{"id":"https://openalex.org/W2331993038","doi":"https://doi.org/10.1109/iscisc.2014.6994042","title":"CR-SMTC: Privacy preserving collusion-resistant multi-party trust computation","display_name":"CR-SMTC: Privacy preserving collusion-resistant multi-party trust computation","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W2331993038","doi":"https://doi.org/10.1109/iscisc.2014.6994042","mag":"2331993038"},"language":"en","primary_location":{"id":"doi:10.1109/iscisc.2014.6994042","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc.2014.6994042","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 11th International ISC Conference on Information Security and Cryptology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059241169","display_name":"Zohre Fath Fathabadi","orcid":null},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Zohre Fath Fathabadi","raw_affiliation_strings":["Dept. of Computer Engineering, Sharif University of Technology Azadi Ave., Tehran, I.R. Iran"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Engineering, Sharif University of Technology Azadi Ave., Tehran, I.R. Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050634368","display_name":"Sadegh Dorri Nogoorani","orcid":"https://orcid.org/0000-0001-7406-112X"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Sadegh Dorri Nogoorani","raw_affiliation_strings":["Data and Network Security Labratory Dept. of Computer Engineering, Sharif University of Technology Azadi Ave., Tehran, I.R. Iran"],"affiliations":[{"raw_affiliation_string":"Data and Network Security Labratory Dept. of Computer Engineering, Sharif University of Technology Azadi Ave., Tehran, I.R. Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021279630","display_name":"Ali Mohammad Afshin Hemmatyar","orcid":"https://orcid.org/0000-0002-5721-0143"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ali Mohammad Hemmatyar","raw_affiliation_strings":["Dept. of Computer Engineering, Sharif University of Technology Azadi Ave., Tehran, I.R. Iran"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Engineering, Sharif University of Technology Azadi Ave., Tehran, I.R. Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059241169"],"corresponding_institution_ids":["https://openalex.org/I133529467"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16112949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5645","issue":null,"first_page":"167","last_page":"172"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.9005165100097656},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6891080737113953},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5621525645256042},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5148143172264099},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.47359421849250793},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43390509486198425},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.43112897872924805},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.26203423738479614},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08794108033180237},{"id":"https://openalex.org/keywords/industrial-organization","display_name":"Industrial organization","score":0.06549492478370667}],"concepts":[{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.9005165100097656},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6891080737113953},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5621525645256042},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5148143172264099},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.47359421849250793},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43390509486198425},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.43112897872924805},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.26203423738479614},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08794108033180237},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.06549492478370667}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscisc.2014.6994042","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc.2014.6994042","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 11th International ISC Conference on Information Security and Cryptology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W49275929","https://openalex.org/W1492093110","https://openalex.org/W1939407039","https://openalex.org/W1967529130","https://openalex.org/W2001336960","https://openalex.org/W2068143382","https://openalex.org/W2097726984","https://openalex.org/W2108100427","https://openalex.org/W2116025923","https://openalex.org/W2154198314","https://openalex.org/W6601974057","https://openalex.org/W6640693739"],"related_works":["https://openalex.org/W2626037032","https://openalex.org/W2953317663","https://openalex.org/W2982321743","https://openalex.org/W2187378813","https://openalex.org/W2182029211","https://openalex.org/W3135360054","https://openalex.org/W2894066856","https://openalex.org/W4226389227","https://openalex.org/W2790147482","https://openalex.org/W4254949086"],"abstract_inverted_index":{"The":[0],"ever-increasing":[1],"use":[2],"of":[3,16,22,27,33,50,76,82,99,128,151],"trust":[4,23,62],"and":[5,69,89,103,120,130,145],"reputation":[6],"models":[7],"has":[8],"posed":[9],"new":[10],"challenges":[11,18],"in":[12,149],"distributed":[13],"environments.":[14],"One":[15],"these":[17],"is":[19,31,80,109,125,132],"the":[20,34,51,74,126,133],"computation":[21,63],"while":[24],"preserving":[25],"privacy":[26,75],"feedback":[28],"providers.":[29],"This":[30],"because":[32],"fact":[35],"that":[36],"some":[37],"people":[38],"may":[39],"report":[40],"a":[41,58,110],"dishonest":[42],"value":[43],"due":[44],"to":[45,72,97,101],"social":[46],"pressure":[47],"or":[48],"fear":[49],"consequences.":[52],"In":[53,113],"this":[54],"paper,":[55],"we":[56],"propose":[57],"privacy-preserving":[59],"collusion-resistant":[60],"multi-party":[61],"scheme":[64,79],"which":[65],"uses":[66],"data":[67],"perturbation":[68],"homomorphic":[70,134],"encryption":[71,135],"preserve":[73],"feedbacks.":[77],"Our":[78,93],"consisted":[81],"two":[83],"protocols":[84,94,141],"for":[85],"private":[86],"summation":[87],"(S-protocol)":[88],"inner":[90],"product":[91],"(P-protocol).":[92],"are":[95,118],"resistant":[96],"collusion":[98],"up":[100],"m+1":[102],"m+2":[104],"agents,":[105],"respectively,":[106,122],"where":[107,123],"m":[108],"configurable":[111],"parameter.":[112],"addition,":[114],"their":[115],"computational":[116],"complexities":[117],"O(nm)":[119],"O(n(m+h)),":[121],"n":[124],"number":[127],"agents":[129],"h":[131],"algorithm":[136],"complexity.":[137,157],"We":[138],"compare":[139],"our":[140],"with":[142],"related":[143],"works":[144],"show":[146],"its":[147],"superiority":[148],"terms":[150],"collusion-resilience":[152],"probability":[153],"as":[154,156],"well":[155]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
