{"id":"https://openalex.org/W1967745421","doi":"https://doi.org/10.1109/pst.2014.6890957","title":"Generalization of socio-rational secret sharing with a new utility function","display_name":"Generalization of socio-rational secret sharing with a new utility function","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W1967745421","doi":"https://doi.org/10.1109/pst.2014.6890957","mag":"1967745421"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2014.6890957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038458219","display_name":"Mehrdad Nojoumian","orcid":null},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]},{"id":"https://openalex.org/I4210094983","display_name":"ScienceSouth","ror":"https://ror.org/00my6s217","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210094983"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mehrdad Nojoumian","raw_affiliation_strings":["Department of Computer Science, Southern Illinois University, Carbondale, Illinois, USA","Department of Computer Science, Southern Illinois University, Carbondale, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Southern Illinois University, Carbondale, Illinois, USA","institution_ids":["https://openalex.org/I110378019","https://openalex.org/I4210094983"]},{"raw_affiliation_string":"Department of Computer Science, Southern Illinois University, Carbondale, USA#TAB#","institution_ids":["https://openalex.org/I110378019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5038458219"],"corresponding_institution_ids":["https://openalex.org/I110378019","https://openalex.org/I4210094983"],"apc_list":null,"apc_paid":null,"fwci":0.4229,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.732195,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"338","last_page":"341"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.8311096429824829},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.7940642833709717},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6259127259254456},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6092544794082642},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5395011901855469},{"id":"https://openalex.org/keywords/shamirs-secret-sharing","display_name":"Shamir's Secret Sharing","score":0.46005648374557495},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4446495473384857},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4386858642101288},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4356961250305176},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.42270731925964355},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.41616392135620117},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.33722057938575745},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.2598687410354614},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22135645151138306},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17497003078460693},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10427269339561462},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08941146731376648},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06654804944992065}],"concepts":[{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.8311096429824829},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.7940642833709717},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6259127259254456},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6092544794082642},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5395011901855469},{"id":"https://openalex.org/C131755552","wikidata":"https://www.wikidata.org/wiki/Q935125","display_name":"Shamir's Secret Sharing","level":5,"score":0.46005648374557495},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4446495473384857},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4386858642101288},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4356961250305176},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.42270731925964355},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.41616392135620117},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.33722057938575745},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.2598687410354614},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22135645151138306},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17497003078460693},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10427269339561462},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08941146731376648},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06654804944992065},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/pst.2014.6890957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.891.7558","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.891.7558","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.researchgate.net/profile/Mehrdad_Nojoumian/publication/262564194_Generalization_of_Socio-Rational_Secret_Sharing_with_a_New_Utility_Function/links/00b7d5380c5eef28b0000000.pdf?origin%3Dpublication_detail","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.900.383","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.900.383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.researchgate.net/profile/Mehrdad_Nojoumian/publication/262564194_Generalization_of_Socio-Rational_Secret_Sharing_with_a_New_Utility_Function/links/00b7d5380c5eef28b0000000.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.903.3969","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.903.3969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://faculty.eng.fau.edu/nojoumian/Files/SRSExt.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1590835047","https://openalex.org/W1985322847","https://openalex.org/W2141420453","https://openalex.org/W2168325212","https://openalex.org/W2232834728","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W1474916271","https://openalex.org/W2111019861","https://openalex.org/W2363629235","https://openalex.org/W2359201953","https://openalex.org/W2808345767","https://openalex.org/W2388761115","https://openalex.org/W3088939963","https://openalex.org/W2357761884","https://openalex.org/W2611818227"],"abstract_inverted_index":{"Rational":[0],"secret":[1,11,22,33,48,81,101],"sharing":[2,12,49,82],"shows":[3],"that,":[4,93],"in":[5,31,94,106],"a":[6],"setting":[7],"with":[8],"rational":[9,39],"players,":[10],"and":[13,54,83,97],"multiparty":[14],"computation":[15,89],"are":[16,38,42,56],"only":[17,37,57],"possible":[18],"if":[19],"the":[20,28,47,70,87],"actual":[21],"reconstruction":[23],"round":[24],"remains":[25],"unknown":[26],"to":[27,59,72,110],"parties.":[29],"However,":[30],"socio-rational":[32,80,100],"sharing,":[34,102],"players":[35,55,71],"not":[36],"but":[40],"also":[41],"foresighted.":[43],"In":[44],"other":[45],"words,":[46],"game":[50,61],"is":[51,104],"repeatedly":[52],"played":[53],"invited":[58],"each":[60],"based":[62],"on":[63],"their":[64],"reputation.":[65],"This":[66],"social":[67],"reinforcement":[68],"stimulates":[69],"be":[73],"cooperative.":[74],"As":[75],"our":[76,113],"contribution,":[77],"we":[78],"revisit":[79],"generalize":[84],"it":[85,103],"from":[86],"utility":[88,115],"aspect.":[90],"We":[91],"show":[92],"(2;":[95],"2)":[96],"(t;":[98],"n)":[99],"always":[105],"players'":[107],"best":[108],"interest":[109],"cooperate":[111],"using":[112],"new":[114],"function.":[116]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
