{"id":"https://openalex.org/W2031648986","doi":"https://doi.org/10.1109/itw.2012.6404657","title":"An information-theoretic protocol compiler","display_name":"An information-theoretic protocol compiler","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W2031648986","doi":"https://doi.org/10.1109/itw.2012.6404657","mag":"2031648986"},"language":"en","primary_location":{"id":"doi:10.1109/itw.2012.6404657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2012.6404657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Information Theory Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103835895","display_name":"Amit Sahai","orcid":"https://orcid.org/0000-0003-2216-9600"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amit Sahai","raw_affiliation_strings":["Dept. of Computer Science, UCLA, Los Angeles, CA","Dept. of Computer Science, UCLA, Los Angeles, CA 90095, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, UCLA, Los Angeles, CA","institution_ids":[]},{"raw_affiliation_string":"Dept. of Computer Science, UCLA, Los Angeles, CA 90095, USA","institution_ids":["https://openalex.org/I161318765"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5103835895"],"corresponding_institution_ids":["https://openalex.org/I161318765"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09266741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7794632911682129},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.7300822138786316},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5615811347961426},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4498327672481537}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7794632911682129},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.7300822138786316},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5615811347961426},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4498327672481537},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw.2012.6404657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2012.6404657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Information Theory Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W173953576","https://openalex.org/W1487501992","https://openalex.org/W1488169517","https://openalex.org/W1560201081","https://openalex.org/W1603973540","https://openalex.org/W1965492831","https://openalex.org/W1980227445","https://openalex.org/W1982146060","https://openalex.org/W1987667503","https://openalex.org/W1996068512","https://openalex.org/W1999522397","https://openalex.org/W2006453614","https://openalex.org/W2011112377","https://openalex.org/W2027471022","https://openalex.org/W2047539027","https://openalex.org/W2080911030","https://openalex.org/W2087811006","https://openalex.org/W2098487689","https://openalex.org/W2119422255","https://openalex.org/W2144752539","https://openalex.org/W2164987725","https://openalex.org/W2167236842","https://openalex.org/W2233233025","https://openalex.org/W6606928740","https://openalex.org/W6633312341","https://openalex.org/W6645909193","https://openalex.org/W6677934245","https://openalex.org/W6683880444","https://openalex.org/W6684501058"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4240253816","https://openalex.org/W3096456556","https://openalex.org/W2169584677","https://openalex.org/W1713081424","https://openalex.org/W2127315869","https://openalex.org/W1523769955","https://openalex.org/W2245390655","https://openalex.org/W4379536100"],"abstract_inverted_index":{"One":[0],"of":[1,43,60,148,169,176,188,227,243,254,270,304,310,323],"the":[2,41,63,73,81,113,120,146,163,167,186,236,241,246,268,275],"most":[3],"fundamental":[4],"goals":[5],"in":[6,20,135,179,229,267,330],"cryptography":[7,289],"is":[8,249],"to":[9,47,152,235,251],"design":[10,110],"protocols":[11,46,49,91,130,151,154,178,195,211,298,316,335],"that":[12,50,116,155,212],"remain":[13],"secure":[14,45,108,150,271,288,313],"when":[15],"adversarial":[16],"participants":[17,189],"can":[18,196],"engage":[19],"arbitrary":[21],"malicious":[22],"behavior.":[23],"In":[24,97,233,273],"1986,":[25],"Goldreich,":[26],"Micali,":[27],"and":[28,123,172,231,281,292,312,314],"Wigderson":[29],"presented":[30],"a":[31,102,125,180,220,225,301,307,320],"powerful":[32],"paradigm":[33,65,83,209,248],"for":[34,84,107,127,285,299],"designing":[35,44,48,149,153],"such":[36,334],"protocols:":[37],"their":[38],"approach":[39,78,143,165],"reduced":[40],"task":[42,147],"only":[51,156,318],"guarantee":[52,157],"security":[53,133,158,200],"against":[54,159],"\u201chonest-but-curious\u201d":[55],"participants.":[56,161],"By":[57],"making":[58],"use":[59,168,175,242,322],"zero-knowledge":[61,90,170,244],"proofs,":[62,171,245],"GMW":[64,121,237],"enforces":[66],"honest":[67,192],"behavior":[68],"without":[69,202],"compromising":[70],"secrecy.":[71],"Over":[72],"past":[74],"two":[75],"decades,":[76],"this":[77,98],"has":[79],"been":[80],"dominant":[82],"cryptographic":[85,324],"protocol":[86,109],"design,":[87],"based":[88,92],"on":[89,93,214,290],"computational":[94],"hardness":[95],"assumptions.":[96],"work,":[99],"we":[100],"describe":[101],"new":[103,142,164],"general":[104],"paradigm/protocol":[105],"compiler":[106,277],"known":[111,337],"as":[112,219,258],"IPS":[114,208,247,276],"compiler,":[115],"departs":[117],"considerably":[118],"from":[119],"framework,":[122],"provides":[124],"method":[126],"obtaining":[128],"efficient":[129,283,297,315],"with":[131,198],"information-theoretic":[132,199],"guarantees":[134,201],"settings":[136,331],"where":[137,185,332],"appropriate":[138],"channels":[139,217],"exist.":[140],"This":[141,223,261],"also":[144],"reduces":[145],"honest-but-curious":[160],"However,":[162],"avoids":[166],"instead":[173],"makes":[174],"multi-party":[177,194],"much":[181],"simpler":[182,280],"setting":[183],"-":[184],"majority":[187],"are":[190],"completely":[191],"(such":[193],"exist":[197],"assuming":[203],"any":[204],"special":[205],"channels).":[206],"The":[207],"yields":[210,278],"rely":[213],"Oblivious":[215],"Transfer":[216],"(OT)":[218],"building":[221,256],"block.":[222],"offers":[224],"number":[226,303,309],"advantages":[228],"generality":[230],"efficiency.":[232],"contrast":[234],"paradigm,":[238],"by":[239],"avoiding":[240],"able":[250],"treat":[252],"all":[253],"its":[255],"blocks":[257],"\u201cblack":[259],"boxes\u201d.":[260],"allows":[262],"improvement":[263],"over":[264],"previous":[265],"results":[266],"area":[269],"computation.":[272],"particular,":[274],"conceptually":[279],"more":[282,296],"ways":[284],"basing":[286],"unconditionally":[287],"OT":[291],"other":[293],"noisy":[294],"channels;":[295],"generating":[300],"large":[302],"OTs":[305],"using":[306],"small":[308],"OTs;":[311],"which":[317],"make":[319],"blackbox":[321],"primitives":[325],"or":[326],"underlying":[327],"algebraic":[328],"structures":[329],"no":[333],"were":[336],"before.":[338]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
