{"id":"https://openalex.org/W2090190190","doi":"https://doi.org/10.1145/1374376.1374438","title":"Cryptography with constant computational overhead","display_name":"Cryptography with constant computational overhead","publication_year":2008,"publication_date":"2008-05-17","ids":{"openalex":"https://openalex.org/W2090190190","doi":"https://doi.org/10.1145/1374376.1374438","mag":"2090190190"},"language":"en","primary_location":{"id":"doi:10.1145/1374376.1374438","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1374376.1374438","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fortieth annual ACM symposium on Theory of computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081852077","display_name":"Yuval Ishai","orcid":"https://orcid.org/0009-0009-4096-6305"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Yuval Ishai","raw_affiliation_strings":["Technion and UCLA, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion and UCLA, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036104549","display_name":"Eyal Kushilevitz","orcid":"https://orcid.org/0009-0009-9277-3863"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Eyal Kushilevitz","raw_affiliation_strings":["Technion, Haifa, Israel","Technion , Haifa , Israel"],"affiliations":[{"raw_affiliation_string":"Technion, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]},{"raw_affiliation_string":"Technion , Haifa , Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020375635","display_name":"Rafail Ostrovsky","orcid":"https://orcid.org/0000-0002-1501-1330"},"institutions":[{"id":"https://openalex.org/I2799798094","display_name":"UCLA Health","ror":"https://ror.org/01d88se56","country_code":"US","type":"funder","lineage":["https://openalex.org/I2799798094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rafail Ostrovsky","raw_affiliation_strings":["UCLA, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"UCLA, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I2799798094"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103835895","display_name":"Amit Sahai","orcid":"https://orcid.org/0000-0003-2216-9600"},"institutions":[{"id":"https://openalex.org/I2799798094","display_name":"UCLA Health","ror":"https://ror.org/01d88se56","country_code":"US","type":"funder","lineage":["https://openalex.org/I2799798094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amit Sahai","raw_affiliation_strings":["UCLA, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"UCLA, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I2799798094"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081852077"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":14.0493,"has_fulltext":false,"cited_by_count":162,"citation_normalized_percentile":{"value":0.98771561,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"433","last_page":"442"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7766894102096558},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7111130356788635},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6665406227111816},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6265667676925659},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.5450962781906128},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.537925660610199},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5066038370132446},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4828115403652191},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4796900451183319},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.42609208822250366},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.4192652404308319},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4125063419342041},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.4110192060470581},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2735522389411926},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20879459381103516},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1630059778690338},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.060343384742736816}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7766894102096558},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7111130356788635},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6665406227111816},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6265667676925659},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.5450962781906128},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.537925660610199},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5066038370132446},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4828115403652191},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4796900451183319},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.42609208822250366},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.4192652404308319},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4125063419342041},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.4110192060470581},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2735522389411926},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20879459381103516},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1630059778690338},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.060343384742736816},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1374376.1374438","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1374376.1374438","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fortieth annual ACM symposium on Theory of computing","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.148.6259","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.6259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucla.edu/~rafail/PUBLIC/91.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.324.100","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucla.edu/~sahai/work/web/2008 Publications/STOC2008.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W98016092","https://openalex.org/W1488169517","https://openalex.org/W1490590996","https://openalex.org/W1502935422","https://openalex.org/W1507263262","https://openalex.org/W1515945955","https://openalex.org/W1524807471","https://openalex.org/W1541483074","https://openalex.org/W1548880861","https://openalex.org/W1562285034","https://openalex.org/W1564468028","https://openalex.org/W1566509562","https://openalex.org/W1599258069","https://openalex.org/W1604074479","https://openalex.org/W1607960089","https://openalex.org/W1702767838","https://openalex.org/W1972792640","https://openalex.org/W1980227445","https://openalex.org/W1984459117","https://openalex.org/W1987667503","https://openalex.org/W1996068512","https://openalex.org/W1997859100","https://openalex.org/W2004315837","https://openalex.org/W2006453614","https://openalex.org/W2013623332","https://openalex.org/W2016443801","https://openalex.org/W2019807548","https://openalex.org/W2021276494","https://openalex.org/W2052207834","https://openalex.org/W2061106457","https://openalex.org/W2064423787","https://openalex.org/W2069717895","https://openalex.org/W2069788171","https://openalex.org/W2087895821","https://openalex.org/W2088492763","https://openalex.org/W2090903439","https://openalex.org/W2097130694","https://openalex.org/W2100661986","https://openalex.org/W2110761203","https://openalex.org/W2117362057","https://openalex.org/W2118179522","https://openalex.org/W2119422255","https://openalex.org/W2122270497","https://openalex.org/W2124407183","https://openalex.org/W2128531813","https://openalex.org/W2138532540","https://openalex.org/W2141084119","https://openalex.org/W2143087446","https://openalex.org/W2148180254","https://openalex.org/W2164284862","https://openalex.org/W2233233025","https://openalex.org/W2293144562","https://openalex.org/W2396751010","https://openalex.org/W2887278875","https://openalex.org/W2911777915","https://openalex.org/W4239047880","https://openalex.org/W4285719527","https://openalex.org/W6677934245"],"related_works":["https://openalex.org/W1585142320","https://openalex.org/W1575556365","https://openalex.org/W1553564935","https://openalex.org/W2949937073","https://openalex.org/W1533434223","https://openalex.org/W2569355986","https://openalex.org/W2921883729","https://openalex.org/W2225954419","https://openalex.org/W2517454446","https://openalex.org/W153605704"],"abstract_inverted_index":{"Current":[0],"constructions":[1],"of":[2,18,24,49,63],"cryptographic":[3,27],"primitives":[4],"typically":[5],"involve":[6],"a":[7,41],"large":[8],"multiplicative":[9],"computational":[10,43],"overhead":[11,44],"that":[12,60],"grows":[13],"with":[14],"the":[15,22,50,56,61,71],"desired":[16],"level":[17],"security.":[19],"We":[20],"explore":[21],"possibility":[23],"implementing":[25],"basic":[26],"primitives,":[28],"such":[29],"as":[30],"encryption,":[31],"authentication,":[32],"signatures,":[33],"and":[34],"secure":[35],"two-party":[36],"computation,":[37],"while":[38],"incurring":[39],"only":[40],"constant":[42],"compared":[45],"to":[46],"insecure":[47],"implementations":[48],"same":[51],"tasks.":[52],"Here":[53],"we":[54],"make":[55],"usual":[57],"security":[58],"requirement":[59],"advantage":[62],"any":[64],"polynomial-time":[65],"attacker":[66],"must":[67],"be":[68],"negligible":[69],"in":[70],"input":[72],"length.":[73]},"counts_by_year":[{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":15},{"year":2013,"cited_by_count":11},{"year":2012,"cited_by_count":9}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
