{"id":"https://openalex.org/W4384948596","doi":"https://doi.org/10.1109/sp46215.2023.10179295","title":"Private Access Control for Function Secret Sharing","display_name":"Private Access Control for Function Secret Sharing","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4384948596","doi":"https://doi.org/10.1109/sp46215.2023.10179295"},"language":"en","primary_location":{"id":"doi:10.1109/sp46215.2023.10179295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46215.2023.10179295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072913052","display_name":"Sacha Servan-Schreiber","orcid":"https://orcid.org/0000-0001-8359-5510"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sacha Servan-Schreiber","raw_affiliation_strings":["MIT CSAIL"],"affiliations":[{"raw_affiliation_string":"MIT CSAIL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092512393","display_name":"Simon Beyzerov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Simon Beyzerov","raw_affiliation_strings":["MIT PRIMES"],"affiliations":[{"raw_affiliation_string":"MIT PRIMES","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092512394","display_name":"Eli Yablon","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eli Yablon","raw_affiliation_strings":["MIT PRIMES"],"affiliations":[{"raw_affiliation_string":"MIT PRIMES","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111012129","display_name":"Hyojae Park","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hyojae Park","raw_affiliation_strings":["MIT PRIMES"],"affiliations":[{"raw_affiliation_string":"MIT PRIMES","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072913052"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.7355,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.87502735,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"809","last_page":"828"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.7441767454147339},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6949831247329712},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6592603325843811},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6229137182235718},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5551700592041016},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5480667352676392},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.529310941696167},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.501065731048584},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4658065438270569},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.4354342222213745},{"id":"https://openalex.org/keywords/chinese-remainder-theorem","display_name":"Chinese remainder theorem","score":0.42214423418045044},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3921476900577545},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3505529761314392},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.25833988189697266},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2033294141292572},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1917804777622223},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11565136909484863}],"concepts":[{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.7441767454147339},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6949831247329712},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6592603325843811},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6229137182235718},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5551700592041016},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5480667352676392},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.529310941696167},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.501065731048584},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4658065438270569},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.4354342222213745},{"id":"https://openalex.org/C151635116","wikidata":"https://www.wikidata.org/wiki/Q193878","display_name":"Chinese remainder theorem","level":2,"score":0.42214423418045044},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3921476900577545},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3505529761314392},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25833988189697266},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2033294141292572},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1917804777622223},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11565136909484863},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp46215.2023.10179295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46215.2023.10179295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W7678451","https://openalex.org/W95608104","https://openalex.org/W139740867","https://openalex.org/W644599125","https://openalex.org/W1490181591","https://openalex.org/W1503855251","https://openalex.org/W1524288918","https://openalex.org/W1536141561","https://openalex.org/W1589034595","https://openalex.org/W1600255172","https://openalex.org/W1970080688","https://openalex.org/W2019356824","https://openalex.org/W2095708839","https://openalex.org/W2115256097","https://openalex.org/W2125744175","https://openalex.org/W2141420453","https://openalex.org/W2150307013","https://openalex.org/W2230451675","https://openalex.org/W2489433463","https://openalex.org/W2494395658","https://openalex.org/W2533357737","https://openalex.org/W2766831041","https://openalex.org/W2969140724","https://openalex.org/W3003532255","https://openalex.org/W3109688427","https://openalex.org/W3128532268","https://openalex.org/W3216987697","https://openalex.org/W4285154500","https://openalex.org/W4288057739","https://openalex.org/W4288057784","https://openalex.org/W4292027090","https://openalex.org/W4378527334","https://openalex.org/W4384948596","https://openalex.org/W6699510422","https://openalex.org/W6735438999","https://openalex.org/W6736412764","https://openalex.org/W6770971105","https://openalex.org/W6784918314"],"related_works":["https://openalex.org/W3022837604","https://openalex.org/W3022941358","https://openalex.org/W4321021116","https://openalex.org/W2366680355","https://openalex.org/W2141416297","https://openalex.org/W4285350732","https://openalex.org/W3176380481","https://openalex.org/W2297949793","https://openalex.org/W4384945997","https://openalex.org/W2375869479"],"abstract_inverted_index":{"Function":[0],"Secret":[1],"Sharing":[2],"(FSS;":[3],"Eurocrypt":[4],"2015)":[5],"allows":[6],"a":[7,11,23,79,125,175,193],"dealer":[8,70,106],"to":[9,73,200],"share":[10,74],"function":[12,24,80],"f":[13,34,44],"with":[14,230],"two":[15],"or":[16,232],"more":[17,233],"evaluators.":[18],"Given":[19,59],"secret":[20,31],"shares":[21,32,61,96],"of":[22,33,54,62,97,117,153,185,219],"f,":[25,63],"the":[26,46,52,60,64,69,75,90,92,95,105,108,150,216],"evaluators":[27,65,93],"can":[28,66,101],"locally":[29],"compute":[30],"(x)":[35],"for":[36,57,111,161],"any":[37],"input":[38],"x,":[39],"without":[40],"learning":[41],"information":[42],"about":[43],"in":[45,124,131,140,196,206],"process.In":[47],"this":[48],"paper,":[49],"we":[50],"initiate":[51],"study":[53],"access":[55,85,109,129,162,202,221],"control":[56,86,130,163,203,222],"FSS.":[58,165],"ensure":[67],"that":[68,104,157],"is":[71,174,223],"authorized":[72],"provided":[76],"function.":[77],"For":[78],"family":[81],"$\\mathcal{F}$":[82],"and":[83,134,137,145,148,191],"an":[84],"list":[87],"defined":[88],"over":[89,164,179,228],"family,":[91],"receiving":[94],"$f":[98],"\\in":[99],"\\mathcal{F}$":[100],"efficiently":[102],"check":[103],"knows":[107],"key":[110],"f.This":[112],"model":[113],"enables":[114],"new":[115],"applications":[116],"FSS,":[118],"such":[119,212],"as:":[120],"(1)":[121],"anonymous":[122,141,207],"authentication":[123,136],"multi-party":[126],"setting,":[127],"(2)":[128],"private":[132,214],"databases,":[133,215],"(3)":[135],"spam":[138],"prevention":[139],"communication":[142],"systems.Our":[143],"definitions":[144],"constructions":[146,190],"abstract":[147],"improve":[149],"concrete":[151],"efficiency":[152,172],"several":[154],"recent":[155],"systems":[156],"implement":[158],"ad-hoc":[159],"mechanisms":[160],"The":[166],"main":[167],"building":[168],"block":[169],"behind":[170],"our":[171,189],"improvement":[173],"discrete-logarithm":[176],"zero-knowledge":[177],"proof-of-knowledge":[178],"secret-shared":[180],"elements,":[181],"which":[182],"may":[183],"be":[184],"independent":[186],"interest.We":[187],"evaluate":[188],"show":[192],"50\u201370\u00d7":[194],"reduction":[195],"computational":[197],"overhead":[198],"compared":[199],"existing":[201],"techniques":[204],"used":[205],"communication.":[208],"In":[209],"other":[210],"applications,":[211],"as":[213],"processing":[217],"cost":[218],"introducing":[220],"only":[224],"1.5\u20133\u00d7,":[225],"when":[226],"amortized":[227],"databases":[229],"500,000":[231],"items.":[234]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
