{"id":"https://openalex.org/W2111847196","doi":"https://doi.org/10.1145/2684464.2684470","title":"Optimally Resilient Asynchronous MPC with Linear Communication Complexity","display_name":"Optimally Resilient Asynchronous MPC with Linear Communication Complexity","publication_year":2015,"publication_date":"2015-01-04","ids":{"openalex":"https://openalex.org/W2111847196","doi":"https://doi.org/10.1145/2684464.2684470","mag":"2111847196"},"language":"en","primary_location":{"id":"doi:10.1145/2684464.2684470","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2684464.2684470","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040182958","display_name":"Ashish Choudhury","orcid":"https://orcid.org/0000-0002-2428-9537"},"institutions":[{"id":"https://openalex.org/I181514455","display_name":"International Institute of Information Technology Bangalore","ror":"https://ror.org/05h9eqy10","country_code":"IN","type":"education","lineage":["https://openalex.org/I181514455"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ashish Choudhury","raw_affiliation_strings":["International Institute of Information Technology Bangalore, India"],"affiliations":[{"raw_affiliation_string":"International Institute of Information Technology Bangalore, India","institution_ids":["https://openalex.org/I181514455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103050046","display_name":"Arpita Patra","orcid":"https://orcid.org/0000-0002-0188-6558"},"institutions":[{"id":"https://openalex.org/I59270414","display_name":"Indian Institute of Science Bangalore","ror":"https://ror.org/04dese585","country_code":"IN","type":"education","lineage":["https://openalex.org/I59270414"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arpita Patra","raw_affiliation_strings":["Department of Computer Science and Automation, Indian Institute of Science Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Automation, Indian Institute of Science Bangalore, India","institution_ids":["https://openalex.org/I59270414"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040182958"],"corresponding_institution_ids":["https://openalex.org/I181514455"],"apc_list":null,"apc_paid":null,"fwci":2.1572,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.90127578,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.7018094658851624},{"id":"https://openalex.org/keywords/communication-complexity","display_name":"Communication complexity","score":0.6832401156425476},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6109440922737122},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.6092345118522644},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5391270518302917},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5232607126235962},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5080502033233643},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5065935850143433},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.48902782797813416},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.48385751247406006},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4836653172969818},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.4676639139652252},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4404584467411041},{"id":"https://openalex.org/keywords/amortized-analysis","display_name":"Amortized analysis","score":0.43448662757873535},{"id":"https://openalex.org/keywords/boolean-circuit","display_name":"Boolean circuit","score":0.42718249559402466},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3863055109977722},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.35385066270828247},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.3447766602039337},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.32824212312698364},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26247113943099976},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22376060485839844},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.17110851407051086},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.16775041818618774}],"concepts":[{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.7018094658851624},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.6832401156425476},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6109440922737122},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.6092345118522644},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5391270518302917},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5232607126235962},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5080502033233643},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5065935850143433},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.48902782797813416},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.48385751247406006},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4836653172969818},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.4676639139652252},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4404584467411041},{"id":"https://openalex.org/C142417499","wikidata":"https://www.wikidata.org/wiki/Q331716","display_name":"Amortized analysis","level":3,"score":0.43448662757873535},{"id":"https://openalex.org/C141796577","wikidata":"https://www.wikidata.org/wiki/Q837479","display_name":"Boolean circuit","level":3,"score":0.42718249559402466},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3863055109977722},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.35385066270828247},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.3447766602039337},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32824212312698364},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26247113943099976},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22376060485839844},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.17110851407051086},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.16775041818618774},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2684464.2684470","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2684464.2684470","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W48039395","https://openalex.org/W66503885","https://openalex.org/W114313705","https://openalex.org/W198033559","https://openalex.org/W1503696148","https://openalex.org/W1518294377","https://openalex.org/W1524288918","https://openalex.org/W1528693676","https://openalex.org/W1565128838","https://openalex.org/W1574373886","https://openalex.org/W1592786019","https://openalex.org/W1600010237","https://openalex.org/W1641444145","https://openalex.org/W1765296874","https://openalex.org/W1798609567","https://openalex.org/W1881831204","https://openalex.org/W1939687213","https://openalex.org/W1965492831","https://openalex.org/W1975596632","https://openalex.org/W1978370567","https://openalex.org/W2006453614","https://openalex.org/W2023279925","https://openalex.org/W2025142762","https://openalex.org/W2027471022","https://openalex.org/W2031533839","https://openalex.org/W2054694168","https://openalex.org/W2072922074","https://openalex.org/W2080112733","https://openalex.org/W2080911030","https://openalex.org/W2092422002","https://openalex.org/W2109873787","https://openalex.org/W2129497273","https://openalex.org/W2206998438","https://openalex.org/W2402235285","https://openalex.org/W6668453294"],"related_works":["https://openalex.org/W2011429979","https://openalex.org/W2082224527","https://openalex.org/W4367593104","https://openalex.org/W2128703986","https://openalex.org/W2110110846","https://openalex.org/W1576843907","https://openalex.org/W2951182814","https://openalex.org/W2159271456","https://openalex.org/W2810615277","https://openalex.org/W4226183777"],"abstract_inverted_index":{"We":[0],"present":[1],"a":[2,21,33],"secure":[3,82],"asynchronous":[4],"multiparty":[5],"computation":[6],"(AMPC)":[7],"protocol":[8,45,84,94],"with":[9],"optimal":[10],"resilience,":[11],"involving":[12],"n":[13],"=":[14],"3t":[15],"+":[16],"1":[17],"parties":[18],"and":[19,37],"tolerating":[20],"computationally":[22,81],"bounded":[23],"static":[24],"adversary,":[25],"capable":[26],"of":[27,40,51,59,100],"corrupting":[28],"upto":[29],"t":[30],"parties.":[31],"For":[32],"security":[34],"parameter":[35],"k":[36],"for":[38],"circuits":[39],"sufficiently":[41],"large":[42],"size,":[43],"our":[44,74],"has":[46],"an":[47,96],"amortized":[48,97],"communication":[49,98],"complexity":[50,99],"O(cMnk)":[52],"bits,":[53],"where":[54],"cM":[55],"denotes":[56],"the":[57,63,67,76],"number":[58],"multiplication":[60],"gates":[61],"in":[62],"arithmetic":[64],"circuit,":[65],"representing":[66],"function":[68],"to":[69,73,87],"be":[70],"computed.":[71],"Prior":[72],"work,":[75],"most":[77],"efficient":[78],"optimally":[79],"resilient,":[80],"AMPC":[83],"was":[85],"due":[86],"Hirt":[88],"et":[89],"al.":[90],"(ICALP":[91],"2008).":[92],"The":[93],"offers":[95],"O(cMn2k)":[101],"bits.":[102]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
