{"id":"https://openalex.org/W3156546827","doi":"https://doi.org/10.1109/tc.2021.3073171","title":"STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy","display_name":"STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy","publication_year":2021,"publication_date":"2021-04-14","ids":{"openalex":"https://openalex.org/W3156546827","doi":"https://doi.org/10.1109/tc.2021.3073171","mag":"3156546827"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2021.3073171","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2021.3073171","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2009.13153","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Zhihua Xia","orcid":"https://orcid.org/0000-0001-6860-647X"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhihua Xia","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qi Gu","orcid":"https://orcid.org/0000-0002-8343-6234"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Gu","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science &#x0026; Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wenhao Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenhao Zhou","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science &#x0026; Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Lizhi Xiong","orcid":"https://orcid.org/0000-0001-8612-1222"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lizhi Xiong","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science &#x0026; Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jian Weng","orcid":"https://orcid.org/0000-0003-4067-8230"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":null,"display_name":"Naixue Xiong","orcid":"https://orcid.org/0000-0002-0394-4635"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Naixue Xiong","raw_affiliation_strings":["School of Computer Science and Technology, Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":2.2394,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.89797284,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"73","issue":"2","first_page":"340","last_page":"352"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9266999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9266999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.03460000082850456,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.007600000128149986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.8216999769210815},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6811000108718872},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6407999992370605},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6093999743461609},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5317999720573425},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.42640000581741333},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.34200000762939453},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.33719998598098755},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.32829999923706055}],"concepts":[{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.8216999769210815},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.816100001335144},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6811000108718872},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6407999992370605},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6093999743461609},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5317999720573425},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43050000071525574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4300999939441681},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4300999939441681},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.42640000581741333},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38600000739097595},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.34200000762939453},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.33719998598098755},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.32829999923706055},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.3203999996185303},{"id":"https://openalex.org/C4373008","wikidata":"https://www.wikidata.org/wiki/Q513349","display_name":"File server","level":2,"score":0.2888999879360199},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.28279998898506165},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2784999907016754},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.2757999897003174},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.2694000005722046},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.26030001044273376},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2587999999523163},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.2563000023365021},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2524000108242035}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tc.2021.3073171","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2021.3073171","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2009.13153","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2009.13153","pdf_url":"https://arxiv.org/pdf/2009.13153","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2009.13153","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2009.13153","pdf_url":"https://arxiv.org/pdf/2009.13153","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W44936433","https://openalex.org/W51265332","https://openalex.org/W121345474","https://openalex.org/W1485800369","https://openalex.org/W1499934958","https://openalex.org/W1508764330","https://openalex.org/W1524288918","https://openalex.org/W1888364621","https://openalex.org/W2019891719","https://openalex.org/W2063724771","https://openalex.org/W2077315235","https://openalex.org/W2088492763","https://openalex.org/W2113761519","https://openalex.org/W2130901615","https://openalex.org/W2141420453","https://openalex.org/W2435473771","https://openalex.org/W2471745814","https://openalex.org/W2536058570","https://openalex.org/W2579288588","https://openalex.org/W2606882085","https://openalex.org/W2701059868","https://openalex.org/W2744999500","https://openalex.org/W2765200655","https://openalex.org/W2922482186","https://openalex.org/W2940691483","https://openalex.org/W2963106566","https://openalex.org/W2963752132","https://openalex.org/W2965635245","https://openalex.org/W2999483845","https://openalex.org/W3014159896","https://openalex.org/W3038079676","https://openalex.org/W3041173183","https://openalex.org/W3043831752","https://openalex.org/W3089683609","https://openalex.org/W3108146280","https://openalex.org/W3115360974","https://openalex.org/W3141585064","https://openalex.org/W4206320562","https://openalex.org/W6748082217","https://openalex.org/W6783092909","https://openalex.org/W6785814594","https://openalex.org/W6790131382"],"related_works":[],"abstract_inverted_index":{"The":[0,54,139,154],"rapid":[1],"development":[2],"of":[3,9,24,37,51,74,82,97,113,130,166],"cloud":[4,18],"computing":[5],"probably":[6],"benefits":[7],"many":[8],"us":[10],"while":[11,47],"the":[12,22,32,49,62,79,88,95,121,128,147,152,161,167],"privacy":[13],"risks":[14],"brought":[15],"by":[16],"semi-honest":[17],"servers":[19,46,137],"have":[20],"aroused":[21],"attention":[23],"more":[25,27],"and":[26,29,92,99,115,157,164],"people":[28],"legislatures.":[30],"In":[31,67],"last":[33],"two":[34],"decades,":[35],"plenty":[36],"works":[38],"seek":[39],"to":[40,45,56,150],"outsource":[41],"various":[42,83],"specific":[43],"tasks":[44,55],"ensuring":[48],"security":[50,129,165],"private":[52,131],"data.":[53],"be":[57],"outsourced":[58],"are":[59,65,144],"countless;":[60],"however,":[61],"computations":[63],"involved":[64],"similar.":[66],"this":[68],"article,":[69],"we":[70],"construct":[71],"a":[72],"series":[73],"novel":[75],"protocols":[76,108,126],"that":[77],"support":[78],"secure":[80],"computation":[81,118],"functions":[84],"on":[85,101],"numbers":[86],"(e.g.,":[87,94],"basic":[89],"elementary":[90],"functions)":[91],"matrices":[93],"calculation":[96],"eigenvectors":[98],"eigenvalues)":[100],"arbitrary":[102],"<inline-formula><tex-math":[103,123,135],"notation=\"LaTeX\">$n\\geq":[104],"2$</tex-math></inline-formula>":[105],"servers.":[106],"All":[107],"only":[109],"require":[110],"constant":[111],"rounds":[112],"interactions":[114],"achieve":[116],"low":[117],"complexity.":[119],"Moreover,":[120],"proposed":[122,168],"notation=\"LaTeX\">$n$</tex-math></inline-formula>":[124],"-party":[125],"ensure":[127],"data":[132],"even":[133],"though":[134],"notation=\"LaTeX\">$n-1$</tex-math></inline-formula>":[136],"collude.":[138],"convolutional":[140],"neural":[141],"network":[142],"models":[143],"utilized":[145],"as":[146],"case":[148],"studies":[149],"verify":[151],"protocols.":[153,169],"theoretical":[155],"analysis":[156],"experimental":[158],"results":[159],"demonstrate":[160],"correctness,":[162],"efficiency,":[163]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2021-04-26T00:00:00"}
