{"id":"https://openalex.org/W3016293736","doi":"https://doi.org/10.1109/tdsc.2020.2986751","title":"Self-Stabilizing Secure Computation","display_name":"Self-Stabilizing Secure Computation","publication_year":2020,"publication_date":"2020-04-13","ids":{"openalex":"https://openalex.org/W3016293736","doi":"https://doi.org/10.1109/tdsc.2020.2986751","mag":"3016293736"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2020.2986751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.2986751","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075383332","display_name":"Dan Brownstein","orcid":"https://orcid.org/0000-0001-7930-6632"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Dan Brownstein","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"raw_orcid":"https://orcid.org/0000-0001-7930-6632","affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060182415","display_name":"Shlomi Dolev","orcid":"https://orcid.org/0000-0001-5418-6670"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Shlomi Dolev","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"raw_orcid":"https://orcid.org/0000-0001-5418-6670","affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028210393","display_name":"Muni Venkateswarlu Kumaramangalam","orcid":"https://orcid.org/0000-0001-6752-6582"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Muni Venkateswarlu Kumaramangalam","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada"],"raw_orcid":"https://orcid.org/0000-0001-6752-6582","affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075383332"],"corresponding_institution_ids":["https://openalex.org/I124227911"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05268621,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"19","issue":"1","first_page":"33","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8202261924743652},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.719947338104248},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6368536949157715},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6228877305984497},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.616454541683197},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5771686434745789},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5635658502578735},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5622086524963379},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5559155941009521},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4907761514186859},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.48661884665489197},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46735337376594543},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4590398967266083},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15622276067733765},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06943970918655396}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8202261924743652},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.719947338104248},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6368536949157715},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6228877305984497},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.616454541683197},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5771686434745789},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5635658502578735},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5622086524963379},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5559155941009521},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4907761514186859},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.48661884665489197},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46735337376594543},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4590398967266083},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15622276067733765},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06943970918655396},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2020.2986751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.2986751","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W44936433","https://openalex.org/W196195722","https://openalex.org/W1499934958","https://openalex.org/W1581680965","https://openalex.org/W1584129587","https://openalex.org/W1967263393","https://openalex.org/W1970745521","https://openalex.org/W1983086789","https://openalex.org/W1997859100","https://openalex.org/W2018047324","https://openalex.org/W2029925247","https://openalex.org/W2093767941","https://openalex.org/W2111132249","https://openalex.org/W2167524182","https://openalex.org/W2808083991","https://openalex.org/W2811175264","https://openalex.org/W2911174908","https://openalex.org/W2980108059","https://openalex.org/W2990399857","https://openalex.org/W4254970788","https://openalex.org/W6752721813","https://openalex.org/W6758081492"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W2496342316","https://openalex.org/W1971522943","https://openalex.org/W4205636420","https://openalex.org/W2141019415"],"abstract_inverted_index":{"Self-stabilization":[0],"refers":[1],"to":[2,7,25,64,82,108],"the":[3,23,46,50,60,66,104,114,119,124,127,134,145,158,171],"ability":[4],"of":[5,12,68,113,126,136,148,173,181],"systems":[6],"recover":[8],"after":[9],"temporal":[10],"violations":[11,20],"conditions":[13],"required":[14],"for":[15,41,129,170],"their":[16],"correct":[17],"operation.":[18],"Such":[19],"may":[21,121],"lead":[22],"system":[24,128,160],"an":[26],"arbitrary":[27],"state":[28,186],"from":[29],"which":[30,177],"it":[31],"should":[32],"automatically":[33,151],"recover.":[34],"Typically,":[35],"a":[36,111,130,140,166,174,179,182],"self-stabilizing":[37,167],"algorithm":[38,47],"is":[39,106,161],"examined":[40],"eventual":[42],"functionality,":[43],"namely,":[44],"whether":[45],"eventually":[48],"exhibit":[49],"desired":[51],"input":[52],"output":[53],"relation.":[54],"In":[55,73],"this":[56],"article,":[57],"we":[58],"extend":[59],"typical":[61],"functionality":[62,176],"criteria":[63],"include":[65],"recovery":[67],"privacy":[69],"and":[70],"security":[71,89,99,146],"aspects.":[72],"cryptographic":[74,95],"protocol":[75,169],"problems,":[76],"two":[77],"or":[78],"more":[79],"parties":[80,125],"want":[81],"perform":[83],"some":[84,156],"joint":[85],"computation,":[86],"while":[87],"guaranteeing":[88],"properties":[90,100,147],"against":[91],"adversarial":[92],"behavior.":[93],"Current":[94],"protocols":[96],"guarantee":[97],"these":[98],"as":[101,103],"long":[102],"adversary":[105,120],"limited":[107],"compromise":[109,122],"only":[110],"fraction":[112],"parties.":[115],"However,":[116],"in":[117],"reality,":[118],"all":[123],"while.":[131],"We":[132,163],"introduce":[133],"notion":[135],"Self-Stabilizing":[137],"Secure":[138],"Computation,":[139],"design":[141],"that":[142,144],"ensures":[143],"computation":[149,180],"are":[150],"regained,":[152],"even":[153],"if":[154],"at":[155],"point":[157],"entire":[159],"compromised.":[162],"then":[164],"propose":[165],"secure":[168],"evaluation":[172],"reactive":[175],"yields":[178],"virtual":[183],"global":[184],"finite":[185],"machine.":[187]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
