{"id":"https://openalex.org/W4416961055","doi":"https://doi.org/10.1109/tifs.2025.3639937","title":"Two-Sided Private Intersection Sum With Cardinality in the Malicious Model","display_name":"Two-Sided Private Intersection Sum With Cardinality in the Malicious Model","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416961055","doi":"https://doi.org/10.1109/tifs.2025.3639937"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3639937","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3639937","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yikang Huang","orcid":"https://orcid.org/0009-0006-8513-974X"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]},{"id":"https://openalex.org/I4210116809","display_name":"Hong Kong Virtual University","ror":"https://ror.org/023mp3m37","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210116809"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yikang Huang","raw_affiliation_strings":["School of Computer Sciences and Cyber Engineering, Guangzhou University, Guangzhou, China","School of Computer Sciences and Cyber Engineering, Guangzhou University, China"],"raw_orcid":"https://orcid.org/0009-0006-8513-974X","affiliations":[{"raw_affiliation_string":"School of Computer Sciences and Cyber Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"School of Computer Sciences and Cyber Engineering, Guangzhou University, China","institution_ids":["https://openalex.org/I37987034","https://openalex.org/I4210116809"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101773403","display_name":"Chunming Tang","orcid":"https://orcid.org/0000-0001-7634-4705"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunming Tang","raw_affiliation_strings":["School of Mathematics and Information Sciences and Guangzhou Center for Applied Mathematics, Guangzhou University, Guangzhou, China","School of Mathematics and Information Sciences, Guangzhou University, China"],"raw_orcid":"https://orcid.org/0000-0001-7634-4705","affiliations":[{"raw_affiliation_string":"School of Mathematics and Information Sciences and Guangzhou Center for Applied Mathematics, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"School of Mathematics and Information Sciences, Guangzhou University, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038498567","display_name":"Qiuxia Xu","orcid":"https://orcid.org/0000-0001-6735-539X"},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuxia Xu","raw_affiliation_strings":["School of Mathematics and Systems Science, Guangdong Polytechnic Normal University, Guangzhou, China","School of Mathematics and Systems Science, Guangdong Polytechnic Normal University, China"],"raw_orcid":"https://orcid.org/0000-0001-6735-539X","affiliations":[{"raw_affiliation_string":"School of Mathematics and Systems Science, Guangdong Polytechnic Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I4210122543"]},{"raw_affiliation_string":"School of Mathematics and Systems Science, Guangdong Polytechnic Normal University, China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015151612","display_name":"Yunlu Cai","orcid":"https://orcid.org/0000-0003-4920-7523"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunlu Cai","raw_affiliation_strings":["School of Mathematics and Information Sciences and Guangzhou Center for Applied Mathematics, Guangzhou University, Guangzhou, China","School of Mathematics and Information Sciences, Guangzhou University, China"],"raw_orcid":"https://orcid.org/0000-0003-4920-7523","affiliations":[{"raw_affiliation_string":"School of Mathematics and Information Sciences and Guangzhou Center for Applied Mathematics, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"School of Mathematics and Information Sciences, Guangzhou University, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I37987034","https://openalex.org/I4210116809"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1942211,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"13235","last_page":"13250"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.008899999782443047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.001500000013038516,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cardinality","display_name":"Cardinality (data modeling)","score":0.8894000053405762},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.7803999781608582},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7055000066757202},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.5641999840736389},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5620999932289124},{"id":"https://openalex.org/keywords/communication-complexity","display_name":"Communication complexity","score":0.5178999900817871},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49959999322891235}],"concepts":[{"id":"https://openalex.org/C87117476","wikidata":"https://www.wikidata.org/wiki/Q362383","display_name":"Cardinality (data modeling)","level":2,"score":0.8894000053405762},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.7803999781608582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7595999836921692},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7055000066757202},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.5641999840736389},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5620999932289124},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5544000267982483},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.5178999900817871},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49959999322891235},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.45179998874664307},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.429500013589859},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4230000078678131},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.364300012588501},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3325999975204468},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32600000500679016},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3075999915599823},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2890999913215637},{"id":"https://openalex.org/C2777168461","wikidata":"https://www.wikidata.org/wiki/Q42196253","display_name":"Set operations","level":3,"score":0.25940001010894775},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.2558000087738037}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3639937","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3639937","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1372848358","display_name":null,"funder_award_id":"12171114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2165173864","display_name":null,"funder_award_id":"2021SDKYA029","funder_id":"https://openalex.org/F4320323040","funder_display_name":"Applied Scientific Research Fund"},{"id":"https://openalex.org/G8937910666","display_name":null,"funder_award_id":"12201133","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323040","display_name":"Applied Scientific Research Fund","ror":"https://ror.org/00yp7b787"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W5294680","https://openalex.org/W111294696","https://openalex.org/W1544695791","https://openalex.org/W1574149717","https://openalex.org/W1589034595","https://openalex.org/W1589205472","https://openalex.org/W1756608328","https://openalex.org/W1885156594","https://openalex.org/W2004957971","https://openalex.org/W2097215149","https://openalex.org/W2100460660","https://openalex.org/W2132172731","https://openalex.org/W2156186849","https://openalex.org/W2259030728","https://openalex.org/W2612145958","https://openalex.org/W2782492233","https://openalex.org/W2883748642","https://openalex.org/W2887461714","https://openalex.org/W2896599519","https://openalex.org/W2922077514","https://openalex.org/W2986900277","https://openalex.org/W2991364442","https://openalex.org/W3013638630","https://openalex.org/W3022916067","https://openalex.org/W3037211059","https://openalex.org/W3166373439","https://openalex.org/W3215333078","https://openalex.org/W4214516815","https://openalex.org/W4308391687","https://openalex.org/W4383221537","https://openalex.org/W4385654372","https://openalex.org/W4386215237","https://openalex.org/W4386814796","https://openalex.org/W4399920842","https://openalex.org/W4406029584","https://openalex.org/W4408216052","https://openalex.org/W4408281826","https://openalex.org/W4409222134","https://openalex.org/W4409641606"],"related_works":[],"abstract_inverted_index":{"The":[0,154],"private":[1,43,47],"intersection-sum":[2],"with":[3,28,50,92,143],"cardinality":[4,14,51],"(PIS-CA)":[5],"protocol":[6,103,122,161],"enables":[7],"two":[8],"parties":[9],"to":[10,68],"privately":[11],"compute":[12,54],"the":[13,16,22,25,56,61,70,89,124,151,159,164],"of":[15,24,42,72],"intersection":[17,45,49,57],"between":[18],"their":[19,79,85,102,110],"datasets":[20],"and":[21,82,132],"sum":[23],"values":[26],"associated":[27,62],"these":[29,114],"intersecting":[30],"elements,":[31],"while":[32],"keeping":[33],"all":[34],"other":[35],"information":[36],"confidential.":[37],"As":[38],"a":[39,130],"related":[40],"variant":[41],"set":[44,48],"(PSI),":[46],"(PSI-CA)":[52],"protocols":[53,66],"only":[55],"size":[58],"without":[59],"considering":[60],"values.":[63],"Existing":[64],"PIS-CA":[65,121],"attempt":[67],"reduce":[69],"amount":[71],"communication":[73,98,106,140,166],"through":[74],"batch":[75,134],"encryption-based":[76],"optimization,":[77],"but":[78],"incomplete":[80],"design":[81,136],"implementation":[83],"hinder":[84],"practical":[86,139],"deployment.":[87],"Moreover,":[88],"shuffle":[90,147],"proof":[91,148],"<italic":[93],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[94,96],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">O</i>(\u221a<italic":[95],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>)":[97],"complexity":[99],"adopted":[100],"in":[101,123],"incur":[104],"substantial":[105],"overhead,":[107],"further":[108],"limiting":[109],"scalability.":[111],"To":[112],"address":[113],"problems,":[115],"we":[116],"propose":[117],"an":[118,144],"optimized":[119],"two-sided":[120],"malicious":[125],"model.":[126],"Our":[127],"scheme":[128],"provides":[129],"concrete":[131],"implementable":[133],"encryption":[135],"that":[137,158],"achieves":[138],"efficiency,":[141],"together":[142],"enhanced":[145],"lightweight":[146],"based":[149],"on":[150],"Curdleproofs":[152],"framework.":[153],"experimental":[155],"results":[156],"demonstrate":[157],"proposed":[160],"significantly":[162],"reduces":[163],"total":[165],"cost,":[167],"making":[168],"it":[169],"suitable":[170],"for":[171],"privacy-preserving":[172],"applications":[173],"such":[174],"as":[175],"ad":[176],"conversion":[177],"measurement.":[178]},"counts_by_year":[],"updated_date":"2026-04-29T09:16:38.111599","created_date":"2025-12-03T00:00:00"}
