{"id":"https://openalex.org/W2048994663","doi":"https://doi.org/10.1145/2213977.2214086","title":"On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption","display_name":"On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption","publication_year":2012,"publication_date":"2012-05-19","ids":{"openalex":"https://openalex.org/W2048994663","doi":"https://doi.org/10.1145/2213977.2214086","mag":"2048994663"},"language":"en","primary_location":{"id":"doi:10.1145/2213977.2214086","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2213977.2214086","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the forty-fourth annual ACM symposium on Theory of computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063197220","display_name":"Adriana L\u00f3pez-Alt","orcid":null},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Adriana L\u00f3pez-Alt","raw_affiliation_strings":["New York University, New York, NY, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"New York University, New York, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049555551","display_name":"Eran Tromer","orcid":"https://orcid.org/0000-0002-8884-9564"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Eran Tromer","raw_affiliation_strings":["Tel Aviv University, Tel Aviv, Israel","Tel Aviv University, Tel Aviv, Israel,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tel Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]},{"raw_affiliation_string":"Tel Aviv University, Tel Aviv, Israel,","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000240220","display_name":"Vinod Vaikuntanathan","orcid":"https://orcid.org/0000-0002-2666-0045"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Vinod Vaikuntanathan","raw_affiliation_strings":["University of Toronto, Toronto, ON, Canada","University of Toronto, Toronto, On, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Toronto, Toronto, ON, Canada","institution_ids":["https://openalex.org/I185261750"]},{"raw_affiliation_string":"University of Toronto, Toronto, On, Canada","institution_ids":["https://openalex.org/I185261750"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063197220"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":85.3305,"has_fulltext":false,"cited_by_count":906,"citation_normalized_percentile":{"value":0.99966738,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1219","last_page":"1234"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9405555129051208},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8686980605125427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8314077854156494},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.7544304728507996},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6386959552764893},{"id":"https://openalex.org/keywords/on-the-fly","display_name":"On the fly","score":0.5728968381881714},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5205684304237366},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4755627512931824},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.4303210377693176},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32663694024086},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28351205587387085},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22245031595230103},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14326539635658264},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.08554887771606445}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9405555129051208},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8686980605125427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8314077854156494},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.7544304728507996},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6386959552764893},{"id":"https://openalex.org/C2781020372","wikidata":"https://www.wikidata.org/wiki/Q533093","display_name":"On the fly","level":2,"score":0.5728968381881714},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5205684304237366},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4755627512931824},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.4303210377693176},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32663694024086},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28351205587387085},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22245031595230103},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14326539635658264},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.08554887771606445}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2213977.2214086","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2213977.2214086","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the forty-fourth annual ACM symposium on Theory of computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320337179","display_name":"Check Point Institute for Information Security, Tel Aviv University","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W34785529","https://openalex.org/W104209573","https://openalex.org/W198033559","https://openalex.org/W1494049356","https://openalex.org/W1519947574","https://openalex.org/W1521660974","https://openalex.org/W1546634390","https://openalex.org/W1557386445","https://openalex.org/W1574373886","https://openalex.org/W1575598731","https://openalex.org/W1577653766","https://openalex.org/W1581161155","https://openalex.org/W1600010237","https://openalex.org/W1675339804","https://openalex.org/W1836725053","https://openalex.org/W1856342626","https://openalex.org/W1886646278","https://openalex.org/W1936753088","https://openalex.org/W1939687213","https://openalex.org/W1992282993","https://openalex.org/W1994790157","https://openalex.org/W2006453614","https://openalex.org/W2007466965","https://openalex.org/W2027471022","https://openalex.org/W2031533839","https://openalex.org/W2061949491","https://openalex.org/W2067047774","https://openalex.org/W2067596507","https://openalex.org/W2077244027","https://openalex.org/W2080911030","https://openalex.org/W2092422002","https://openalex.org/W2098290658","https://openalex.org/W2113333997","https://openalex.org/W2116653107","https://openalex.org/W2119028650","https://openalex.org/W2129580084","https://openalex.org/W2144238522","https://openalex.org/W2146099890","https://openalex.org/W2152926062","https://openalex.org/W2156030242","https://openalex.org/W2166670067","https://openalex.org/W2239212099","https://openalex.org/W2293021588","https://openalex.org/W2407977113","https://openalex.org/W2476794702","https://openalex.org/W3143204987","https://openalex.org/W4236195087","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3127779352","https://openalex.org/W2921955359","https://openalex.org/W4365807333","https://openalex.org/W2585986919","https://openalex.org/W2951702994","https://openalex.org/W2950393457","https://openalex.org/W2588472948","https://openalex.org/W4378530726","https://openalex.org/W3127306806","https://openalex.org/W2001084165"],"abstract_inverted_index":{"We":[0],"propose":[1],"a":[2,11],"new":[3],"notion":[4,19,69],"of":[5,42,70],"secure":[6],"multiparty":[7,24],"computation":[8,25],"aided":[9],"by":[10,57],"computationally-powerful":[12],"but":[13],"untrusted":[14],"\"cloud\"":[15],"server.":[16],"In":[17],"this":[18],"that":[20],"we":[21],"call":[22],"on-the-fly":[23],"(MPC),":[26],"the":[27,58,67,80],"cloud":[28,59],"can":[29,77],"non-interactively":[30],"perform":[31],"arbitrary,":[32],"dynamically":[33],"chosen":[34,44],"computations":[35],"on":[36,86],"data":[37,49],"belonging":[38],"to":[39],"arbitrary":[40],"sets":[41],"users":[43,76],"on-the-fly.":[45],"All":[46],"user's":[47],"input":[48],"and":[50],"intermediate":[51],"results":[52],"are":[53],"protected":[54],"from":[55],"snooping":[56],"as":[60,62],"well":[61],"other":[63],"users.":[64],"This":[65],"extends":[66],"standard":[68],"fully":[71],"homomorphic":[72],"encryption":[73],"(FHE),":[74],"where":[75],"only":[78],"enlist":[79],"cloud's":[81],"help":[82],"in":[83],"evaluating":[84],"functions":[85],"their":[87],"own":[88],"encrypted":[89],"data.":[90]},"counts_by_year":[{"year":2026,"cited_by_count":12},{"year":2025,"cited_by_count":69},{"year":2024,"cited_by_count":65},{"year":2023,"cited_by_count":62},{"year":2022,"cited_by_count":75},{"year":2021,"cited_by_count":67},{"year":2020,"cited_by_count":72},{"year":2019,"cited_by_count":66},{"year":2018,"cited_by_count":61},{"year":2017,"cited_by_count":72},{"year":2016,"cited_by_count":91},{"year":2015,"cited_by_count":85},{"year":2014,"cited_by_count":54},{"year":2013,"cited_by_count":42},{"year":2012,"cited_by_count":12}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
