{"id":"https://openalex.org/W2059238138","doi":"https://doi.org/10.1145/1835698.1835752","title":"Brief announcement","display_name":"Brief announcement","publication_year":2010,"publication_date":"2010-07-25","ids":{"openalex":"https://openalex.org/W2059238138","doi":"https://doi.org/10.1145/1835698.1835752","mag":"2059238138"},"language":"en","primary_location":{"id":"doi:10.1145/1835698.1835752","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1835698.1835752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022060232","display_name":"Shailesh Vaya","orcid":null},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shailesh Vaya","raw_affiliation_strings":["Indian Institute of Technology Madras, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Madras, Chennai, India","institution_ids":["https://openalex.org/I24676775"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5022060232"],"corresponding_institution_ids":["https://openalex.org/I24676775"],"apc_list":null,"apc_paid":null,"fwci":0.451,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.72837205,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"235","last_page":"236"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.8409055471420288},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8177026510238647},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6567253470420837},{"id":"https://openalex.org/keywords/argument","display_name":"Argument (complex analysis)","score":0.6496493816375732},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.554077684879303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5096697807312012},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4392399191856384},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3952914774417877},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1469058394432068}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.8409055471420288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8177026510238647},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6567253470420837},{"id":"https://openalex.org/C98184364","wikidata":"https://www.wikidata.org/wiki/Q1780131","display_name":"Argument (complex analysis)","level":2,"score":0.6496493816375732},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.554077684879303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5096697807312012},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4392399191856384},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3952914774417877},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1469058394432068},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1835698.1835752","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1835698.1835752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8199999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2006453614","https://openalex.org/W2067763495","https://openalex.org/W2080911030","https://openalex.org/W2083796634","https://openalex.org/W6671735698"],"related_works":["https://openalex.org/W1667647204","https://openalex.org/W2404647514","https://openalex.org/W1524101012","https://openalex.org/W2069340834","https://openalex.org/W2550686250","https://openalex.org/W2982037739","https://openalex.org/W2083288298","https://openalex.org/W2036346279","https://openalex.org/W2076840701","https://openalex.org/W2607129240"],"abstract_inverted_index":{"We":[0,66,92,115,141],"consider":[1],"a":[2,28,69],"recently":[3],"proposed":[4],"model":[5,23],"for":[6,152],"secure":[7,20,101,139],"computation":[8,26,102],"appropriate":[9],"to":[10,32,49,62,81,132,149,174],"the":[11,35,59,75,96,126,129,157,175],"setting":[12],"of":[13,24,38,64,98,136,164],"low":[14],"degree":[15],"networks":[16],"called":[17],"almost":[18,99,137],"everywhere":[19,100,138],"computation.":[21,140],"This":[22],"multiparty":[25],"allows":[27],"few":[29],"honest":[30,43,56],"parties":[31,44,57],"not":[33,46],"achieve":[34],"canonical":[36],"guarantees":[37],"Correctness":[39],"and":[40,106,117,146,171],"Privacy.":[41],"Such":[42],"may":[45],"be":[47,79],"able":[48],"communicate":[50],"reliably":[51],"or":[52],"securely":[53],"with":[54],"other":[55],"in":[58,74,161,178],"network":[60],"due":[61],"lack":[63],"infrastructure.":[65],"explain":[67],"why":[68,119],"straightforward":[70],"hybrid":[71],"argument":[72],"employed":[73],"previous":[76,179],"work":[77],"can":[78],"used":[80],"realize":[82,134,150],"privacy":[83,135],"only":[84,109,130],"when":[85,110],"honest-but-curious":[86],"type":[87],"passive":[88],"corruptions":[89,112],"are":[90,113],"considered.":[91],"further":[93],"note":[94,168],"that":[95],"notion":[97],"is":[103,128],"theoretically":[104],"challenging":[105],"practically":[107],"relevant":[108],"malicious":[111],"allowed.":[114],"argue":[116],"emphasize":[118],"simulation":[120],"based":[121],"reduction":[122],"approach":[123,145],"taken":[124],"by":[125],"author":[127],"way":[131],"meaningfully":[133],"present":[142],"such":[143],"an":[144],"show":[147],"how":[148],"a.e.s.c.":[151],"general":[153],"Byzantine":[154],"corruptions,":[155],"resolving":[156],"principle":[158],"open":[159],"problem":[160],"this":[162],"line":[163],"research.":[165],"Finally,":[166],"we":[167],"several":[169],"technical":[170],"conceptual":[172],"improvements":[173],"results":[176],"given":[177],"work.":[180]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
