/W655626130","https://openalex.org/W1498994266","https://openalex.org/W1504707014","https://openalex.org/W1544327602","https://openalex.org/W1557302011","https://openalex.org/W1676299812","https://openalex.org/W1827368922","https://openalex.org/W1892798954","https://openalex.org/W1988374166","https://openalex.org/W1996360405","https://openalex.org/W2102447036","https://openalex.org/W2103647628","https://openalex.org/W2122932595","https://openalex.org/W2132172731","https://openalex.org/W2145801920","https://openalex.org/W2156186849","https://openalex.org/W2177209050","https://openalex.org/W2293776292","https://openalex.org/W2397423248","https://openalex.org/W2399464053","https://openalex.org/W2604969030","https://openalex.org/W2734843535","https://openalex.org/W2735633731","https://openalex.org/W2739593958","https://openalex.org/W2761138375","https://openalex.org/W2790009648","https://openalex.org/W3094121318","https://openalex.org/W3102891118","https://openalex.org/W3141405531","https://openalex.org/W3145128584","https://openalex.org/W4232836212","https://openalex.org/W4285719527","https://openalex.org/W6648582084","https://openalex.org/W6675508335","https://openalex.org/W6712237015","https://openalex.org/W6712772882","https://openalex.org/W6792122415"],"related_works":["https://openalex.org/W2041698954","https://openalex.org/W2889177468","https://openalex.org/W2950928688","https://openalex.org/W3095111708","https://openalex.org/W2596052863","https://openalex.org/W2517003458","https://openalex.org/W2775092973","https://openalex.org/W2913287985","https://openalex.org/W3004172225","https://openalex.org/W2803760014","https://openalex.org/W2967652131","https://openalex.org/W3122242314","https://openalex.org/W2970880934","https://openalex.org/W2896217228","https://openalex.org/W2610479618","https://openalex.org/W3129529823","https://openalex.org/W2946302801","https://openalex.org/W2623241812","https://openalex.org/W2740840499","https://openalex.org/W2886707668"],"abstract_inverted_index":{"When":[0],"working":[1],"with":[2,57,100,116],"joint":[3],"collections":[4],"of":[5,75,78,81,92,130,135],"confidential":[6,28],"data":[7,21,31,41,83,109],"from":[8],"multiple":[9],"sources,":[10],"e.g.,":[11],"in":[12,55],"cloud-based":[13],"multi-party":[14,49],"computation":[15,50],"scenarios,":[16],"the":[17,40,45,73,76,93,97],"ownership":[18],"relation":[19],"between":[20,90],"providers":[22],"and":[23,96,120],"their":[24],"inputs":[25],"itself":[26],"is":[27,129],"information.":[29],"Protecting":[30],"providers'":[32],"privacy":[33],"desires":[34],"a":[35,58,63,79,125,133],"function":[36],"for":[37,52,107,132],"secretly":[38],"shuffling":[39,54,108],"collection.":[42],"We":[43],"present":[44],"first":[46],"efficient":[47],"secure":[48],"protocol":[51],"secret":[53],"scenarios":[56],"central":[59],"server.":[60],"Based":[61],"on":[62],"novel":[64],"approach":[65],"to":[66],"random":[67],"index":[68],"distribution,":[69],"our":[70],"solution":[71],"enables":[72],"randomization":[74],"order":[77],"sequence":[80,95,99],"encrypted":[82,110],"such":[84],"that":[85],"no":[86],"observer":[87],"can":[88],"map":[89],"elements":[91],"original":[94],"shuffled":[98],"probability":[101],"better":[102],"than":[103],"guessing.":[104],"It":[105],"allows":[106],"under":[111],"an":[112],"additively":[113],"homomorphic":[114],"cryptosystem":[115],"constant":[117],"round":[118],"complexity":[119],"linear":[121],"computational":[122],"complexity.":[123],"Being":[124],"general-purpose":[126],"protocol,":[127],"it":[128],"relevance":[131],"variety":[134],"practical":[136],"use":[137],"cases.":[138]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
