{"id":"https://openalex.org/W2085140050","doi":"https://doi.org/10.1145/1007352.1007394","title":"New notions of security","display_name":"New notions of security","publication_year":2004,"publication_date":"2004-06-13","ids":{"openalex":"https://openalex.org/W2085140050","doi":"https://doi.org/10.1145/1007352.1007394","mag":"2085140050"},"language":"en","primary_location":{"id":"doi:10.1145/1007352.1007394","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1007352.1007394","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the thirty-sixth annual ACM symposium on Theory of computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023747811","display_name":"Manoj Prabhakaran","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Manoj Prabhakaran","raw_affiliation_strings":["Princeton University, Princeton, NJ"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103835895","display_name":"Amit Sahai","orcid":"https://orcid.org/0000-0003-2216-9600"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amit Sahai","raw_affiliation_strings":["Princeton University, Princeton, NJ"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023747811"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":17.0888,"has_fulltext":false,"cited_by_count":149,"citation_normalized_percentile":{"value":0.99178272,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"242","last_page":"251"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9718999862670898,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6590477824211121},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3764798641204834}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6590477824211121},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3764798641204834}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1007352.1007394","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1007352.1007394","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the thirty-sixth annual ACM symposium on Theory of computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1497828701","https://openalex.org/W1499934958","https://openalex.org/W1561122377","https://openalex.org/W1561441787","https://openalex.org/W1598399750","https://openalex.org/W1621317130","https://openalex.org/W1853714066","https://openalex.org/W1867273832","https://openalex.org/W1988909447","https://openalex.org/W2012045293","https://openalex.org/W2027471022","https://openalex.org/W2027528470","https://openalex.org/W2055668544","https://openalex.org/W2058014492","https://openalex.org/W2065722310","https://openalex.org/W2074594718","https://openalex.org/W2075455730","https://openalex.org/W2075906644","https://openalex.org/W2098121410","https://openalex.org/W2103230338","https://openalex.org/W2113085788","https://openalex.org/W2119708968","https://openalex.org/W2144613321","https://openalex.org/W2157779300","https://openalex.org/W2159339434","https://openalex.org/W2163172859","https://openalex.org/W2911777915","https://openalex.org/W2990399857","https://openalex.org/W3030080703","https://openalex.org/W3146762596","https://openalex.org/W6629778331"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"We":[0,45,64],"propose":[1],"a":[2,90],"modification":[3],"to":[4,40,72,106],"the":[5,18,35,47,50,59,66,73,100,110],"framework":[6],"of":[7,49,58,62,70],"Universally":[8],"Composable":[9],"(UC)":[10],"security":[11],"[3].":[12],"Our":[13],"new":[14,51,74,78,101],"notion":[15],"involves":[16],"comparing":[17],"real":[19],"protocol":[20],"execution":[21,25],"with":[22],"an":[23],"ideal":[24,27],"involving":[26],"functionalities":[28],"(just":[29],"as":[30],"in":[31,54,99],"UC-security),":[32],"but":[33],"allowing":[34],"environment":[36],"and":[37],"adversary":[38],"access":[39],"some":[41],"super-polynomial":[42],"computational":[43,79],"power.":[44],"argue":[46],"meaningfulness":[48],"notion,":[52],"which":[53],"particular":[55],"subsumes":[56],"many":[57],"traditional":[60],"notions":[61],"security.":[63],"generalize":[65],"Universal":[67],"Composition":[68],"theorem":[69],"[3]":[71],"setting.":[75],"Then":[76],"under":[77,109],"assumptions,":[80,98],"we":[81],"realize":[82],"secure":[83],"multi-party":[84],"computation":[85],"(for":[86],"static":[87],"adversaries)":[88],"without":[89],"common":[91],"reference":[92],"string":[93],"or":[94],"any":[95],"other":[96],"set-up":[97],"framework.":[102,112],"This":[103],"is":[104],"known":[105],"be":[107],"impossible":[108],"UC":[111]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":11},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":16}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
