{"id":"https://openalex.org/W4415366729","doi":"https://doi.org/10.1109/isit63088.2025.11195695","title":"Individual Confidential Computing of Polynomials Over Non-Uniform Information","display_name":"Individual Confidential Computing of Polynomials Over Non-Uniform Information","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4415366729","doi":"https://doi.org/10.1109/isit63088.2025.11195695"},"language":null,"primary_location":{"id":"doi:10.1109/isit63088.2025.11195695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003087558","display_name":"Saar Tarnopolsky","orcid":null},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Saar Tarnopolsky","raw_affiliation_strings":["Technion,Faculty of ECE,Israel"],"affiliations":[{"raw_affiliation_string":"Technion,Faculty of ECE,Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101201550","display_name":"Zirui Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zirui Deng","raw_affiliation_strings":["Washington University in St. Louis,Department of Computer Science and Engineering,St. Louis,USA"],"affiliations":[{"raw_affiliation_string":"Washington University in St. Louis,Department of Computer Science and Engineering,St. Louis,USA","institution_ids":["https://openalex.org/I204465549"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091221122","display_name":"Vinayak Ramkumar","orcid":"https://orcid.org/0000-0001-5223-5643"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Vinayak Ramkumar","raw_affiliation_strings":["Tel Aviv University,Department of Electrical Engineering-Systems,Israel"],"affiliations":[{"raw_affiliation_string":"Tel Aviv University,Department of Electrical Engineering-Systems,Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048888817","display_name":"Netanel Raviv","orcid":"https://orcid.org/0000-0002-1686-1994"},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Netanel Raviv","raw_affiliation_strings":["Washington University in St. Louis,Department of Computer Science and Engineering,St. Louis,USA"],"affiliations":[{"raw_affiliation_string":"Washington University in St. Louis,Department of Computer Science and Engineering,St. Louis,USA","institution_ids":["https://openalex.org/I204465549"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033417463","display_name":"Alejandro Cohen","orcid":"https://orcid.org/0000-0002-5664-2518"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Alejandro Cohen","raw_affiliation_strings":["Technion,Faculty of ECE,Israel"],"affiliations":[{"raw_affiliation_string":"Technion,Faculty of ECE,Israel","institution_ids":["https://openalex.org/I174306211"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5003087558"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":1.428,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86649071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9355000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9355000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13234","display_name":"advanced mathematical theories","score":0.9081000089645386,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5358999967575073},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.49000000953674316},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4555000066757202},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.45019999146461487},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.43299999833106995},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.41850000619888306},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39340001344680786},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.39340001344680786}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7610999941825867},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5358999967575073},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.534500002861023},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.49000000953674316},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4555000066757202},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.45019999146461487},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43299999833106995},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.41850000619888306},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.39340001344680786},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39340001344680786},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3659000098705292},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.365200012922287},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3594000041484833},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.35580000281333923},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.30559998750686646},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30320000648498535},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2549999952316284},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.2542000114917755},{"id":"https://openalex.org/C24885549","wikidata":"https://www.wikidata.org/wiki/Q339678","display_name":"Distributed data store","level":2,"score":0.2535000145435333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit63088.2025.11195695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1492657530","https://openalex.org/W1493407996","https://openalex.org/W1516512945","https://openalex.org/W1622686296","https://openalex.org/W1992263322","https://openalex.org/W1994790157","https://openalex.org/W2012425097","https://openalex.org/W2109394932","https://openalex.org/W2233233025","https://openalex.org/W2268702383","https://openalex.org/W2515654213","https://openalex.org/W2606226906","https://openalex.org/W2911978475","https://openalex.org/W2962741900","https://openalex.org/W2962852249","https://openalex.org/W2990835654","https://openalex.org/W3007714448","https://openalex.org/W3121783531","https://openalex.org/W3159718887","https://openalex.org/W3214376792","https://openalex.org/W4226465233","https://openalex.org/W4289655453","https://openalex.org/W4376851350","https://openalex.org/W4395078210","https://openalex.org/W4401693220","https://openalex.org/W4401693707","https://openalex.org/W4415366729"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,51],"address":[4],"the":[5,39,72,127,132],"problem":[6],"of":[7,74,105,108],"secure":[8,94],"distributed":[9],"computation":[10],"in":[11,33],"scenarios":[12],"where":[13],"user":[14,109],"data":[15,34,47,66,86,110],"is":[16,29],"not":[17,116],"uniformly":[18],"distributed,":[19],"extending":[20],"existing":[21],"frameworks":[22],"that":[23,28,56,102],"assume":[24],"uniformity,":[25],"an":[26],"assumption":[27],"challenging":[30],"to":[31,83,111,118,126],"enforce":[32],"for":[35,46,61],"computation.":[36,95],"Motivated":[37],"by":[38],"pervasive":[40],"reliance":[41],"on":[42],"single":[43],"service":[44,113],"providers":[45],"storage":[48],"and":[49,78,93,100],"computation,":[50],"propose":[52],"a":[53],"privacy-preserving":[54],"scheme":[55],"achieves":[57],"informationtheoretic":[58],"security":[59],"guarantees":[60],"computing":[62],"polynomials":[63],"over":[64],"non-uniform":[65,85],"distributions.":[67],"Our":[68],"framework":[69],"builds":[70],"upon":[71],"concept":[73],"perfect":[75],"subset":[76,107],"privacy":[77],"employs":[79],"linear":[80],"hashing":[81],"techniques":[82],"transform":[84],"into":[87],"approximately":[88],"uniform":[89],"distributions,":[90],"enabling":[91],"robust":[92],"We":[96],"derive":[97],"leakage":[98,104],"bounds":[99],"demonstrate":[101],"information":[103],"any":[106],"untrusted":[112],"providers,":[114],"i.e.,":[115],"only":[117],"colluding":[119],"workers":[120],"but":[121],"also":[122],"(and":[123],"more":[124],"importantly)":[125],"admin,":[128],"remains":[129],"negligible":[130],"under":[131],"proposed":[133],"scheme.":[134]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-21T00:00:00"}
